Funded by the NSF Secure and Trustworthy Computing program
David Slotwiner, Thomas Deering, Kevin Fu, Andrea Russo, Mary Walsh, and George Van Hare. Cybersecurity vulnerabilities of cardiac implantable electronic devices: Communication strategies for clinicians. Proceedings of the Heart Rhythm Society’s Leadership Summit, Heart Rhythm Journal, Volume 15, Issue 7, Pages e61–e67, July 2018. DOI 10.1016/j.hrthm.2018.05.001.
Lanier Watkins, Shreya Aggarwal, Omotola Akeredolu. William H. Robinson and Aviel D. Rubin. Tattle Tail Security: An Intrusion Detection System for Medical Body Area Networks. Workshop on Decentralized IoT Systems and Security (DISS February 2019). (pdf)
Choi, Sung J and M Eric Johnson. Understanding the Relationship Between Data Breaches and Hospital Advertising Expenditures. In American Journal of Managed Care, 2019, Vol. 25, No. 1, 14-20. (Abstract)
Timothy J. Pierson, Travis Peters, Ronald Peterson, and David Kotz. Proximity Detection with Single-Antenna IoT Devices. In Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom), October 2019. ACM Press. Accepted for publication. DOI 10.1145/3300061.3300120. (Abstract)
Aston Zhang, Xun Lu, Carl A. Gunter, Shuochao Yao, Fangbo Tao, Rongda Zhu, Huan Gui, Daniel Fabbri, David Liebovitz, and Bradley Malin. De Facto Diagnosis Specialties: Recognition and Discovery. Learning Health Systems, 2018:e10057, 2018. DOI: 10.1002/lrh2.10057
Shubhra Kanti, Karmaker Santu, Vincent Bindschadler, ChengXiang Zhai, and Carl A. Gunter. NRF: A Naive Re-identification Framework. ACM Workshop on Privacy in an Electronic Society (WPES ’18), Toronto, Canada, October 2018. DOI: 10.1145/3267323.3268948
Karan Ganju, Qi Wang, Wei Yang, Carl A. Gunter, and Nikita Borisov. Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations. ACM Computer and Communications Security (CCS ’18), Toronto Canada, October 2018. DOI: 10.1145/3243734.3243834
Juhee Kwon and M. Eric Johnson. Meaningful healthcare security: Does “meaningful-use” attestation improve information security performance?MIS Quarterly, Vol. 42, No. 4 (December), 1043-1067, 2018. DOI: 10.25300/MISQ/2018/13580
A.J. Burns and Eric Johnson. The Evolving Threat to Privacy: Analyzing Breach Data to Understand the Cyberthreat Vector.IEEE Professional, Vol. 20, No. 3 (May-June), 64-72, 2018. DOI: 10.1109/MITP.2018.032501749
Sougata Sen, Archan Misra, Vigneshwaran Subbaraju, Karan Grover, Meera Radhakrishnan, Rajesh K. Balan, and Youngki Lee. I4S: Capturing Shopper’s In-store Interactions. In Proceedings of the International Symposium on Wearable Computers (ISWC), October 2018. ACM Press. DOI 10.1145/3267242.3267259.
Timothy J. Pierson, Travis Peters, Ronald Peterson, and David Kotz. Poster: Proximity Detection with Single-Antenna IoT Devices. In International Conference on Mobile Computing and Networking (MobiCom), pages 663-665, October 2018. ACM Press. Best poster award. DOI 10.1145/3241539.3267751.
Shrirang Mare, Reza Rawassizadeh, Ronald Peterson, and David Kotz. SAW: Wristband-based authentication for desktop computers. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) (Ubicomp), 2(3), September 2018. DOI 10.1145/3264935.
Rui Liu, Cory Cornelius, Reza Rawassizadeh, Ron Peterson, and David Kotz. Vocal Resonance: Using Internal Body Voice for Wearable Authentication. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) (UbiComp), 2(1), March 2018. DOI 10.1145/3191751.
Kwong, Andrew, Xu, Wenyuan, and Fu, Kevin. Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone.Proceedings of the 40th Annual IEEE Symposium on Security and Privacy, May 2019.
