Mohammad Mannan

Orcid: 0000-0002-9630-5858

Affiliations:
  • Concordia University, Montreal, Canada


According to our database1, Mohammad Mannan authored at least 91 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Security Weaknesses in IoT Management Platforms.
IEEE Internet Things J., January, 2024

LURK-T: Limited Use of Remote Keys With Added Trust in TLS 1.3.
IEEE Trans. Netw. Sci. Eng., 2024

On Detecting and Measuring Exploitable JavaScript Functions in Real-world Applications.
ACM Trans. Priv. Secur., 2024

WARNE: A stalkerware evidence collection tool.
Forensic Sci. Int. Digit. Investig., 2024

Racing for TLS Certificate Validation: A Hijacker's Guide to the Android TLS Galaxy.
Proceedings of the 33rd USENIX Security Symposium, 2024

"Trust Me Over My Privacy Policy": Privacy Discrepancies in Romantic AI Chatbot Apps.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

Poster: Detecting Ransomware Attacks by Analyzing Replicated Block Snapshots Using Neural Networks.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
CDNs' Dark Side: Security Problems in CDN-to-Origin Connections.
DTRAP, 2023

APTHunter: Detecting Advanced Persistent Threats in Early Stages.
DTRAP, 2023

All Your Shops Are Belong to Us: Security Weaknesses in E-commerce Platforms.
Proceedings of the ACM Web Conference 2023, 2023

"My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software.
Proceedings of the 32nd USENIX Security Symposium, 2023

Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

No Place to Hide: Privacy Exposure in Anti-stalkerware Apps and Support Websites.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023

Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

All Your IoT Devices Are Belong to Us: Security Weaknesses in IoT Management Platforms.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
"Free" as in Freedom to Protest?
IEEE Secur. Priv., 2022

Blindfold: Keeping private keys in PKIs and CDNs out of sight.
Comput. Secur., 2022

Et tu, Brute? Privacy Analysis of Government Websites and Mobile Apps.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly.
Proceedings of the Security and Privacy in Communication Networks, 2022

Not so Immutable: Upgradeability of Smart Contracts on Ethereum.
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022

Got Sick and Tracked: Privacy Analysis of Hospital Websites.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

SAUSAGE: Security Analysis of Unix domain Socket usAGE in Android.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

No Salvation from Trackers: Privacy Analysis of Religious Websites and Mobile Apps.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022

Leaky Kits: The Increased Risk of Data Exposure from Phishing Kits.
Proceedings of the APWG Symposium on Electronic Crime Research, 2022

Hidden in Plain Sight: Exploring Encrypted Channels in Android Apps.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

On Measuring Vulnerable JavaScript Functions in the Wild.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Perspectives on the SolarWinds Incident.
IEEE Secur. Priv., 2021

Parental Controls: Safer Internet Solutions or New Pitfalls?
IEEE Secur. Priv., 2021

On Securing Cloud-hosted Cyber-physical Systems Using Trusted Execution Environments.
CoRR, 2021

On cloaking behaviors of malicious websites.
Comput. Secur., 2021

Horus: A Security Assessment Framework for Android Crypto Wallets.
Proceedings of the Security and Privacy in Communication Networks, 2021

Red-Black Coins: Dai Without Liquidations.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

2020
Confronting the Limitations of Hardware-Assisted Security.
IEEE Secur. Priv., 2020

LURK: Server-Controlled TLS Delegation.
IACR Cryptol. ePrint Arch., 2020

The Sorry State of TLS Security in Enterprise Interception Appliances.
DTRAP, 2020

Securing Applications against Side-channel Attacks through Resource Access Veto.
DTRAP, 2020

Chaperone: Real-time Locking and Loss Prevention for Smartphones.
Proceedings of the 29th USENIX Security Symposium, 2020

ByPass: Reconsidering the Usability of Password Managers.
Proceedings of the Security and Privacy in Communication Networks, 2020

Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Playing With Danger: A Taxonomy and Evaluation of Threats to Smart Toys.
IEEE Internet Things J., 2019

Privacy and Security Risks of "Not-a-Virus" Bundled Adware: The Wajam Case.
CoRR, 2019

Towards a global perspective on web tracking.
Comput. Secur., 2019

Another look at TLS ecosystems in networked devices vs. Web servers.
Comput. Secur., 2019

