| CARVIEW |
Select Language
HTTP/2 200
content-type: text/html
x-ws-ratelimit-limit: 1000
x-ws-ratelimit-remaining: 999
date: Mon, 29 Dec 2025 23:18:24 GMT
server: Apache
last-modified: Fri, 08 Aug 2025 20:19:25 GMT
etag: W/"2905a-63be04a4f5edb"
content-encoding: gzip
Amir Rahmati
About Me
Amir Rahmati /æ’mi:r ræh’mæti/ (written as امیر رحمتی in Persian) is an Assistant Professor in the Department of Computer Science at Stony Brook University. He is the director of Ethos Security and Privacy lab and a member of Stony Brook National Security Institute. Amir’s research broadly focuses on system security. He is particularly interested in the security and privacy challenges of emerging technologies, including IoT, AR, and ML systems.
Teaching
Research
I lead the Ethos lab at Stony Brook University. In Ethos lab, we focus on improving the security of emerging technologies, such as Internet of Things (IoT) devices and Cyber-Physical systems. Our work involves designing, building, and evaluating systems that tackle security challenges in these domains. As we move towards a world where many resource- and energy-limited devices have access to our data & activities, our research creates an avenue for these devices to incorporate security in their design.
Prospective Students
I am looking for students with diverse backgrounds and expertise to work on challenging research problems across the system stack.
- Do you like designing and developing elegant systems that tackle real-world problems?
- Do you have expertise in hardware, software, machine learning, UX, or network protocols and measurement?
- Are you passionate about security and privacy?
Interested? Fill out this form and tell me about yourself. Then, apply to our graduate program.
Publications
Kwangyun Keum,
Dheeraj Kumar,
Bogdan Barchuk,
Sai Chand Boyapati,
Rohit Deopura,
Amir Rahmati
(2025).
Obfusc8: LLM-Augmented PowerShell Obfuscation.
In IEEE Cybersecurity Development Conference (SecDev).
Veena Krish,
Amir Rahmati
(2025).
Understanding Minimal-Time Attacks Against Reinforcement Learning Agents.
In IEEE Cybersecurity Development Conference (SecDev).
Dongsheng Luo,
Raju Rangaswami,
Amir Rahmati,
Erez Zadok
(2025).
GitTemporalAI: Leveraging Temporal Knowledge Graphs and LLMs for Multi-Agent Repository Intelligence.
In Multi-Agent AI in the Real World Workshop at AAAI (MARV).
Muhammad Muzammil,
Abisheka Pitumpe,
Xigao Li,
Amir Rahmati,
Nick Nikiforakis
(2025).
The Poorest Man in Babylon: A Longitudinal Study of Cryptocurrency Investment Scams.
In The Web Conference (WWW).
Preston Chang,
Veena Krish,
Amir Rahmati
(2024).
Security Analysis of RL-Based Artificial Pancreas Systems.
In ACM HealthSec Workshop (HealthSec).
Stanley Bak,
Abdelrahman Hekal,
Niklas Kochdumper,
Ethan Lew,
Andrew Mata,
Amir Rahmati
(2024).
Fast Koopman Surrogate Falsification using Linear Relaxations and Weights.
In International Symposium on Automated Technology for Verification and Analysis (ATVA).
Veena Krish,
Nicola Paoletti,
Milad Kazemi,
Scott Smolka,
Amir Rahmati
(2024).
Biosignal Authentication Considered Harmful Today.
In USENIX Security Symposium (USENIX Sec).
Stanley Bak,
Sergiy Bogomolov,
Abdelrahman Hekal,
Veena Krish,
Andrew Mata,
Amir Rahmati
(2024).
Zero-One Attack: Degrading Closed-Loop Neural Network Control Systems using State-Time Perturbations.
In International Conference on Cyber-Physical Systems (ICCPS).
Stanley Bak,
Sergiy Bogomolov,
Abdelrahman Hekal,
Niklas Kochdumper,
Ethan Lew,
Andrew Mata,
Amir Rahmati
(2024).
Falsification using Reachability of Surrogate Koopman Models.
In ACM International Conference on Hybrid Systems: Computation and Control (HSCC).