Slotwiner, David J., Deering, F., Fu, Kevin, Russo, Andrea M., Walsh, Mary N., and Van Hare, George F. Cybersecurity vulnerabilities of cardiac implantable electronic devices: Communication strategies for cliniciansHeart Rhythm, June 2018 PDF
Andres D. Molina-Markham, Shrirang Mare, Ronald Peterson, Jr., and David Kotz. Continuous seamless mobile device authentication using a separate electronic wearable apparatus.U.S. Patent 9,961,547, May 2018. PDF
Bolton, Connor, Rampazzi, Sara, Li, Chaohao, Kwong, Andrew, Xu, Wenyuan, and Fu, Kevin. Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems.Proceedings of the 39th Annual IEEE Symposium on Security and Privacy, May 2018.
Soteris Demetriou. Analyzing & Designing the Security of Shared Resources on Smartphone Operating systems. Doctoral Thesis, University of Illinois at Urbana-Champaign, May 2018.PDF
Karan Ganju. Inferring Properties of Neural Networks with Intelligent Designs. Master of Science Thesis, University of Illinois at Urbana-Champaign, May 2018.PDF
Aston Zhang, Xun Lu, Carl A. Gunter, Shuochao Yao, Fangbo Tao, Rongda Zhu, Huan Gui, Daniel Fabbri, David Liebovitz, and Bradley Malin. De facto diagnosis specialties: Recognition and discovery.
Learning Health Systems, 2018:e10057, 2018.PDF
Wei Yang. Adversarial-Resilience Assurance for Mobile Security Systems.Doctoral Thesis, University of Illinois at Urbana-Champaign, May 2018.PDF
Soteris Demetriou, Nathaniel D. Kaufman, Jonah Baim, Adam J. Goldsher and Carl A. Gunter. Toward an Extensible Framework for Redaction.Workshop on Security and Privacy for the Internet-of-Things (IoTSec), Orlando, FL, April 2018.PDF
Qi Wang, Wajih Ul Hassan, Adam Bates, and Carl A. Gunter. Fear and Logging in the Internet of Things.ISOC Network and Distributed System Symposium (NDSS ’18), San Diego, CA, February 2018.PDF
Guliz Seray Tuncay, Soteris Demetriou, Karan Ganju, and Carl A. Gunter. Resolving the Predicament of Android Custom Permissions. ISOC Network and Distributed System Security (NDSS ’18), San Diego, CA, February 2018. (Distinguished Paper Award)PDF
Yunhui Long, Vincent Bindschaedler, and Carl A. Gunter. Towards Measuring Membership Privacy. arXiv:1712.09136 [cs.CR], December 2017.PDF
Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, and Carl A. Gunter. Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX.
ACM Computer and Communications Security (CCS ’17), October, 2017.PDF
Vincent Bindschaedler, Reza Shokri, Carl A. Gunter. Plausible Deniability for Privacy-Preserving Data Synthesis. VLDB Endowment International Conference on Very Large Data Bases (VLDB ’17), Munich, Germany, August 28, 2017.PDF
Soteris Demetriou, Nan Zhang, Yeonjoon Lee, XiaoFeng Wang, Carl A. Gunter, Xiaoyong Zhou, and Michael Grace. HanGuard: SDN-driven Protection of Smart Home WiFi Devices from Malicious Mobile Apps. ACM Conference Security and Wireless and Mobile Networks (WiSec ’17), Boston, MA, July 2017.PDF
Aston Zhang. Analyzing Intentions from Big Data Traces of Human Activities. Doctoral Thesis, University of Illinois at Urbana-Champaign, May 2017.PDF
Reza Rawassizadeh, Chelsea Dobbins, Manouchehr Nourizadeh, Zahra Ghamchili, Michael Pazzani.A natural language query interface for searching personal information on smartwatches. IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2017. DOI: 10.1109/PERCOMW.2017.7917645
Timothy J. Pierson. Secure short-range communications. Dartmouth Computer Science Technical Report TR2018-845, May 2018. PDF
Rui Liu, Cory Cornelius, Reza Rawassizadeh, Ron Peterson, and David Kotz. Vocal Resonance: Using Internal Body Voice for Wearable Authentication.Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) (UbiComp), March 2018. DOI 10.1145/3191751.
