Muhammad Saad

Orcid: 0000-0002-8762-4566

Affiliations:
  • PayPal, USA
  • University of Central Florida, Department of Computer Science, Orlando, FL, USA (former)


According to our database1, Muhammad Saad authored at least 40 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality.
IEEE/ACM Trans. Netw., February, 2024

Analyzing In-Browser Cryptojacking.
IEEE Trans. Dependable Secur. Comput., 2024

Exposing the Limitations of Machine Learning for Malware Detection Under Concept Drift.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024

The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms.
Proceedings of the 33rd USENIX Security Symposium, 2024

Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
Can I Own Your NFTs? Understanding the New Attack Surface to NFTs.
IEEE Commun. Mag., September, 2023

Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Evaluating the Security Posture of Real-World FIDO2 Deployments.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Exploring Partitioning Attacks on the Bitcoin Network.
IEEE/ACM Trans. Netw., 2022

BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails.
IEEE Syst. J., 2022

<i>RouteChain</i>: Towards Blockchain-based secure and efficient BGP routing.
Comput. Networks, 2022

Analysis of Payment Service Provider SDKs in Android.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
e-PoS: Making Proof-of-Stake Decentralized and Fair.
IEEE Trans. Parallel Distributed Syst., 2021

Contra-∗: Mechanisms for countering spam attacks on blockchain's memory pools.
J. Netw. Comput. Appl., 2021

Empirically comparing the performance of blockchain's consensus algorithms.
IET Blockchain, 2021

HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality.
IACR Cryptol. ePrint Arch., 2021

Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699.
Comput. Networks, 2021

Domain name system security and privacy: A contemporary survey.
Comput. Networks, 2021

Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems.
Proceedings of the International Conference on Information Networking, 2021

Root Cause Analyses for the Deteriorating Bitcoin Network Synchronization.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

SyncAttack: Double-spending in Bitcoin Without Mining Power.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions.
IEEE Syst. J., 2020

Contra-*: Mechanisms for Countering Spam Attacks on Blockchain Memory Pools.
CoRR, 2020

Exploring the Attack Surface of Blockchain: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2020

2019
Secure and transparent audit logs with <i>BlockAudit</i>.
J. Netw. Comput. Appl., 2019

Secure and Transparent Audit Logs with BlockAudit.
CoRR, 2019

Exploring the Attack Surface of Blockchain: A Systematic Overview.
CoRR, 2019

Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network.
CoRR, 2019

Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Countering Selfish Mining in Blockchains.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

BlockTrail: A Scalable Multichain Solution for Blockchain-Based Audit Trails.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking.
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019

Fighting Fake News Propagation with Blockchains.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
End-to-End Analysis of In-Browser Cryptojacking.
CoRR, 2018

Towards Blockchain-Driven, Secure and Transparent Audit Logs.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

Towards characterizing blockchain-based cryptocurrencies for highly-accurate predictions.
Proceedings of the IEEE INFOCOM 2018, 2018

POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018


  Loading...