Follow
Hadjer Benkraouda
Hadjer Benkraouda
Verified email at illinois.edu - Homepage
Title
Cited by
Cited by
Year
Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure
E Barka, CA Kerrache, H Benkraouda, K Shuaib, F Ahmad, F Kurugollu
Transactions on Emerging Telecommunications Technologies 33 (8), e3706, 2022
542022
Facehack: Triggering backdoored facial recognition systems using facial characteristics
E Sarkar, H Benkraouda, M Maniatakos
arXiv preprint arXiv:2006.11623, 2020
312020
{ICSFuzz}: Manipulating {I/Os} and repurposing binary code to enable instrumented fuzzing in {ICS} control applications
D Tychalas, H Benkraouda, M Maniatakos
30th USENIX Security Symposium (USENIX Security 21), 2847-2862, 2021
302021
I came, I saw, I hacked: Automated generation of process-independent attacks for industrial control systems
E Sarkar, H Benkraouda, M Maniatakos
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
142020
Snifu: Secure network interception for firmware updates in legacy plcs
H Benkraouda, MA Chakkantakath, A Keliris, M Maniatakos
2020 IEEE 38th VLSI Test Symposium (VTS), 1-6, 2020
142020
Facehack: Attacking facial recognition systems using malicious facial characteristics
E Sarkar, H Benkraouda, G Krishnan, H Gamil, M Maniatakos
IEEE Transactions on Biometrics, Behavior, and Identity Science 4 (3), 361-372, 2021
122021
Image reconstruction attacks on distributed machine learning models
H Benkraouda, K Nahrstedt
Proceedings of the 2nd ACM International Workshop on Distributed Machine …, 2021
52021
Everybody’s Got ML, Tell Me What Else You Have: Practitioners’ Perception of ML-Based Security Tools and Explanations
J Mink, H Benkraouda, L Yang, A Ciptadi, A Ahmadzadeh, D Votipka, ...
2023 IEEE Symposium on Security and Privacy (SP), 2068-2085, 2023
42023
Towards PLC-Specific Binary Analysis Tools: An Investigation of Codesys-Compiled PLC Software Applications
H Benkraouda, A Agrawal, D Tychalas, M Sazos, M Maniatakos
Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, 83-89, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–9