Chen Yan, Kevin Fu, and Wenyuan Xu. On Cuba, Diplomats, Ultrasound, and Intermodulation Distortion. University of Michigan Tech Report CSE-TR-001-18, March 2018.PDF
Shrirang Mare, Andrés Molina-Markham, Ronald Peterson, and David Kotz. System, Method and Authorization Device for Biometric Access Control to Digital Devices. U.S. Patent 9,832,206, November 2017.PDF
Joseph Carrigan, David Kotz, Aviel Rubin. STEM Outreach Activity with Fitbit Wearable Devices.Dartmouth Computer Science Technical Report TR2018-839, February 2018. PDF
Kevin Fu, Wenyuan Xu. Inside Risks: Risks of Trusting the Physics of Sensors. Communications of the ACM 61(2), February 2018. PDF
Paul D. Martin,David Russel, Malek Ben Salem, Stephen Checkoway, Avi Rubin. Sentinel: Secure Mode Profiling and Enforcement for Embedded Systems. In The ACM/IEEE International Conference on Internet-of-Things Design and Implementation (IoTDI), 2018.
Tuo Yu, Haiming Jin, Klara Nahrstedt. Audio based Handwriting Input for Tiny Mobile Devices. In IEEE 1st International Conference on Multimedia Information Processing and Retrieval (MIPR), 2018.
Tarek Elgamal, Bo Chen, Klara Nahrstedt. Teleconsultant: Communication and Analysis of Wearable Videos in Emergency Medical Environments. in The 25th ACM Multimedia, Mountain View, CA USA. October 2017.PDF
Haiming Jin, Lu Su, Klara Nahrstedt. Theseus: Incentivizing Truth Discovery in Mobile Crowd Sensing Systems in 18th ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2017), Chennai, India.
Kramer DB, Fu K. Cybersecurity Concerns and Medical DevicesLessons From a Pacemaker Advisory. In JAMA. Published online October 18, 2017. doi:10.1001/jama.2017.15692
Choi, Sung and M. Eric Johnson. Do Hospital Data Breaches Reduce Patient Care Quality?. In Proceedings of the Fourteenth Workshop on the Economics of Information Security, San Diego, CA, June 26-27 2017. PDF
Gabriel Kaptchuk, Matthew D. Green and Aviel D. Rubin. Outsourcing Medical Dataset Analysis: A Possible Solution. In Financial Cryptography Conference April 2017.
Dufendach KR, Koch S, Unertl KM, Lehmann CU. A Randomized Trial Comparing Classical Participatory Design to VandAID, an Interactive CrowdSourcing Platform to Facilitate User-Centered Design. In Methods Inf Med. 2017 Apr 28. DOI 10.3414/ME16-01-0098. PubMed PMID: 28451689.
Meystre SM, Lovis C, Bürkle T, Tognola G, Budrionis A, Lehmann CU. Clinical Data Reuse or Secondary Use: Current Status and Potential Future Progress. In Yearb Med Inform. 2017 May 8;26(1). DOI 10.15265/IY-2017-007. PubMed PMID: 28480475.
Haux R, Geissbuhler A, Holmes J, Jaulent MC, Koch S, Kulikowski CA, Lehmann CU, McCray AT, Séroussi B, Soualmia LF, van Bemmel JH. On Contributing to the Progress of Medical Informatics as Publisher. In Yearb Med Inform. 2017 May 8;26(1). DOI 10.15265/IY-2017-003. PubMed PMID: 28480470.
Rinke ML, Singh H, Heo M, Adelman JS, O’Donnell HC, Choi SJ, Norton A, Stein REK, Brady TM,Lehmann CU, Kairys SW, Rice-Conboy E, Thiessen K, Bundy DG. Diagnostic Errors in Primary Care Pediatrics: Project RedDE. In Acad Pediatr. 2017 Aug 10. pii: S1876-2859(17)30463-1. DOI 10.1016/j.acap.2017.08.005. PubMed PMID: 28804050.
Poikonen J, Fotsch E, Lehmann CU.Who Watches the Watchers: Working Towards Safety for Clinical Decision Support Knowledge Resources. In Appl Clin Inform. 2017 Sep 13;8(3):945-948. DOI 10.4338/ACI-2017050081. PubMed PMID: 28905980.
Lehmann CU, Park HA, Shortliffe EH, Degoulet P.The International Academy of Health Sciences Informatics: An Academy of Excellence. In Yearb Med Inform. 2017 May 8;26(1), 7-8. DOI 10.15265/IY-2017-003. PubMed PMID: 28480470.
Aarathi Prasad and David Kotz. ENACT: Encounter-based Architecture for Contact Tracing. In ACM Workshop on Physical Analytics (WPA), pages 37-42, June 2017. ACM Press. DOI 10.1145/3092305.3092310.
