We are currently updating our page. More publications and links to papers will be added soon!

Generation & Evaluation of Adversarial Examples for Malware Obfuscation
Daniel Park, Haidar Khan, and Bülent Yener
IEEE International Conference on Machine Learning and Applications (ICMLA 2019)

Cybersecurity in the Era of Data Science: Examining New Adverarial Models
Bülent Yener and Gal Tsvi
IEEE Security and Privacy (2019)

A Survey on Automated Dynamic Malware Analysis Evasion and Counter-Evasion: PC, Mobile, and Web
Alexei Bulazel and Bülent Yener
ROOTS (2017)

Out-of-Order Execution as a Cross-VM Side-Channel and Other Applications
Sophia d'Antoine, Jeremy Blackthorne, and Bülent Yener
ROOTS (2017)

Environmental Authentication in Malware
Jeremy Blackthorne, Benjamin Kaiser, Benjamin Fuller, and Bülent Yener
Latincrypt (2017)

A formal framework for environmentally sensitive malware
Jeremy Blackthorne, Benjamin Kaiser, and Bülent Yener
International Symposium on Research in Attacks, Intrusions, and Detfenses (2016)

Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture
Andrew Zonenberg and Bülent Yener
International Conference on Cryptographic Hardware and Embedded Systems (2016)

On the Security of Key Extraction from Measuring Physical Quantities
Matthew Edman, Aggelos Kiayias, Qiang Tang, and Bülent Yener
IEEE Transactions on Information Forensics and Security (2016)

AVLeak: Fingerprinting Antivirus Emulators through Black-Box Testing
Jeremy Blackthorne, Alexei Bulazel, Andrew Fasano, Patrick Biernat, and Bülent Yener
USENIX Workshop on Offensive Technologies (WOOT 2016)

On passive inference attacks against physical-layer key extraction?
Matthew Edman, Aggelos Kiayias, and Bülent Yener
EUROSEC (2011)

On anonymity in an electronic society: A survey of anonymous communication systems
Matthew Edman and Bülent Yener
ACM Computing Surveys (2009)

Privacy-preserving information markets for computing statistical data
Aggelos Kiayias, Bülent Yener, and Moti Yung
Financial Cryptography and Data Security

Combinatorial design of key distribution mechanisms for wireless sensor networks
Seyit Ahmet Çamtepe and Bülent Yener
IEEE/ACM Transactions on Networking (2007)

Robust key generation from signal envelopes in wireless networks
Babak Azimi-Sadjadi, Aggelos Kiayias, Alejandra Mercado, and Bülent Yener
ACM Conference on Computer and Communications Security (CCS 2007)

Modeling and detection of complex attacks
Seyit Ahmet Çamtepe and Bülent Yener
IEEE International Conference on Security and Privacy in Communications Networks (2007)

A Combinatorial Approach to Measuring Anonymity
Matthew Edman, Fikret Sivrikaya, and Bülent Yener
IEEE International Conference on Intelligence and Security Informatics (ISI 2007)

Expander Graph-based Key Distribution Mechanisms in Wireless Sensor Networks
Seyit Ahmet Çamtepe, Bülent Yener, and Moti Yung
IEEE International Conference on Communications (ICC 2006)

A Secure Programming Paradigm for Network Virtualization
Ana Milanova, Sonia Fahmy, David Musser, and Bülent Yener
IEEE International Conference on Broadband Communications, Networks, and Security (BroadNets 2006)

Combinatorial Design and Key Distribution Mechanisms for Wireless Sensor Networks
Seyit Ahmet Çamtepe and Bülent Yener
ESORICS (2004)

See some of our other work on our old site!

Copyright ©2011 Data Science Research Center under Dr. Bülent Yener.
Maintained by Daniel Park. Valid HTML. All rights reserved.