Mohamed Elsabagh

Orcid: 0000-0002-5320-4985

According to our database1, Mohamed Elsabagh authored at least 21 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Libra: Library Identification in Obfuscated Android Apps.
Proceedings of the Information Security - 26th International Conference, 2023

2022
Streaming and Unbalanced PSI from Function Secret Sharing.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

Detecting and Measuring Misconfigured Manifests in Android Apps.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
DEFInit: An Analysis of Exposed Android Init Routines.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Function Secret Sharing for PSI-CA: With Applications to Private Contact Tracing.
IACR Cryptol. ePrint Arch., 2020

FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware.
Proceedings of the 29th USENIX Security Symposium, 2020

2018
On early detection of application-level resource exhaustion and starvation.
J. Syst. Softw., 2018

Resilient and Scalable Cloned App Detection Using Forced Execution and Compression Trees.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Practical and Accurate Runtime Application Protection Against DoS Attacks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Detecting ROP with Statistical Learning of Program Characteristics.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Strict Virtual Call Integrity Checking for C++ Binaries.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Targeted DoS on android: how to disable android in 10 seconds or less.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

2013
Behavioral Analysis of Android Applications Using Automated Instrumentation.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

2011
AROMA: automatic generation of radio maps for localization systems.
Proceedings of the 6th ACM International Workshop on Wireless Network Testbeds, 2011

Practical Provably Secure Communication for Half-Duplex Radios.
Proceedings of IEEE International Conference on Communications, 2011

Synthetic Generation of Radio Maps for Device-Free Passive Localization.
Proceedings of the Global Communications Conference, 2011

2010
Automatic Generation of Radio Maps for Localization Systems.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010

ARQ security in Wi-Fi and RFID networks.
Proceedings of the 48th Annual Allerton Conference on Communication, 2010


  Loading...