Rui Liu, Reza Rawassizadeh, and David Kotz. Toward Accurate and Efficient Feature Selection for Speaker Recognition on Wearables. InProceedings of the ACM Workshop on Wearable Systems and Applications (WearSys), pages 41-46, 2017. ACM Press. DOI 10.1145/3089351.3089352.
Rui Liu, Cory Cornelius, Reza Rawassizadeh, Ron Peterson, and David Kotz. Poster: Vocal Resonance as a Passive Biometric. In Proceedings of the ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 160, 2017. ACM Press. DOI 10.1145/3081333.3089304.
Xiaohui Liang and David Kotz. AuthoRing: Wearable User-presence Authentication. In Proceedings of the ACM Workshop on Wearable Systems and Applications (WearSys), pages 5-10, 2017. ACM Press. DOI 10.1145/3089351.3089357.
Xiaohui Liang, Tianlong Yun, Ronald Peterson, and David Kotz. LightTouch: Securely Connecting Wearables to Ambient Displays with User Intent. In IEEE International Conference on Computer Communications (INFOCOM), May 2017.
Fu Kevin, Thimbleby Harold. Ransomware: How we can climb out of this mess.Healthcare IT News, Jun 5 2017.(2017 Article)
Travis W. Peters. A Survey of Trustworthy Computing on Mobile & Wearable Systems.Dartmouth Computer Science Technical Report TR2017-823, May 2017.(2017 Report)
Meystre SM, Lovis C, Bürkle T, Tognola G, Budrionis A, Lehmann CU. Clinical Data Reuse or Secondary Use: Current Status and Potential Future Progress.Med Inform. May 2017.(Med Inform 2017 Paper)
Lehmann CU, Kressly S, Hart WW, Johnson KB, Frisse ME. Barriers to Pediatric Health Information Exchange.Pediatrics 2017.(Pediatrics 2017 Paper)
Tsou AY, Lehmann CU, Michel J, Solomon R, Possanza L, Gandhi T. Safe Practices for Copy and Paste in the EHR. Systematic Review, Recommendations, and Novel Model for Health IT Collaboration.Appl Clin Inform. January 2017.(Appl Clin Inform 2017 Paper)
Trippel, Timothy, Weisse, Ofir, Xu, Wenyuan, Honeyman, Peter, and Fu, Kevin. WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks.Proceedings of the 2nd Annual IEEE European Symposium on Security and Privacy, April 2017.(EURO S&P 2017 Paper)
Haiming Jin, Lu Su, Klara Nahrstedt. CENTURION: Incentivizing Multi-Requester Mobile Crowd Sensing.The IEEE International Conference on Computer Communications 2017.(INFOCOM 2017 Paper)
Sayed Hadi Hashemi, Faraz Faghri, Paul Rausch, Roy H Campbell. World of Empowered IoT Users. 2016 IEEE First International Conference on Internet-of-Things Design and Implementation April, 2016. (IoTDI 2016 paper)
Guliz Seray Tuncay, Soteris Demetriou, Carl A. Gunter. Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android. ACM Computer and Communications Security (CCS ’16) October, 2016. (CCS ’16 paper)
A.J. Burns, Eric Johnson and Peter Honeyman. A brief chronology of medical device security.Communications of the ACM. October 2016. (CACM [paper and video]).
Paul Martin, Michael Rushanan, Thomas Tantillo, Christoph Lehmann and Aviel Rubin. Applications of Secure Location Sensing in Healthcare.Proceedings of the 7th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics, October 2016.
