Dynamic trigger-based attacks against next-generation IoT malware family classifiers.
Comput. Secur., 2025
EV Charging Infrastructure Discovery to Contextualize Its Deployment Security.
IEEE Trans. Netw. Serv. Manag., February, 2024
A Hybrid System Call Profiling Approach for Container Protection.
IEEE Trans. Dependable Secur. Comput., 2024
Securing IoT Malware Classifiers: Dynamic Trigger-Based Attack and Mitigation.
Proceedings of the IEEE International Conference on Communications, 2024
Uncovering Covert Attacks on EV Charging Infrastructure: How OCPP Backend Vulnerabilities Could Compromise Your System.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Investigating the Security of EV Charging Mobile Applications as an Attack Surface.
ACM Trans. Cyber Phys. Syst., October, 2023
Edge-Based Detection and Localization of Adversarial Oscillatory Load Attacks Orchestrated By Compromised EV Charging Stations.
CoRR, 2023
ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
RPM: Ransomware Prevention and Mitigation Using Operating Systems' Sensing Tactics.
Proceedings of the IEEE International Conference on Communications, 2023
On Ransomware Family Attribution Using Pre-Attack Paranoia Activities.
IEEE Trans. Netw. Serv. Manag., 2022
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope.
IEEE Trans. Dependable Secur. Comput., 2022
Power jacking your station: In-depth security analysis of electric vehicle charging station management systems.
Comput. Secur., 2022
SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution.
IEEE Trans. Netw. Serv. Manag., 2021
A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships.
IEEE Netw. Lett., 2021
Stochastic Modeling, Analysis and Investigation of IoT-Generated Internet Scanning Activities.
IEEE Netw. Lett., 2020
A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities.
Digit. Investig., 2020
Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems.
IEEE Commun. Surv. Tutorials, 2018
Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Privacy Aspects of Health Related Information Sharing in Online Social Networks.
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013
Social Network Analysis of Kuwait Publicly-Held Corporations.
Proceedings of the 3rd International Conference on Ambient Systems, 2012