Tyler Tucker, Ph.D.

Former Research Assistant at UF FICS

About


I am a former Ph.D. student in the CISE department of the University of Florida, as well as a former researcher at UF's Florida Institute for Cybersecurity Research (FICS) lab. My graduate school research focused on user privacy over wireless mediums such as cellular and Bluetooth networks. To that end, I have authored work in detecting Non-Discoverable Bluetooth Classic devices and principled approaches for detecting adversarial cellular base stations (e.g., "rogue base stations", "IMSI-Catchers") with my advisor Patrick Traynor. Much of our work employed software-defined radios (SDRs) to interact actively and passively with local wireless networks. Throughout my time as a graduate student, I also worked in firmware emulation, network fuzzing, audio deepfakes, and research replicability.

Looking for this?

View my CV

Academics


I am a "Triple Gator," meaning that I earned my Bachelor's degree, Master's degree, and Ph.D. from the University of Florida. The latter two degrees are in Computer Science while the former is in Electrical Engineering. The courses I have taken include topcis such as network security, cryptography, hardware security, machine learning, computer science core principles, microprocessors, and analog circuit design.

Published Research



I host all of my published graduate level research here, free of charge for those who are interested. These publications include all conference papers that include me as an author. I will keep this list updated as additional submissions reach publication.



SoK: Towards a Unified Approach of Applied Replicability for Computer Security
Addresses shortcomings of validity practices within the Cybersecurity academic community, using best practices from other fields and novel contributions to propose a universal framework to represent how authors provide artifacts from their work to external members of the community.

Marlin
Proposes a solution to detecting fake cellular base stations (“IMSI-Catchers”), based on their behavior rather than configuration. We profile both commercial cell towers and controlled IMSI-Catchers, then detect a rogue tower in the wild matching the latter profile, becoming the first academic work to substantiate findings of rogue cellular base stations in the wild.

"Better Be Computer or I’m Dumb"
Runs a 1000+ participant user study to find out how well humans perform at recognizing audio deepfakes (i.e., average accuracy of 73\%), why they classify an audio sample as real or fake, and how their performance compares to ML-based detectors.

SoK: The Good, The Bad, and The Unbalanced
Reveals weaknesses in how audio deepfake competitions and datasets are carried out, then suggestd that detectors present sufficient performance metrics while dataset designers consider the base rate of deepfake audio samples.

Blue's Clues
Provides a complete break of Bluetooth Classic's Non-Discoverable mode by retransmitting wirelessly recovered MAC addresses, which leads to DoS attacks and packet injection against unauthenticated devices.

LeopardSeal
Introduces a new technique for detecting Audio Rouge Base Stations (ARBSs) in the wild using distance-bounding over the audio channel of a phone call, and tested this detection mechanism between dozens of cities throughout the United States.

FirmWire
Provides the first full-system emulation platform for baseband processors, uncovering four previously unknown vulnerabilities for LTE and GSM networks.

News



July 2025 Defended my dissertation titled "Improving Identity Protection over Wireless Networks through Protocol Specifications."
February 2025 First-Author work Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic presented at the 2025 ISOC Network and Distributed System Security Symposium (NDSS)
November 2024 Co-authored work "Better Be Computer or I’m Dumb": A Large-Scale Evaluation of Humans as Audio Deepfake Detectors presented at the 2024 ACM Conference on Computer and Communications Security (CCS), earning a Distringuished Paper Award
August 2024 Co-authored work SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media Datasets presented at the 2024 USENIX Security Symposium
August 2024 Completed internship with economic consulting firm Analysis Group, specializing in research for litigation cases based on technology disputes
May 2023 Co-authored work LeopardSeal: Detecting Call Interception via Audio Rogue Base Stations accepted to the 2023 ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
April 2023 Received Gartner Group Graduate Fellowship Award from the UF CISE Department
June 2022 First-Author work Blue's Clues: Practical Discovery of Non-Discoverable Bluetooth Devices accepted to the 2023 IEEE Symposium on Security & Privacy
October 2021 Co-authored Firmwire: Transparent Dynamic Analysis for Cellular Baseband Firmware academic paper at the 2022 ISOC Network and Distributed System Security Symposium (NDSS)
August 2020 Contributed base station work for the Emulating Samsung's Baseband for Security Testing presentation at Blackhat '20
May 2019 Received Renwick Scholarship for Master's student researchers at UF
August 2018 Completed controls internship with Siemens Power Generation
August 2018 Completed frontend development on desktop application for Digital Control Lab
April 2018 Won 1st place award in UF ECE Senior Design Competition along with partner Daniel Gonzalez
August 2017 Completed ELDP internship with Siemens Industry Automation
August 2016 Completed systems engineering internship with Lockheed Martin Missiles and Fire Control
February 2016 Hosted Engineering and Science Fair Event for 1000+ K-12 students from throughout Florida with UF Engineer's Week