scispace - formally typeset
N

Nadarajah Asokan

Researcher at University of Waterloo

Publications -  329
Citations -  14076

Nadarajah Asokan is an academic researcher from University of Waterloo. The author has contributed to research in topics: Authentication & Mobile device. The author has an hindex of 58, co-authored 327 publications receiving 11947 citations. Previous affiliations of Nadarajah Asokan include Helsinki University of Technology & Syracuse University.

Papers
More filters
Book ChapterDOI

Smart and Secure Cross-Device Apps for the Internet of Advanced Things

TL;DR: Today, cross-device communication and intelligent resource sharing among smart devices is limited and inflexible: Typically devices cooperate using fixed interfaces provided by custom-built applications, which users need to install manually.
Book ChapterDOI

Practical property-based attestation on mobile devices

TL;DR: This work presents a novel attestation scheme that bootstraps from existing application certification infrastructures available on mobile device platforms, and thus avoids the need to setup and maintain a new service that provides translation from software measurements to properties, and consequently makes realization of property-based attestation economically feasible.
Proceedings ArticleDOI

I Know Where You are: Proofs of Presence Resilient to Malicious Provers

TL;DR: Two complementary approaches for making context-based PoPs resilient to malicious provers are proposed: one approach focuses on surprisal filtering based on estimating the entropy of particular PoPs in order to detect context measurements vulnerable to such attacks, and the other is based on utilizing longitudinal observations of ambient modalities like noise level and ambient luminosity.
Posted Content

WAFFLE: Watermarking in Federated Learning

TL;DR: WAFFLE is presented, the first approach to watermark DNN models trained using federated learning, which efficiently embeds a resilient watermark into models incurring only negligible degradation in test accuracy, and does not require access to training data.
Posted Content

Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks

TL;DR: Zhang et al. as mentioned in this paper investigated a prominent zero-effort deauthentication scheme, called ZEBRA, which provides an interesting and a useful solution to a difficult problem as demonstrated in the original paper and identified a subtle incorrect assumption in its adversary model that leads to a fundamental design flaw.