Recent Works
search all worksSorted by most recent date added to the index first, which may not be the same as publication date order.
2026 article
Preemption-Enhanced Benchmark Suite for FPGAs
Malik, A. A., Buchanan, J., & Aysu, A. (2026, January 1). IEEE Access.
2026 journal article
Correction: Multimedia-based cybersecurity and privacy professional development on educational technology for K-12 personnel
Educational Technology Research and Development.
2025 article
Precision Strike: Targeted Misclassification of Accelerated CNNs with a Single Clock Glitch
Malik, A. A., Aydin, F., & Aysu, A. (2025, October 14).
2025 article
Machine Learning-Aided Detection of DoS Attacks in Power Systems using Side-Channel Monitoring
Khatua, R., Aysu, A., & Chakrabortty, A. (2025, October 26).
2025 journal article
Multimedia-based cybersecurity and privacy professional development on educational technology for K-12 personnel
Educational Technology Research and Development.
2025 article
$$\textsf{Pri} \texttt {FHE}\textsf{te}$$: Achieving Full-Privacy in Account-Based Cryptocurrencies is Possible
Madathil, V., & Scafuro, A. (2025, December 7). Lecture Notes in Computer Science.
2025 article
Detecting Stealthy Web Bots: A Behavioral Analysis Framework for OpenWPM Automation
Rigan, M. M. H., & Das, A. (2025, January 1). IEEE Transactions on Dependable and Secure Computing.
2025 article
How to Recover a Cryptographic Secret From the Cloud
Adei, D., Orsini, C., Scafuro, A., & Verber, T. (2025, November 19).
2025 article
It Should Be Easy but... New Users' Experiences and Challenges with Secret Management Tools
Neil, L., Mungara, D., Williams, L., Acar, Y., & Reaves, B. (2025, November 19).
2025 article
Hardware-Enabled Mechanisms for Verifying Responsible AI Development
Aidan, O. G., Kulp, G., Hodgkins, W., Petrie, J., Immler, V., Aysu, A., … Srivastava, A. (2025, July 20). SuperIntelligence - Robotics - Safety & Alignment.
2025 article
Poster: Computer Security Researchers' Experiences with Vulnerability Disclosures
Ramulu, H. S., Rotthaler, A. L., Rossel, J., Rodriguez, R. G., Wermke, D., Fahl, S., … Acar, Y. (2025, November 19).
2025 article
Same Script, Different Behavior: Characterizing Divergent JavaScript Execution Across Different Device Platforms
Zafar, A., Su, J., Datta, S., Kapravelos, A., & Das, A. (2025, November 19).
2025 article
The Fellowship of the Leak: Power Analysis of a Masked FrodoKEM Hardware Accelerator
Schmid, M., Manzoni, G., Aysu, A., & Kavun, E. B. (2025, October 26).
2025 article
PUF-Augmented QR: Harnessing QR Code Background for Surface Authentication Via Physically Unclonable Features (PUFs)
Cornett, E., Raulston, W., Seuster, E., Stiff, H., Datta, P., & Wong, C.-W. (2025, August 6).
2025 conference paper
NTK-DFL: Enhancing decentralized federated learning in heterogeneous settings via neural tangent kernel
International Conference on Machine Learning.
2025 conference paper
PortLLM: Personalizing evolving large language models with training-free and portable model patches
International Conference on Learning Representations.
2025 conference paper
SCALE: Towards collaborative content analysis in social science with large language model agents and human intervention
Annual Meeting of the Association for Computational Linguistics.
2025 article
GateBleed: Exploiting On-Core Accelerator Power Gating for High Performance and Stealthy Attacks on AI
Kalyanapu, J., Dizani, F., Asher, D., Ghanbari, A., Cammarota, R., Aysu, A., & Ajorpaz, S. M. (2025, October 18).
2025 article
SoK: An empirical investigation of malware techniques in advanced persistent threat attacks
Rahman, M. R., Basak, S. K., Hezaveh, R. M., & Williams, L. (2025, August 9). Computers & Security.
2025 article
An Empirical Study on Reproducible Packaging in Open-Source Ecosystems
2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE).
2025 conference paper
Context Matters: Qualitative Insights into Developers’ Approaches and Challenges with Software Composition Analysis
Proceedings of the USENIX Security Symposium. https://www.usenix.org/system/files/usenixsecurity25-lin-elizabeth.pdf
Contributors: E. Lin, S. Gowda, W. Enck & D. Wermke
2025 article
SpecMPK: Efficient In-Process Isolation with Speculative and Secure Permission Update Instruction
Adak, D., Zhou, H., Rotenberg, E., & Awad, A. (2025, March 1). 2025 IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE, HPCA, pp. 394–408.
2025 article
Exploring multidimensional factors influencing teachers’ technology integration in K–12 education: A systematic review
Martin, F., Gezer, T., & Ceviker, E. (2025, August 4). Journal of Research on Technology in Education, Vol. 7.
2025 article
The affordances of Artificial Intelligence (AI) and ethical considerations across the instruction cycle: A systematic review of AI in online higher education
INTERNET AND HIGHER EDUCATION, Vol. 67.
2025 article
Digital distractions in education: a systematic review of research on causes, consequences and prevention strategies
Martin, F., Long, S., Haywood, K., & Xie, K. (2025, August 7). Educational Technology Research and Development, Vol. 8.