scispace - formally typeset
C

Carsten Rudolph

Researcher at Monash University

Publications -  109
Citations -  1149

Carsten Rudolph is an academic researcher from Monash University. The author has contributed to research in topics: Computer security model & Security engineering. The author has an hindex of 18, co-authored 109 publications receiving 946 citations. Previous affiliations of Carsten Rudolph include Polytechnic University of Bari & Monash University, Clayton campus.

Papers
More filters
Journal ArticleDOI

Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models

TL;DR: In this article, the authors demonstrate a backdoor threat to transfer learning tasks on both image and time-series data leveraging the knowledge of publicly accessible Teacher models, aimed at defeating three commonly-adopted defenses: pruning-based, retraining-based and input pre-processing-based defenses.
Book ChapterDOI

Security evaluation of scenarios based on the TCG's TPM specification

TL;DR: A first methodic security analysis of a large part of the Trusted Platform Module TPM specification is presented, using a formal automata model based on asynchronous product automata APA and a finite state verification tool SHVT to emulate a TPM within an executable model.
Book ChapterDOI

Covert Identity Information in Direct Anonymous Attestation (DAA)

TL;DR: This paper shows that the main privacy goal of DAA can be violated by the inclusion of covert identity information, as the privacy attack is both efficient and very difficult to detect.
Journal ArticleDOI

On a formal framework for security properties

TL;DR: The classical concept of ''properties'' comprising safety and liveness properties is extended to include security properties, and formalisations of authenticity, different types of non-repudiation and confidentiality are presented within the framework.
Proceedings ArticleDOI

Can I Trust the Data I See?: A Physician's Concern on Medical Data in IoT Health Architectures

TL;DR: This study highlights the importance of integrated cross-layer security solutions that can deal with the heterogeneous security architectures of IoT healthcare system and identifies a possible solution for the open question raised in the security analysis with appropriate future research directions.