Author: Emerald Knox (Emerald Knox)

Home / Emerald Knox
Post

Understanding Craigslist Rental Scams

Youngsam Park, Damon McCoy, and Elaine Shi Fraudulently posted online rental listings, rental scams, have been frequently reported by users. However, our understanding of the structure of rental scams is limited. In this paper, we conduct the first systematic empirical study of online rental scams on Craigslist. This study is enabled by a suite of...

Post

Systems, Processes and Computer-Accessible Medium for Providing Logic Encryption Utilizing Fault Analysis

Ozgur Sinanoglu, Youngok Pino, Jeyavijayan Rajendran, and Ramesh Karri Exemplary systems, methods and computer-accessible mediums can encrypting a circuit by determining at least one location to insert at least one gate in the circuit using a fault analysis, and inserting the at least one gate in at least one section of the at least one...

Post

A Comprehensive Design-for-Test Infrastructure in the Context of Security-Critical Applications

Samah Mohamed Saeed and Ozgur Sinanoglu Testability is a perennial concern that requires ever-improved solutions; however, potentially resultant security vulnerabilities need to be considered as well. This article provides a compact look at a body of DfT work from lead practitioners in the field. The DfT strategies address predicting and data Potential impacts DfT controlling test...

Post

System, Method And Computer-Accessible Medium For Facilitating Logic Encryption

Jeyavijayan Rajendran, Youngok Pino, Ozgur Sinanoglu, and Ramesh Karri Exemplary systems, methods and computer-accessible mediums for encrypting at least one integrated circuit (IC) can include determining, using an interference graph, at least one location for a proposed insertion of at least one gate in or at the at least one IC, and inserting the gate(s) into the IC(s)...

Post

Thwarting location privacy protection in location‐based social discovery services

Minhui Xue, Yong Liu, Keith W. Ross, and Haifeng Qian In this paper, we investigate the user location privacy leakage problem in LBSD services reporting distances in discrete bands. Using number theory, we analytically show that by strategically placing multiple virtual probes with fake Global Positioning System locations, one can nevertheless localize user locations in...

Post

System, Method and Computer-Accessible Medium for Providing Secure Split Manufacturing

Jeyavijayan Rajendran, Ozgur Sinanoglu, and Ramesh Karri  Exemplary systems, methods and computer-accessible mediums can secure split manufacturing of an integrated circuit by modifying a previous location of at least one pin to a further location of the at least one pin based on a fault analysis procedure. A determination of the further location can include...

Post

Optimal De-Anonymization in Random Graphs with Community Structure

Efe Onaran, Siddharth Garg, and Elza Erkip Anonymized social network graphs published for academic or advertisement purposes are subject to de-anonymization attacks by leveraging side information in the form of a second, public social network graph correlated with the anonymized graph. This is because the two are from the same underlying graph of true social...

Post

Adapting to Varying Distribution of Unknown Response Bits

Chandra K. H. Suresh, Ozgur Sinanoglu, and Sule Ozev In this article, we present several adaptive strategies to enable adaptive unknown bit masking for faster-than-at-speed testing so as to ensure no yield loss while attaining the maximum test quality based on tester memory constraints. We also develop a tester-enabled compression scheme that helps alleviate memory constraints...

Post

Providing a fast, remote security service using hashlists of approved web objects

Justin Cappos, Nasir Memon, Sai Teja Peddinti, and Keith Ross A security system and service, which improves the performance of SECaaS services, is described. A security server system tracks the content that has successfully passed through its security modules and distributes this information to the end user client devices as hashlist information. The remote client devices can...