Kevin Fu, John Halamka, Jack Kufahl, and Mary Logan. Hospitals need better cybersecurity, not more fear (commentary).Modern Healthcare. September 2016. [Modern Healthcare]
Tuo Yu, Haiming Jin, Klara Nahrstedt. WritingHacker: Audio-based Eavesdropping of Handwriting via Mobile Devices.2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2016), Heidelberg, Germany. September 2016. [UbiComp 2016]
AG Fiks, N duRivage, SL Mayne, S Finch, ME Ross, K Giacomini, A Suh, B McCarn, E Brandt, D Karavite, EW Staton, L Shone, V McGoldrick, K Noon, D Miller, CU Lehmann, WD Pace, RW Grundmeier. Adoption of a Portal for the Primary Care Management of Pediatric Asthma: A Mixed Methods Implementation Study.Journal of Medical Internet Research. [Journal of Medical Internet Research]
Haiming Jin, Lu Su, Houping Xiao, Klara Nahrstedt. INCEPTION: Incentivizing Privacy-Preserving Data Aggregation for Mobile Crowd Sensing Systems.The 17th ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2016). Paderborn, Germany. July 2016. [pdf]
David Kotz, Carl A. Gunter, Santosh Kumar, Jonathan P. Weiner, Privacy and Security in Mobile Health: A Research Agenda, Computer, June 2016. [IEEE link]
David Kotz. Security and Privacy: Mobile Medical Applications. The 1st ACM MobiSys Workshop on Mobile Data (MOBIDATA 2016).Singapore. June 2016. [keynote]
Timothy Pierson, Xiaohui Liang, Ronald Peterson and David Kotz . Demo: Wanda, Securely Introducing Mobile Devices. MobiSys 2016. Singapore. June 2016. [conference]
Haiming Jin, Lu Su, Bolin Ding, Klara Nahrstedt, Nikita Borisov. Enabling Privacy-Preserving Incentives for Mobile Crowd Sensing Systems. The 36th IEEE International Conference on Distributed Computing Systems(ICDCS 2016). Nara, Japan. June 2016. [pdf]
CU Lehmann, MC Jaulent, B Séroussi. Silver Anniversary: 25 Editions of the IMIA Yearbook. Yearb Med Inform. 2016 May 20;25(Suppl. 1). [Epub ahead of print].
Aarathi Prasad. Privacy-preserving Controls for Sharing mHealth Data. Ph.D. Thesis, Dartmouth College Computer Science. Available as Dartmouth Computer Science Technical Report TR2016-794. May, 2016. [CS Department]
Shrirang Mare. Seamless Authentication for Ubiquitous Devices. Ph.D. Thesis, Dartmouth College Computer Science. Available as Dartmouth Computer Science Technical Report TR2016-793. May, 2016. [CS Department]
Timothy J. Pierson, Xiaohui Liang, Ronald Peterson, and David Kotz. Wanda: securely introducing mobile devices. IEEE International Conference on Computer Communications (INFOCOM). April 2016. [IEEE – published version]
JA George, PS Park, J Hunsberger, JE Shay, CU Lehmann, ED White, BH Lee, M Yaster. An Analysis of 34,218 Pediatric Outpatient Controlled Substance Prescriptions.Anesthesia & Analgesia. March 2016. [Anesthesia & Analgesia TOC]
Bingyue Wang. Learning Device Usage in Context: A Continuous and Hierarchical Smartphone Authentication Scheme. Dartmouth Computer Science Technical Report TR2016-790 (Senior Honors Thesis), March 2016. (CS Department)
Joseph Carrigan, Paul D. Martin and Michael Rushanan. KBID: Kerberos Bracelet Identification. Financial Cryptography and Data Security 2016. Christ Church, Barbados. February 2016. [Paper from Proceedings]
Soteris Demetriou. Free for All! Assessing User Data Exposure to Advertising Libraries on Android, Network and Distributed System Security (NDSS) Symposium [Poster],San Diego, CA, February 2016 [poster].
J Kannry, P Sengstack, TP Thyvalikakath, Poikonen J, Middleton B, Payne T, Lehmann CU. The Chief Clinical Informatics Officer (CCIO). AMIA Task Force Report on CCIO Knowledge, Education, and Skillset Requirements.Applied Clinical Informatics. 2016; 7(1). [ACI TOC]
H Silverman, CU Lehmann, B Munger. Milestones: Critical Elements in Clinical Informatics Fellowship Programs.Applied Clinical Informatics. 2016 7(1). [ACI TOC]
MW Temple MW, CU Lehmann, D Fabbri. Natural Language Processing for Cohort Discovery in a Discharge Prediction Model for the Neonatal ICU. Applied Clinical Informatics. 2016 7(1). [ACI TOC]
KR Dufendach, CU Lehmann. Topics in Neonatal Informatics: Essential Functionalities of the Neonatal Electronic Health Record.NeoReviews, 2015 Dec 1. 16(12).
Juhee Kwon and M. Eric Johnson. Do Patients Care about Data Breaches?Workshop on Information Systems and Economics. Dallas, TX. December 2015 [Program link]
Abhishek Bafna and Jenna Wiens. Learning Useful Abstractions from the Web.Symposium of the American Medical Informatics Association. San Francisco, CA. November 2015
Abhishek Bafna and Jenna Wiens. Automated Feature Learning: Mining Unstructured Data for Useful Abstractions.IEEE International Conference on Data Mining. Atlantic City, NJ. November 2015 [pdf].