Pratik Vaishnavi,
Kevin Eykholt,
Amir Rahmati
(2024).
A Study of the Effects of Transfer Learning on Adversarial Robustness.
In Transactions on Machine Learning Research (TMLR).
Xigao Li,
Amir Rahmati,
Nick Nikiforakis
(2024).
Like, Comment, Get Scammed: Characterizing Comment Scams on Media Platforms.
In Network and Distributed System Security Symposium (NDSS).
Veena Krish,
Andrew Mata,
Kerianne Hobbs,
Stanley Bak,
Amir Rahmati
(2023).
Provable Observation Noise Robustness for Neural Network Control Systems.
In Research Directions: Cyber-Physical Systems.
Sanket Goutam,
Yoonsang Kim,
Amir Rahmati,
Arie Kaufman
(2023).
Erebus: Access Control for Augmented Reality Systems.
In USENIX Security Symposium (USENIX Sec).
Xigao Li,
Babak Amin Azad,
Amir Rahmati,
Nick Nikiforakis
(2023).
Scan Me If You Can: Understanding and Detecting Unwanted Vulnerability Scanning.
In The Web Conference (WWW).
Veena Krish,
Nicola Paoletti,
Scott A. Smolka,
Amir Rahmati
(2023).
Synthesizing Pareto-Optimal Signal-Injection Attacks on ICDs.
In IEEE Access (ACCESS).
Pratik Vaishnavi,
Kevin Eykholt,
Amir Rahmati
(2022).
Accelerating Certified Robustness Training via Knowledge Transfer.
In Conference on Neural Information Processing Systems (NeurIPS).
Pratik Vaishnavi,
Veena Krish,
Farhan Ahmed,
Kevin Eykholt,
Amir Rahmati
(2022).
On the Feasibility of Compressing Certifiably Robust Neural Networks.
In Trustworthy and Socially Responsible Machine Learning (TSRML).
Pratik Vaishnavi,
Kevin Eykholt,
Amir Rahmati
(2022).
Transferring Adversarial Robustness Through Robust Representation Matching.
In USENIX Security Symposium (USENIX Sec).
Farhan Ahmed,
Pratik Vaishnavi,
Kevin Eykholt,
Amir Rahmati
(2022).
Ares: A System-Oriented Wargame Framework for Adversarial ML.
In IEEE Deep Learning And Security Workshop (DLS).
Xigao Li,
Babak Amin Azad,
Amir Rahmati,
Nick Nikiforakis
(2021).
Good Bot, Bad Bot: Characterizing Automated Browsing Activity.
In IEEE Symposium on Security and Privacy (S&P).
Vasudevan Nagendra,
Arani Bhattacharya,
Vinod Yegneswaran,
Amir Rahmati,
Samir R Das
(2020).
An Intent-Based Automation Framework for Securing Dynamic Consumer IoT Infrastructures.
In The Web Conference (WWW).
Pubali Datta,
Prabuddha Kumar,
Tristan Morris,
Michael Grace,
Amir Rahmati,
Adam Bates
(2020).
Valve: Securing Function Workflows on Serverless Computing Platforms.
In The Web Conference (WWW).
Pratik Vaishnavi,
Tianji Cong,
Kevin Eykholt,
Atul Prakash,
Amir Rahmati
(2020).
Can Attention Masks Improve Adversarial Robustness?.
In The AAAI-20 Workshop on Engineering Dependable and Secure Machine Learning Systems (EDSMLS).
Jk Jensen,
Jinhan Hu,
Amir Rahmati,
Robert LiKamWa
(2019).
Protecting Visual Information in Augmented Reality from Malicious Application Developers.
In ACM Workshop on Wearable Systems and Applications (WearSys).
Dave Tian,
Grant Hernandez,
Joseph Choi,
Vanessa Frost,
Christie Raules,
Kevin Butler,
Patrick Traynor,
Hayawardh Vijayakumar,
Lee Harrison,
Amir Rahmati,
Mike Grace
(2018).
ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.
In USENIX Security Symposium (USENIX Sec).