On the null relationship between personality types and passwords.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

TEE-aided Write Protection Against Privileged Data Tampering.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

One-Time Programs Made Practical.
Proceedings of the Financial Cryptography and Data Security, 2019

On Privacy Risks of Public WiFi Captive Portals.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019

DeviceVeil: Robust Authentication for Individual USB Devices Using Physical Unclonable Functions.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

AppVeto: mobile application self-defense through resource access veto.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Smart But Unsafe: Experimental Evaluation of Security and Privacy Practices in Smart Toys.
CoRR, 2018

Using SafeKeeper to Protect Web Passwords.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

SafeKeeper: Protecting Web Passwords using Trusted Execution Environments.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

On Understanding Permission Usage Contextuality in Android Apps.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

To Intercept or Not to Intercept: Analyzing TLS Interception in Network Appliances.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Protecting Web Passwords from Rogue Servers using Trusted Execution Environments.
CoRR, 2017

Towards a comprehensive analytical framework for smart toy privacy practices.
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, 2017

Short Paper: TLS Ecosystems in Networked Devices vs. Web Servers.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Deceptive Deletion Triggers Under Coercion.
IEEE Trans. Inf. Forensics Secur., 2016

An evaluation of recent secure deduplication proposals.
J. Inf. Secur. Appl., 2016

Killed by Proxy: Analyzing Client-end TLS Interception Software.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Hypnoguard: Protecting Secrets across Sleep-wake Cycles.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
A Large-Scale Evaluation of High-Impact Password Strength Meters.
ACM Trans. Inf. Syst. Secur., 2015

Peace vs. Privacy: Leveraging Conflicting Jurisdictions for Email Security.
Proceedings of the 2015 New Security Paradigms Workshop, 2015

Gracewipe: Secure and Verifiable Deletion under Coercion.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Mobiflage: Deniable Storage Encryptionfor Mobile Devices.
IEEE Trans. Dependable Secur. Comput., 2014

From Very Weak to Very Strong: Analyzing Password-Strength Meters.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Detection of malicious payload distribution channels in DNS.
Proceedings of the IEEE International Conference on Communications, 2014

Challenges and implications of verifiable builds for security-critical open-source software.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Explicit authentication response considered harmful.
Proceedings of the New Security Paradigms Workshop, 2013

On Implementing Deniable Storage Encryption for Mobile Devices.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

2012
Passwords for Both Mobile and Desktop Computers Appendix.
login Usenix Mag., 2012

Passwords for Both Mobile and Desktop Computers: ObPwd for Firefox and Android.
login Usenix Mag., 2012

Revisiting Defenses against Large-Scale Online Password Guessing Attacks.
IEEE Trans. Dependable Secur. Comput., 2012

Lightweight Client-Side Methods for Detecting Email Forgery.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

2011
User Study, Analysis, and Usable Security of Passwords Based on Digital Objects.
IEEE Trans. Inf. Forensics Secur., 2011

Leveraging personal devices for stronger password authentication from untrusted computers.
J. Comput. Secur., 2011

Mercury: Recovering Forgotten Passwords Using Personal Devices.
Proceedings of the Financial Cryptography and Data Security, 2011

Unicorn: two-factor attestation for data security.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2009
Reducing threats from flawed security APIs: The banking PIN case.
Comput. Secur., 2009

2008
Privacy-enhanced sharing of personal content on the web.
Proceedings of the 17th International Conference on World Wide Web, 2008

Digital Objects as Passwords.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Localization of credential information to address increasingly inevitable data breaches.
Proceedings of the 2008 Workshop on New Security Paradigms, 2008

Weighing Down "The Unbearable Lightness of PIN Cracking".
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

2007
Security and usability: the gap in real-world online banking.
Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, USA, 2007

Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer.
Proceedings of the Financial Cryptography and Data Security, 2007

2006
A Protocol for Secure Public Instant Messaging.
Proceedings of the Financial Cryptography and Data Security, 2006

2005
On instant messaging worms, analysis and countermeasures.
Proceedings of the 2005 ACM Workshop on Rapid Malcode, 2005

2004
Secure Public Instant Messaging.
Proceedings of the Second Annual Conference on Privacy, 2004


  Loading...