Follow
Soteris Demetriou
Soteris Demetriou
Assistant Professor, Imperial College London
Verified email at imperial.ac.uk - Homepage
Title
Cited by
Cited by
Year
What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources
S Demetriou, X Zhou, M Naveed, Y Lee, K Yuan, XF Wang, CA Gunter
NDSS, 2015
3422015
Identity, location, disease and more: Inferring your secrets from android public resources
X Zhou, S Demetriou, D He, M Naveed, X Pan, XF Wang, CA Gunter, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2222013
Free for All! Assessing User Data Exposure to Advertising Libraries on Android.
S Demetriou, W Merrill, W Yang, A Zhang, CA Gunter
NDSS, 2016
982016
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Bonding on Android.
M Naveed, X Zhou, S Demetriou, XF Wang, CA Gunter
NDSS, 2014
892014
Darknetz: towards model privacy at the edge using trusted execution environments
F Mo, AS Shamsabadi, K Katevas, S Demetriou, I Leontiadis, A Cavallaro, ...
Proceedings of the 18th International Conference on Mobile Systems …, 2020
612020
Understanding iot security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
612017
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps
S Demetriou, N Zhang, Y Lee, XF Wang, CA Gunter, X Zhou, M Grace
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
60*2017
Draco: A system for uniform and fine-grained access control for web code on android
GS Tuncay, S Demetriou, CA Gunter
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
462016
Resolving the predicament of android custom permissions
GS Tuncay, S Demetriou, K Ganju, C Gunter
NDSS, 2018
352018
Discovering the invisible city: Location-based games for learning in smart cities.
C Sintoris, N Yiannoutsou, S Demetriou, NM Avouris
IxD&A 16, 47-64, 2013
262013
Camforensics: Understanding visual privacy leaks in the wild
A Srivastava, P Jain, S Demetriou, LP Cox, KH Kim
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 1-13, 2017
132017
CoDrive: Improving Automobile Positioning via Collaborative Driving
S Demetriou, P Jain, KH Kim
IEEE International Conference on Computer Communications, 2018
112018
Shadow-catcher: Looking into shadows to detect ghost objects in autonomous vehicle 3d sensing
Z Hau, S Demetriou, L Munoz-González, EC Lupu
26th European Symposium on Research in Computer Security (ESORICS), 2021
10*2021
Layer-wise Characterization of Latent Information Leakage in Federated Learning
F Mo, A Borovykh, M Malekzadeh, H Haddadi, S Demetriou
arXiv preprint arXiv:2010.08762, 2020
102020
External resource control of mobile devices
X Wang, K Yuan, X Zhou, M Naveed, S Demetriou, C Gunter
US Patent 10,685,142, 2020
92020
Ghost installer in the shadow: Security analysis of app installation on android
Y Lee, T Li, N Zhang, S Demetriou, M Zha, XF Wang, K Chen, X Zhou, ...
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
72017
Object Removal Attacks on LiDAR-based 3D Object Detectors
Z Hau, KT Co, S Demetriou, EC Lupu
arXiv preprint arXiv:2102.03722, 2021
62021
Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception
C You, Z Hau, S Demetriou
Proceedings of the 1st Workshop on Security and Privacy for Mobile AI, 13-18, 2021
42021
Quantifying and Localizing Private Information Leakage from Neural Network Gradients
F Mo, A Borovykh, M Malekzadeh, H Haddadi, S Demetriou
arXiv preprint arXiv:2105.13929, 2021
3*2021
Identifying JavaScript skimmers on high-value websites
T Bower, S Maffeis, S Demetriou
Imperial College of Science, Technology and Medicine, Imperial College …, 2019
32019
The system can't perform the operation now. Try again later.
Articles 1–20