Earlence Fernandes,
Ivan Evtimov,
Kevin Eykholt,
Chaowei Xiao,
Amir Rahmati,
Florian Tramer,
Bo Li,
Atul Prakash,
Tadayoshi Kohno,
Dawn Song
(2018).
The State of Physical Attacks on Deep Learning Systems.
In USENIX Summit on Hot Topics in Security (HotSec).
Kevin Eykholt,
Ivan Evtimov,
Earlence Fernandes,
Bo Li,
Amir Rahmati,
Florian Tramer,
Atul Prakash,
Tadayoshi Kohno,
Dawn Song
(2018).
Physical Adversarial Examples for Object Detectors.
In USENIX Workshop on Offensive Technologies (WOOT).
Kevin Eykholt,
Ivan Evtimov,
Earlence Fernandes,
Bo Li,
Amir Rahmati,
Chaiowei Xiao,
Atul Prakash,
Tadayoshi Kohno,
Dawn Song
(2018).
Robust Physical-World Attacks on Deep Learning Visual Classification.
In Workshop on the Bright and Dark Sides of Computer Vision (CV-COPS).
Kevin Eykholt,
Ivan Evtimov,
Earlence Fernandes,
Bo Li,
Amir Rahmati,
Chaiowei Xiao,
Atul Prakash,
Tadayoshi Kohno,
Dawn Song
(2018).
Robust Physical-World Attacks on Deep Learning Visual Classification.
In Conference on Computer Vision and Pattern Recognition (CVPR).
Laurent Simon,
Shuying Liang,
Amir Rahmati,
Mike Grace
(2018).
Caterpillar: Iterative Concolic Execution for Stateful Programs.
In International KLEE Workshop on Symbolic Execution (KLEE).
Earlence Fernandes,
Amir Rahmati,
Jaeyeon Jung,
Atul Prakash
(2018).
Decentralized Action Integrity for Trigger-Action IoT Platforms.
In Network and Distributed System Security Symposium (NDSS).
Amir Rahmati,
Earlence Fernandes,
Jaeyeon Jung,
Atul Prakash
(2017).
IFTTT vs. Zapier: A Comparative Study of Trigger-Action Programming Frameworks.
In arXiv (1709.02788).
Amir Rahmati,
Earlence Fernandes,
Kevin Eykholt,
Xinheng Chen,
Atul Prakash
(2017).
Heimdall: A Privacy-Respecting Implicit Preference Collection Framework.
In ACM International Conference on Mobile Systems, Applications, and Services (MobiSys).
Earlence Fernandes,
Amir Rahmati,
Kevin Eykholt,
Atul Prakash
(2017).
Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges?.
In IEEE Security & Privacy (S&P Magazine): Systems Attacks and Defenses.
Earlence Fernandes,
Amir Rahmati,
Jaeyeon Jung,
Atul Prakash
(2017).
Securing Trigger-Action Platforms.
In USENIX Summit on Hot Topics in Security (HotSec).
Amir Rahmati,
Earlence Fernandes,
Kevin Eykholt,
Atul Prakash
(2017).
Tyche: A Risk-Based Permission Model for Smart Homes.
In IEEE Cybersecurity Development Conference (SecDev).
Alex Gyori,
Earlence Fernandes,
Amir Rahmati,
Atul Prakash,
Darko Marinov
(2017).
Support for Security and Safety of Programmable IoT Systems.
In ISSTA Workshop on Testing Embedded and Cyber-Physical Systems (TECPS).
Earlence Fernandes,
Amir Rahmati,
Jaeyeon Jung,
Atul Prakash
(2017).
The Security Implications of Permission Models of Smart Home Application Frameworks.
In IEEE Security & Privacy (S&P Magazine), Volume 15, Issue 2.
Yunhan Jack Jia,
Qi Alfred Chen,
Shiqi Wang,
Amir Rahmati,
Earlence Fernandes,
Z. Morley Mao,
Atul Prakash
(2017).
ContexIoT: Towards Providing Contextual Integrity to Appified IoT Platforms.
In Network and Distributed System Security Symposium (NDSS).
Han Zhang,
Kasra Edalat Nejad,
Amir Rahmati,
Harsha v. Madhyastha
(2016).
