Mohammad Mannan
Orcid: 0000-0002-9630-5858Affiliations:
- Concordia University, Montreal, Canada
According to our database1,
Mohammad Mannan
authored at least 91 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., January, 2024
IEEE Trans. Netw. Sci. Eng., 2024
On Detecting and Measuring Exploitable JavaScript Functions in Real-world Applications.
ACM Trans. Priv. Secur., 2024
Forensic Sci. Int. Digit. Investig., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
"Trust Me Over My Privacy Policy": Privacy Discrepancies in Romantic AI Chatbot Apps.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Poster: Detecting Ransomware Attacks by Analyzing Replicated Block Snapshots Using Neural Networks.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proceedings of the ACM Web Conference 2023, 2023
"My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software.
Proceedings of the 32nd USENIX Security Symposium, 2023
Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
All Your IoT Devices Are Belong to Us: Security Weaknesses in IoT Management Platforms.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
2022
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022
Proceedings of the APWG Symposium on Electronic Crime Research, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
On Securing Cloud-hosted Cyber-physical Systems Using Trusted Execution Environments.
CoRR, 2021
Proceedings of the Security and Privacy in Communication Networks, 2021
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
2020
DTRAP, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
IEEE Internet Things J., 2019
CoRR, 2019
Comput. Secur., 2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019
DeviceVeil: Robust Authentication for Individual USB Devices Using Physical Unclonable Functions.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Smart But Unsafe: Experimental Evaluation of Security and Privacy Practices in Smart Toys.
CoRR, 2018
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
CoRR, 2017
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
ACM Trans. Inf. Syst. Secur., 2015
Proceedings of the 2015 New Security Paradigms Workshop, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
2014
IEEE Trans. Dependable Secur. Comput., 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Challenges and implications of verifiable builds for security-critical open-source software.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Proceedings of the New Security Paradigms Workshop, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
2012
login Usenix Mag., 2012
IEEE Trans. Dependable Secur. Comput., 2012
Proceedings of the Information Security Applications - 13th International Workshop, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
Leveraging personal devices for stronger password authentication from untrusted computers.
J. Comput. Secur., 2011
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2009
Comput. Secur., 2009
2008
Proceedings of the 17th International Conference on World Wide Web, 2008
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008
Localization of credential information to address increasingly inevitable data breaches.
Proceedings of the 2008 Workshop on New Security Paradigms, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
2007
Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, USA, 2007
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer.
Proceedings of the Financial Cryptography and Data Security, 2007
2006
Proceedings of the Financial Cryptography and Data Security, 2006
2005
Proceedings of the 2005 ACM Workshop on Rapid Malcode, 2005
2004
Proceedings of the Second Annual Conference on Privacy, 2004