Selected Publications

Full list of publications

On the Safety Implications of Misordered Events and Commands in IoT Systems
Furkan Goksel, M. Ozgur Ozmen, Michael Reeves, Basavesh Shivakumar and Z. Berkay Celik
IEEE Workshop on the Internet of Safe Things, 2021

Exposing New Vulnerabilities of Error Handling Mechanism in CAN
Khaled Serag, Rohit Bhatia, Vireshwar Kumar, Z. Berkay Celik, and Dongyan Xu
USENIX Security Symposium, 2021

PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles
Hyungsub Kim, M. Ozgur Ozmen, Antonio Bianchi, Z. Berkay Celik, and Dongyan Xu
Network and Distributed System Security Symposium (NDSS), 2021

Evading Voltage-Based Intrusion Detection on Automotive CAN
Rohit Bhatia, Vireshwar Kumar, Khaled Serag, Z. Berkay Celik, Mathias Payer, and Dongyan Xu
Network and Distributed System Security Symposium (NDSS), 2021

S3: Side-channel Attack on Stylus Pencil Through Sensors
Habiba Farrukh, Tinghan Yang, Yuxuan Yin, Hanwen Xu, He Wang, and Z. Berkay Celik
ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT/UbiComp), 2021

ATLAS: A Sequence-based Learning Approach for Attack Investigation
Abdulellah Alsaheel, Yuhong Nan, Shiqing Ma, Le Yu, Gregory Walkup, Z. Berkay Celik, Dongyan Xu, and Xiangyu Zhang
USENIX Security Symposium, 2021

Real-time Analysis of Privacy-(un)aware IoT Applications
Leonardo Babun, Z. Berkay Celik, Patrick McDaniel, and Selcuk Uluagac
Privacy Enhancing Technologies (PoPETS), 2021

Sentinel: A Robust Intrusion Detection System for IoT Networks Using Kernel-Level System Information
Adrien Cosson, Amit Sikder, Leonardo Babun, Z. Berkay Celik, Patrick McDaniel and Selcuk Uluagac
ACM/IEEE Conference on Internet of Things Design and Implementation (IoTDI), 2021

Teaching

CS 590: IoT/CPS Security (Graduate), Spring 2020 [Syllabus] [Presentation Schedule]

In this course, we will study the latest research in the design of Internet of Things (IoT) and Cyber-Physical Systems (CPS) and methods for securing them. The course will provide foundations of safety and security of IoT/CPS and covers the topics of policy verification, approaches for designing safe and secure systems, techniques for detecting problems in conventional IoT/CPS design and repairing such problems. Example topics include the security of voice-controlled devices, IoT applications, edge computing, industrial control systems, and autonomous vehicles.

CS 529: Security Analytics (Graduate), Fall 2019 [Syllabus]

This graduate-level course will provide students with materials to discuss the intersection of two ubiquitous concepts: Security and Machine Learning. The course is structured in two parts: (1) Machine Learning for Security and (2) Security of Machine Learning Systems. The focus of the first part will be on building a principled understanding of key learning algorithms and techniques, and their applications within the security domain, as well as general questions related to analyzing and handling datasets. The first part will provide students with the necessary background to understand the second half of the course. The second part covers recently discovered security implications of deploying machine learning algorithms in the physical realm. Students will learn about attacks against computer systems leveraging machine learning algorithms, as well as defense techniques to mitigate such attacks during learning and inference.

Full list of courses