Irfan Ahmed

Orcid: 0000-0001-5648-388X

Affiliations:
  • University of New Orleans, New Orleans, LA, USA
  • Virginia Commonwealth University, Richmond, VA, USA


According to our database1, Irfan Ahmed authored at least 59 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
SWMAT: Mel-frequency cepstral coefficients-based memory fingerprinting for IoT devices.
Comput. Secur., September, 2023

FRoMEPP: Digital forensic readiness framework for material extrusion based 3D printing process.
Forensic Sci. Int. Digit. Investig., March, 2023

Towards generic memory forensic framework for programmable logic controllers.
Forensic Sci. Int. Digit. Investig., March, 2023

A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review.
Sensors, 2023

How Are Industrial Control Systems Insecure by Design? A Deeper Insight Into Real-World Programmable Logic Controllers.
IEEE Secur. Priv., 2023

Report on 2023 CyberTraining PI Meeting, 26-27 September 2023.
CoRR, 2023

Fortifying IoT Devices: AI-Driven Intrusion Detection via Memory-Encoded Audio Signals.
Proceedings of the IEEE Secure Development Conference, 2023

Gadgets of Gadgets in Industrial Control Systems: Return Oriented Programming Attacks on PLCs.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023

SOK: Side Channel Monitoring for Additive Manufacturing - Bridging Cybersecurity and Quality Assurance Communities.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
PEM: Remote forensic acquisition of PLC memory in industrial control systems.
Digit. Investig., 2022

Memory forensic analysis of a programmable logic controller in industrial control systems.
Digit. Investig., 2022

Forensic investigation of instant messaging services on linux OS: Discord and Slack as case studies.
Digit. Investig., 2022

Low-Magnitude Infill Structure Manipulation Attacks on Fused Filament Fabrication 3D Printers.
Proceedings of the Critical Infrastructure Protection XVI, 2022

Control Logic Obfuscation Attack in Industrial Control Systems.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

Transforming Memory Image to Sound Wave Signals for an Effective IoT Fingerprinting.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
JTAG-based PLC memory acquisition framework for industrial control systems.
Digit. Investig., 2021

Cronus: An Automated Feedback Tool for Concept Maps.
IEEE Access, 2021

Automated Waterloo Rubric for Concept Map Grading.
IEEE Access, 2021

Empirical Study of PLC Authentication Protocols in Industrial Control Systems.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Attacking the IEC 61131 Logic Engine in Programmable Logic Controllers.
Proceedings of the Critical Infrastructure Protection XV, 2021

Spatiotemporal G-code modeling for secure FDM-based 3D printing.
Proceedings of the ICCPS '21: ACM/IEEE 12th International Conference on Cyber-Physical Systems, 2021

2020
Hierarchy-Based File Fragment Classification.
Mach. Learn. Knowl. Extr., 2020

Control Logic Forensics Framework using Built-in Decompiler of Engineering Software in Industrial Control Systems.
Digit. Investig., 2020

2019
Evaluation of Peer Instruction for Cybersecurity Education.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

Topological Scoring of Concept Maps for Cybersecurity Education.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

Control Logic Injection Attacks on Industrial Control Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

Automated Reconstruction of Control Logic for Programmable Logic Controller Forensics.
Proceedings of the Information Security - 22nd International Conference, 2019

Overshadow PLC to Detect Remote Control-Logic Injection Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

2018
Peer Instruction Teaching Methodology for Cybersecurity Education.
IEEE Secur. Priv., 2018

Leveraging relocations in ELF-binaries for Linux kernel version identification.
Digit. Investig., 2018

Using Virtual Machine Introspection for Operating Systems Security Education.
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Denial of Engineering Operations Attacks in Industrial Control Systems.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Programmable Logic Controller Forensics.
IEEE Secur. Priv., 2017

SCADA network forensics of the PCCC protocol.
Digit. Investig., 2017

Automatic Mitigation of Kernel Rootkits in Cloud Environments.
Proceedings of the Information Security Applications - 18th International Conference, 2017

Peer Instruction for Digital Forensics.
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017

2016
Cloud forensics-Tool development studies & future outlook.
Digit. Investig., 2016

Forensic Acquisition of Cloud Drives.
CoRR, 2016

Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content Providers.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Development of Peer Instruction Questions for Cybersecurity Education.
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016

API-Based Forensic Acquisition of Cloud Drives.
Proceedings of the Advances in Digital Forensics XII, 2016

A SCADA System Testbed for Cybersecurity and Forensic Research and Pedagogy.
Proceedings of the 2nd Annual Industrial Control System Security Workshop, 2016

SPICE: A Software Tool for Bridging the Gap Between End-user's Insecure Cyber Behavior and Personality Traits.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

AspectDroid: Android App Analysis System.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Robust Fingerprinting for Relocatable Code.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

OpSeq: Android Malware Fingerprinting.
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015

2014
Image-based kernel fingerprinting.
Digit. Investig., 2014

2013
Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection.
Proceedings of the Information Security, 16th International Conference, 2013

Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments.
Proceedings of the Advances in Digital Forensics IX, 2013

2012
Message from the guest editors.
Int. J. Inf. Sec., 2012

SCADA Systems: Challenges for Forensic Investigators.
Computer, 2012

ModChecker: Kernel Module Integrity Checking in the Cloud Environment.
Proceedings of the 41st International Conference on Parallel Processing Workshops, 2012

2011
Classification of packet contents for malware detection.
J. Comput. Virol., 2011

User-representative feature selection for keystroke dynamics.
Proceedings of the 5th International Conference on Network and System Security, 2011

Fast Content-Based File Type Identification.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

2010
Fast file-type identification.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

2009
On Improving the Accuracy and Performance of Content-Based File Type Identification.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Detection of Malcodes by Packet Classification.
Proceedings of the The Third International Conference on Availability, 2008

2007
Binding Update Authentication Scheme for Mobile IPv6.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007


  Loading...