If you made any changes in Pure, your changes will be visible here soon.

Personal profile

External positions

Computing

Informatics and Decision Systems Engineering

School of (CIDSE)

Fingerprint Dive into the research topics where Adam Doupe is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 16 Similar Profiles
Access control Engineering & Materials Science
Application programs Engineering & Materials Science
Ecosystems Engineering & Materials Science
Digital storage Engineering & Materials Science
Electronic mail Engineering & Materials Science
Websites Engineering & Materials Science
Visibility Engineering & Materials Science
Students Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2010 2019

  • 373 Citations
  • 11 h-Index
  • 32 Conference contribution
  • 2 Paper
  • 1 Chapter
  • 1 Article

ICORe: Continuous and proactive extrospection on multi-core IoT devices

Zhang, P., Cho, H., Zhao, Z., Doupe, A. & Ahn, G-J., Jan 1 2019, p. 851-860. 10 p.

Research output: Contribution to conferencePaper

Monitoring
Visibility
Data storage equipment
Degradation
Internet of things

Understanding and detecting private interactions in underground forums

Sun, Z., Rubio-Medrano, C. E., Zhao, Z., Bao, T., Doupe, A. & Ahn, G-J., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 303-314 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Learning systems
Detectors

AIM-SDN: Aacking information mismanagement in SDN-datastores

Dixit, V. H., Doupe, A., Shoshitaishvili, Y., Zhao, Z. & Ahn, G-J., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 664-676 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network management
Critical infrastructures
Controllers
Cloud computing
Information management

CacheLight: Defeating the cachekit attack

Gutierrez, M., Zhao, Z., Doupe, A., Shoshitaishvili, Y. & Ahn, G-J., Oct 15 2018, ASHES 2018 - Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2018. Association for Computing Machinery, p. 65-74 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Inspection
Hardware
Malware
Hardware security

Challenges, opportunities and a framework for web environment forensics

Mabey, M., Doupe, A., Zhao, Z. & Ahn, G-J., Jan 1 2018, Advances in Digital Forensics XIV - 14th IFIP WG 11.9 International Conference, 2018. Peterson, G. & Shenoi, S. (eds.). Springer New York LLC, p. 11-33 23 p. (IFIP Advances in Information and Communication Technology; vol. 532).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

World Wide Web
Digital forensics

Projects 2015 2024