What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Sara Rampazzi
Google Scholar
13
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
Sound of Interference: Electromagnetic Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation.
Arifu Onishi
S. Hrushikesh Bhupathiraju
Rishikesh Bhatt
Sara Rampazzi
Takeshi Sugawara
2024
conf/sp
AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management.
Jennifer Sheldon
Weidong Zhu
Adnan Abdullah
Sri Hrushikesh Varma Bhupathiraju
Takeshi Sugawara
Kevin R. B. Butler
Md Jahidul Islam
Sara Rampazzi
2024
conf/eurosp
PASA: Attack Agnostic Unsupervised Adversarial Detection Using Prediction & Attribution Sensitivity Analysis.
Dipkamal Bhusal
Md Tanvirul Alam
Monish Kumar Manikya Veerabhadran
Michael Clifford
Sara Rampazzi
Nidhi Rastogi
2024
conf/ndss
Invisible Reflections: Leveraging Infrared Laser Reflections to Target Traffic Sign Perception.
Takami Sato
Sri Hrushikesh Varma Bhupathiraju
Michael Clifford
Takeshi Sugawara
Qi Alfred Chen
Sara Rampazzi
2023
conf/uss
You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks.
Yulong Cao
S. Hrushikesh Bhupathiraju
Pirouz Naghavi
Takeshi Sugawara
Z. Morley Mao
Sara Rampazzi
2023
conf/uss
Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks on Unconstrained Keyboard Inputs.
Yazhou Tu
Liqun Shan
Md. Imran Hossen
Sara Rampazzi
Kevin R. B. Butler
Xiali Hei
2023
conf/sp
Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses.
Yan Long
Pirouz Naghavi
Blas Kojusner
Kevin R. B. Butler
Sara Rampazzi
Kevin Fu
2023
conf/wisec
EMI-LiDAR: Uncovering Vulnerabilities of LiDAR Sensors in Autonomous Driving Setting using Electromagnetic Interference.
Sri Hrushikesh Varma Bhupathiraju
Jennifer Sheldon
Luke A. Bauer
Vincent Bindschaedler
Takeshi Sugawara
Sara Rampazzi
2022
journals/popets
Analyzing the Monetization Ecosystem of Stalkerware.
Cassidy Gibson
Vanessa Frost
Katie Platt
Washington Garcia
Luis Vargas
Sara Rampazzi
Vincent Bindschaedler
Patrick Traynor
Kevin R. B. Butler
2020
conf/uss
Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems.
Takeshi Sugawara
Benjamin Cyr
Sara Rampazzi
Daniel Genkin
Kevin Fu
2019
conf/ccs
Trick or Heat?: Manipulating Critical Temperature-Based Control Systems Using Rectification Attacks.
Yazhou Tu
Sara Rampazzi
Bin Hao
Angel Rodriguez
Kevin Fu
Xiali Hei
2019
conf/ccs
Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving.
Yulong Cao
Chaowei Xiao
Benjamin Cyr
Yimeng Zhou
Won Park
Sara Rampazzi
Qi Alfred Chen
Kevin Fu
Z. Morley Mao
2018
conf/sp
Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems.
Connor Bolton
Sara Rampazzi
Chaohao Li
Andrew Kwong
Wenyuan Xu
Kevin Fu
Coauthors
Adnan Abdullah
(1)
Andrew Kwong
(1)
Angel Rodriguez
(1)
Arifu Onishi
(1)
Benjamin Cyr
(2)
Bin Hao
(1)
Blas Kojusner
(1)
Cassidy Gibson
(1)
Chaohao Li
(1)
Chaowei Xiao
(1)
Connor Bolton
(1)
Daniel Genkin
(1)
Dipkamal Bhusal
(1)
Jennifer Sheldon
(2)
Katie Platt
(1)
Kevin Fu
(5)
Kevin R. B. Butler
(4)
Liqun Shan
(1)
Luis Vargas
(1)
Luke A. Bauer
(1)
Md Jahidul Islam
(1)
Md Tanvirul Alam
(1)
Md. Imran Hossen
(1)
Michael Clifford
(2)
Monish Kumar Manikya Veerabhadran
(1)
Nidhi Rastogi
(1)
Patrick Traynor
(1)
Pirouz Naghavi
(2)
Qi Alfred Chen
(2)
Rishikesh Bhatt
(1)
S. Hrushikesh Bhupathiraju
(2)
Sara Rampazzi
(13)
Sri Hrushikesh Varma Bhupathiraju
(3)
Takami Sato
(1)
Takeshi Sugawara
(6)
Vanessa Frost
(1)
Vincent Bindschaedler
(2)
Washington Garcia
(1)
Weidong Zhu
(1)
Wenyuan Xu
(1)
Won Park
(1)
Xiali Hei
(2)
Yan Long
(1)
Yazhou Tu
(2)
Yimeng Zhou
(1)
Yulong Cao
(2)
Z. Morley Mao
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to