Eric Johnson and Juhee Kwon. Patient Reaction to Healthcare Data Breaches.Informs Annual Conference. Philadelphia, PA. November 2015 [Poster Only]
M. Eric Johnson. Healthcare in the Age of Analytics. INFORMS Editors Cut, INFORMS. Catonsville, MD. October 2015 [INFORMS]
AJ Burns, Jacob Young, Tom L. Roberts, James F. Courtney and T. Selwyn Ellis. Exploring the Role of Contextual Integrity in Electronic Medical Record (EMR) System Workaround Decisions: An Information Security and Privacy Perspective.Association for Informatic Systems Transactions on Human-Computer Interactions. September 2015 [Paper]
Juhee Kwon and M. Eric Johnson. Protecting Patient Data-The Economic Perspective of Healthcare Security.IEEE Security and Privacy. September-October 2015 [IEEE Security and Privacy]
Sai Gouravajhala, Sree Vadrevu, Matthew Hicks, Jenna Wiens and Kevin Fu. An LED Blink is Worth a Thousand Packets: Inferring a Networked Device’s Activity from its LED Blinks.USENIX Summit on Information Technologies for Health. Washington, DC. August 2015
Devendra Goyal, Zeeshan Syed and Jenna Wiens. Predicting Disease Progression in Alzheimer’s Disease.The Meaningful Use of Complex Medical Data Symposium. Los Angeles, CA. August 2015
David Kotz, Kevin Fu, Carl Gunter and Avi Rubin. Security for Mobile and Cloud Frontiers in Healthcare. Communications of the ACM. August 2015 [CACM]
Muhammad Naveed, Erman Ayday, Ellen W. Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, and XiaoFeng Wang. Privacy in the Genomic Era.ACM Computing Surveys, August 2015
Haiming Jin, Lu Su, Danyang Chen, Klara Nahrstedt and Jinhui Xu. Quality of Information Aware Incentive Mechanisms for Mobile Crowd Sensing Systems. The 16th ACM Symposium on Mobile Ad Hoc Networking and Computing(ACM MobiHoc 2015). Hangzhou, China, June 2015
Juhee Kwon and Eric Johnson. The Market Effect of Healthcare Security: Do Patients Care about Data Breaches?Workshop of the Economics of Information Security, Delft University of Technology, Netherlands. June 2015 [pdf]
Ting-yu Wang, Haiming Jin, and Klara Nahrstedt, mAuditor: Mobile Auditing Framework for mHealth Applications. The 5th ACM MobiHoc Workshop on Pervasive Wireless Healthcare (MobileHealth 2015), Hangzhou, China, June 2015
Tom Haigh and Carl Landwehr. Building Code for Medical Device Software Security.IEEE Cybersecurity Initiative. May 2015 [IEEE Cyber Security]
Kwon, Juhee and M. Eric Johnson. Meaningful Information Security.Production and Operations Managment Society 26th Annual Conference. Washington, DC. May 2015 [Presentation only. [abstract -search for Kwon]]
You Chen, Joydeep Ghosh, Cosmin Adrian Bejan, Carl A. Gunter, Siddharth Gupta, Abel Kho, David Liebovitz, Jimeng Sun, Joshua Denny, and Bradley Malin. Building Bridges Across Electronic Health Record Systems Through Inferred Phenotypic Topics. Journal of Biomedical Informatics,. March 2015 Appendix. [pdf]
J.B. Jones, J.P. Weiner, N.R. Shah, W. F. Stewart. The Wired Patient: Patterns of Electronic Patient Portal Use Among Patients With Cardiac Disease or Diabetes. Journal of Medical Internet Research. February 2015 [JMIR]
Soteris Demetriou, Xiaoyong Zhou, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang, and Carl A Gunter. What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. Network and Distributed System Security Symposium, February 2015 [NDSS]
Carl Landwehr. We Need a Building Code for Building Code. Communications of the ACM. February 2015 [ACM]
A.J. Burns and M. Eric Johnson. Securing Health Information. IEEE IT Professional. Jan/Feb 2015 [IEEE IT Professional]
Carl Landwehr. Workshop to Develop a Building Code and Research Agenda For Medical Device Software Security (Final Report). January 2015 [pdf]
Muhammad Naveed. Hurdles for Genomic Data Usage Management.IEEE Workshop on Data Usage Management, November 2014. [pdf]
