Follow
Kevin Fu
Kevin Fu
Professor, Northeastern University, ECE and Khoury College of Computer Sciences
Verified email at northeastern.edu - Homepage
Title
Cited by
Cited by
Year
Improved proxy re-encryption schemes with applications to secure distributed storage
G Ateniese, K Fu, M Green, S Hohenberger
ACM Transactions on Information and System Security (TISSEC) 9 (1), 1-30, 2006
21292006
Plutus: Scalable secure file sharing on untrusted storage
M Kallahalla, E Riedel, R Swaminathan, Q Wang, K Fu
2nd USENIX Conference on File and Storage Technologies (FAST 03), 2003
11592003
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
D Halperin, TS Heydt-Benjamin, B Ransford, SS Clark, B Defend, ...
2008 IEEE Symposium on Security and Privacy (sp 2008), 129-142, 2008
10962008
Power-up SRAM state as an identifying fingerprint and source of true random numbers
DE Holcomb, WP Burleson, K Fu
IEEE Transactions on Computers 58 (9), 1198-1210, 2008
10442008
Private memoirs of a smart meter
A Molina-Markham, P Shenoy, K Fu, E Cecchet, D Irwin
Proceedings of the 2nd ACM workshop on embedded sensing systems for energy …, 2010
6612010
Security and privacy for implantable medical devices
D Halperin, TS Heydt-Benjamin, K Fu, T Kohno, WH Maisel
IEEE pervasive computing 7 (1), 30-39, 2008
6182008
Adversarial sensor attack on lidar-based perception in autonomous driving
Y Cao, C Xiao, B Cyr, Y Zhou, W Park, S Rampazzi, QA Chen, K Fu, ...
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
5932019
Ghost talk: Mitigating EMI signal injection attacks against analog sensors
DF Kune, J Backes, SS Clark, D Kramer, M Reynolds, K Fu, Y Kim, W Xu
2013 IEEE Symposium on Security and Privacy, 145-159, 2013
5442013
Initial SRAM state as a fingerprint and source of true random numbers for RFID tags
DE Holcomb, WP Burleson, K Fu
Proceedings of the Conference on RFID Security 7 (2), 01, 2007
5022007
They can hear your heartbeats: Non-invasive security for implantable medical devices
S Gollakota, H Hassanieh, B Ransford, D Katabi, K Fu
Proceedings of the ACM SIGCOMM 2011 conference, 2-13, 2011
5012011
Mementos: System support for long-running computation on RFID-scale devices
B Ransford, J Sorber, K Fu
Proceedings of the sixteenth international conference on Architectural …, 2011
4832011
Fast and secure distributed read-only file system
K Fu, MF Kaashoek, D Mazieres
ACM Transactions on Computer Systems (TOCS) 20 (1), 1-24, 2002
4362002
WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks
T Trippel, O Weisse, W Xu, P Honeyman, K Fu
2017 IEEE European symposium on security and privacy (EuroS&P), 3-18, 2017
3542017
The dos and don'ts of client authentication on the web
K Fu, E Sit, K Smith, N Feamster
10th USENIX Security Symposium (USENIX Security 01), 2001
2692001
Light commands:{Laser-Based} audio injection attacks on {Voice-Controllable} systems
T Sugawara, B Cyr, S Rampazzi, D Genkin, K Fu
29th USENIX Security Symposium (USENIX Security 20), 2631-2648, 2020
2192020
Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security.
T Denning, K Fu, T Kohno
HotSec, 2008
2102008
{WattsUpDoc}: Power side channels to nonintrusively discover untargeted malware on embedded medical devices
SS Clark, B Ransford, A Rahmati, S Guineau, J Sorber, W Xu, K Fu
2013 USENIX Workshop on Health Information Technologies (HealthTech 13), 2013
1972013
Group sharing and random access in cryptographic storage file systems
KE Fu
Massachusetts Institute of Technology, 1999
1851999
Design challenges for secure implantable medical devices
W Burleson, SS Clark, B Ransford, K Fu
Proceedings of the 49th annual design automation conference, 12-17, 2012
1802012
Secure Software Updates: Disappointments and New Challenges.
A Bellissimo, J Burgess, K Fu
HotSec, 2006
1632006
The system can't perform the operation now. Try again later.
Articles 1–20