Towards Comprehensive Repositories of Opinions.
In ACM Workshop on Hot Topics in Networks (HotNets).
Amir Rahmati,
Earlence Fernandes,
Atul Prakash
(2016).
Applying the Opacified Computation Model to Enforce Information Flow Policies in IoT Applications.
In IEEE Cybersecurity Development Conference (SecDev).
Earlence Fernandes,
Justin Paupore,
Amir Rahmati,
Daniel Simionato,
Mauro Conti,
Atul Prakash
(2016).
FlowFence: Practical Data Protection for Emerging IoT Application Frameworks.
In USENIX Security Symposium (USENIX Sec).
Josiah Hester,
Nicole Tobias,
Amir Rahmati,
Lanny Sitanayah,
Daniel Holcomb,
Kevin Fu,
Jacob Sorber
(2016).
Persistent Clocks for Batteryless Sensing Devices.
In Transactions on Embedded Computing Systems (TECS).
Amir Rahmati,
Matthew Hicks,
Atul Prakash
(2016).
Approximate Flash Storage: A Feasibility Study.
In Workshop on Approximate Computing Across the Stack (WAX).
Amir Rahmati,
Harsha v. Madhyastha
(2015).
Context-Specific Access Control: Conforming Permissions With User Expectations.
In ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM).
Amir Rahmati,
Matthew Hicks,
Daniel Holcomb,
Kevin Fu
(2015).
Probable Cause: The Deanonymizing Effects of Approximate DRAM.
In International Symposium on Computer Architecture (ISCA).
Sai R. Gouravajhala,
Amir Rahmati,
Peter Honeyman,
Kevin Fu
(2014).
Malware Prognosis: How to Do Malware Research in Medical Domain.
In USENIX Workshop on Health Information Technologies (Health Tech).
Sai R. Gouravajhala,
Amir Rahmati,
Evan Chavis,
Denis Foo Kune,
Peter Honeyman,
Michael Bailey,
Kevin Fu
(2014).
Stigmalware: Investigating the Prevalence of Malware in the Clinical Domain.
In Poster and Short Talk session of IEEE Symposium on Security and Privacy (IEEE S&P).
Xiaolin Xu,
Amir Rahmati,
Daniel Holcomb,
Kevin Fu,
Wayne Burleson
(2014).
Reliable Physical Unclonable Functions using Data Retention Voltage of SRAM Cells.
In IEEE Transactions on CAD: Special Section on Hardware Security and Trust (TCAD).
Amir Rahmati,
Matthew Hicks,
Daniel Holcomb,
Kevin Fu
(2014).
Refreshing Thoughts on DRAM: Power Saving vs. Data Integrity.
In Workshop on Approximate Computing Across the System Stack (WACAS).
Ben Lusher,
Kathryn Reeves,
Amir Rahmati
(2013).
Under What Circumstances Are Insider Leaks Justified?.
In Cyber Conflict Report.
Meredith Blank,
Anita Ravishankar,
Amir Rahmati
(2013).
Cyber Dimensions of State Repression.
In Cyber Conflict Report.
Shane Clark,
Benjamin Ransford,
Amir Rahmati,
Shane Guineau,
Jacob Sorber,
Wenyuan Xu,
Kevin Fu
(2013).
WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices.
In USENIX Workshop on Health Information Technologies (Health Tech).
Daniel Holcomb,
Amir Rahmati,
Mastooreh Salajegheh,
Wayne Burleson,
Kevin Fu
(2012).
DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification.
In Workshop On RFID Security And Privacy (RFIDsec).
Amir Rahmati,
Mastooreh Salajegheh,
Daniel Holcomb,
Jacob Sorber,
Wayne Burleson,
Kevin Fu
(2012).
TARDIS: Secure Time Keeping For Embedded Devices Without Clocks.
In Poster and Short Talk session of IEEE Symposium on Security and Privacy (IEEE S&P).
Amir Rahmati,
Mastooreh Salajegheh,
Daniel Holcomb,
Jacob Sorber,
Wayne Burleson,
Kevin Fu
(2012).
TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks.
In USENIX Security Symposium (USENIX Sec).