J.A. Young, T.S. Ellis, J.F. Courtney, T.L. Roberts, and A.J. Burns. Ethical Evaluation of Electronic Medical Records System Workarounds: Implications for Patient Privacy and Information Security. 2014 Annual Meeting of the Decision Sciences Institute, Tampa, FL. November 2014
Dongjing He, Muhammad Naveed, Carl A. Gunter, and Klara Nahrstedt. Security Concerns in Android mHealth Apps. Symposium of the American Informatics Association. Washington, DC. November 2014 [pdf]
Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, Xiaofeng Wang, Erman Ayday, Jean-Pierre Hubaux, and Carl A. Gunter. Controlled Functional Encryption.ACM Computer and Communication Security), Scottsdale, AZ. November 2014. [pdf]
Wen Zhang, You Chen, Thaddeus R. Cybulski, Daniel Fabbri, Carl A. Gunter, Patrick Lawlor, David Liebovitz, and Bradley Malin. Decide Now or Decide Later? Quantifying the Tradeoff between Prospective and Retrospective Access Decisions.ACM Computer and Communication Security, Scottsdale, AZ. November 2014. [pdf]
Juhee Kwon and M. Eric Johnson. Meaningful Healthcare Security: Does “Meaningful-Use” Attestation Improve Information Security Performance? INFORMS Conference on Information Systems and Technology, San Francisco, CA. November, 2014 [[Paper] [video]]
A. Sleptchenko and M. Eric Johnson. The Impact of Security in Maintaining Reliable Distributed Control Systems.INFORMS Annual Conference, San Francisco, CA. November, 2014 [Presentation only]
A. Sleptchenko and M. Eric Johnson. Maintaining Secure and Reliable Distributed Control Systems.INFORMS Journal of Computing. October 2014 [INFORMS Journal of Computing]
Charles Friedman. Joshua Rubin, Jeffrey Brown, Melinda Buntin, Milton Corn, Lynn Etheredge, Carl Gunter, Mark Musen, Richard Platt, William Stead, Kevin Sullivan, Douglas Van Houweling. Toward a Science of Learning Systems: a Research Agenda for the High-Functioning Learning Health System. Journal of the American Medical Informatics Association (JAMIA). October 2014. [pdf]
Carl A. Gunter, Mike Berry, and Martin French. Decision Support for Data Segmentation (DS2): Application to Pull Architectures for HIE. USENIX Safety, Security, Privacy, and Interoperability of Health Information Technologies (HealthTech ’14, San Diego, CA). August 2014 [pdf]
Shrirang Mare, Andrés Molina-Markham, Cory Cornelius, Ronald Peterson, and David Kotz. ZEBRA: Zero-Effort Bilateral Recurring Authentication. IEEE Symposium on Security & Privacy. (Note: this project has since been renamed BRACE.) May 2014 [pdf]
A.J. Burns, J.A. Young, T.L. Roberts, T.S. Ellis, and J.F. Courtney. Exploring the Role of Contextual Integrity in Electronic Medical Record (EMR) System Workaround Decisions. Human-Computer Interaction in Health and Wellness Research Workshop at the Americas Conference on Information Systems (AMCIS 2014, Savannah, Georgia). August 2014
Dongjing He. Security Threats to Android Apps. MS Thesis, University of Illinois at Urbana-Champaign. June 2014 [pdf]
Juhee Kwon and M. Eric Johnson. Meaningful Healthcare Security: Does “Meaningful-Use” Attestation Improve Information Security Performance?Workshop on the Economics of Information Security (WEIS). June 2014 [paper]
Anthony Louie. Information Leakage in Mobile Health Sensors and Applications. Senior thesis. University of Illinois at Urbana-Champaign. June 2014 [pdf]
Muhammad Naveed, Manoj Prabhakaran, and Carl A. Gunter. Dynamic Searchable Encryption via Blind Storage. IEEE Symposium on Security & Privacy. May 2014 [pdf]
Michael Rushanan, Aviel D. Rubin, Denis Foo Kune, Colleen M. Swanson. SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks. IEEE Symposium on Security & Privacy. May 2014 [pdf]
Jonathan P. Weiner, Susan Yeh, and David Blumenthal. The Impact Of Health Information Technology And e-Health On The Future Demand For Physician Services. Health Affairs. November 2013 [url][pdf]