Follow
kiavash satvat
kiavash satvat
Verified email at uic.edu - Homepage
Title
Cited by
Cited by
Year
Extractor: Extracting attack behavior from threat reports
K Satvat, R Gjomemo, VN Venkatakrishnan
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 598-615, 2021
1072021
On the privacy of private browsing–a forensic approach
K Satvat, M Forshaw, F Hao, E Toreini
Journal of Information Security and Applications 19 (1), 88-100, 2014
732014
Do Social Disorders Facilitate Social Engineering? A Case Study of Autism and Phishing Attacks
A Neupane, K Satvat, N Saxena, D Stavrinos, HJ Bishop
Annual Computer Security Applications Conference (ACSAC), 2018
212018
Brain Hemorrhage: When Brainwaves Leak Sensitive Medical Conditions and Personal Information
A Neupane, K Satvat, M Hosseini, N Saxena
17th International Conference on Privacy, Security and Trust (PST), 2019
112019
Crashing Privacy: An Autopsy of a Web Browser’s Leaked Crash Reports
K Satvat, N Saxena
https://arxiv.org/pdf/1808.01718.pdf, 2018
92018
On the privacy of private browsing–a forensic approach, Data Privacy Management and Autonomous Spontaneous Security
K Satvat, M Forshaw, F Hao, E Toreini
Springer, 2014
62014
Catcha: When cats track your movements online
P Shrestha, N Saxena, A Neupane, K Satvat
Information Security Practice and Experience: 15th International Conference …, 2019
42019
CREPE: A Privacy-Enhanced Crash Reporting System
K Satvat, M Shirvanian, M Hosseini, N Saxena
ACM Conference on Data and Application Security and Privacy, 2020
32020
On The Privacy of Private Browsing-A Forensic Approach (short paper)
K Satvat, M Forshaw, F Hao, E Toreini
European Symposium on Research in Computer Security (ESORICS) 2013, 8th DPM …, 2014
32014
Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection
SK Ghosh, K Satvat, R Gjomemo, VN Venkatakrishnan
International Conference on Information Systems Security, 1-22, 2022
22022
Camouflaged with Size: A Case Study of Espionage Using Acquirable Single-Board Computers
K Satvat, M Hosseini, M Shirvanian
10th International Conference on Networks & Communications, 2018
22018
PASSAT: Single Password Authenticated Secret-Shared Intrusion-Tolerant Storage with Server Transparency
K Satvat, M Shirvanian, N Saxena
arXiv preprint arXiv:2102.13607, 2021
12021
TIPCE: A Longitudinal Threat Intelligence Platform Comprehensiveness Analysis
K Satvat, R Gjomemo, VN Venkatakrishnan
Proceedings of the Fourteenth ACM Conference on Data and Application …, 2024
2024
From Chaos to Clarity: Leveraging Cyber Threat Intelligence From Heterogeneous Sources
K Satvat
University of Illinois at Chicago, 2024
2024
PurgeMEM: Towards Building A Memory Safe Cloud
Y Karim, K Satvat, M Hosseini, R Hasan
2019 SoutheastCon, 1-8, 2019
2019
On the Privacy of Private Browsing-A Forensic Approach (vol 19, pg 88, 2017)
K Satvat, M Forshaw, F Hao, E Toreini
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 33, 66-66, 2017
2017
Erratum to “On the Privacy of Private Browsing–A Forensic Approach”[JISA 19/1 (2014), 88–100]
K Satvat, M Forshaw, F Hao, E Toreini
Journal of Information Security and Applications 100 (33), 66, 2017
2017
On the privacy of private browsing e A forensic approach
K Satvat, M Forshaw, F Hao, E Toreini
2021 IEEE European Symposium on Security and Privacy (EuroS&P)| 978-1-6654-1491-3/21/$31.00© 2021 IEEE| DOI: 10.1109/EUROSP51992. 2021.00060
F Abbasi, K Aberer, A Acar, G Ács, H Aghakhani, A Agrawal, ...
As any well-designed information security application uses a very large quantity of good pseudorandom numbers, inefficient generation of these numbers can be a significant …
K Satvat, M Forshaw, F Hao, E Toreini, WC Kuo, HJ Wei, JC Cheng
The system can't perform the operation now. Try again later.
Articles 1–20