Mehdi Karimibiuki

mkarimi15@bcit.ca
https://blogs.ubc.ca/mehdi/

work experience

8+ years of industry experience---6+ years of academic research and teaching experience

education

MASc. UBC 2009---MASc. UBC 2012---PhD Candidate UBC 2017

publications

1- IEEE Pacific Rim International Symposium on Dependable Computing, December 2018. (https://ieeexplore.ieee.org/document/8639525)Conference, Taipei• DynPolAC: Dynamic Policy-based Access Control for IoT systems2- ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC), October 2018. (https://goo.gl/3gf7Y9)Workshop, Toronto• CORGIDS: A Correlation-based Generic Intrusion Detection System3- ACM IoT Conference, October 2018. (https://goo.gl/BS4NrB)Conference, Santa Barbara• MiniCloud: a mini storage and query service for local heterogeneous IoT devices4- UBC Cybersecurity Summit, May 2018. Invited Talk. (https://goo.gl/27Vozm)• Policy-based Access Control for IoT Systems5- USENIX Security Symposium, August 2017. Poster (https://goo.gl/WF88Bj)Vancouver• Access Control for IoT Systems6- Connectivity for the IoT, Workshop, May 2017: Poster (https://goo.gl/AyUQ2L)UBC Vancouver• Design of a Dynamic and Secure Storage Service for IoT Systems7- IoT Tech Day Conference, April 2017: demo and presentation (http://iottechday.nl/). Utrecht, Netherlands• Data Storage Model in IoT Systems.8- Embedded Linux Conference, 2013: 50-minute presentation (http://goo.gl/USLncb).Invited Talk, San Francisco• Leveraging Linux - Code Coverage for Post-Silicon Validation9- IEEE Transactions on Computers, 2013 (http://goo.gl/Eq1AFJ)Journal paper• Post-Silicon Code Coverage for Multiprocessor System-on-Chip Designs10- UBC, 2012 (http://goo.gl/BSkcS0)Thesis• Post-Silicon Code Coverage for Functional Verification of Systems-on-Chip11- IEEE International High Level Design Validation and Test Workshop (HLDVT), 2011 (http://goo.gl/9xEh5j)Conference - Napa Valley, California• Post-silicon code coverage evaluation with reduced area overhead for functional verification of SoC

other

IoT, Security of Cyber-Physical Systems, Drones' authentication, data authorization in dynamic IoT