Mohannad Alhanahnah

Orcid: 0000-0001-7108-3809

According to our database1, Mohannad Alhanahnah authored at least 21 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Machine Learning Systems are Bloated and Vulnerable.
Proc. ACM Meas. Anal. Comput. Syst., 2024

2023
IoTCom: Dissecting Interaction Threats in IoT Systems.
IEEE Trans. Software Eng., April, 2023

autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning.
IEEE Trans. Software Eng., April, 2023

slash: A Technique for Static Configuration-Logic Identification.
CoRR, 2023

Unleashing the Adversarial Facet of Software Debloating.
CoRR, 2023

BLAFS: A Bloat Aware File System.
CoRR, 2023

2022
Machine Learning Containers are Bloated and Vulnerable.
CoRR, 2022

Practical Data Access Minimization in Trigger-Action Platforms.
Proceedings of the 31st USENIX Security Symposium, 2022

Robust Learning against Relational Adversaries.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Lightweight, Multi-Stage, Compiler-Assisted Application Specialization.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

2020
DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code.
IEEE Trans. Inf. Forensics Secur., 2020

Software Quality Assessment for Robot Operating System.
CoRR, 2020

Scalable analysis of interaction threats in IoT systems.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

2019
Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

2018
Context-Aware Multifaceted Trust Framework For Evaluating Trustworthiness of Cloud Providers.
Future Gener. Comput. Syst., 2018

Towards best secure coding practice for implementing SSL/TLS.
Proceedings of the IEEE INFOCOM 2018, 2018

Efficient Signature Generation for Classifying Cross-Architecture IoT Malware.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Trusting Cloud Service Providers: Trust Phases and a Taxonomy of Trust Factors.
IEEE Cloud Comput., 2017

2016
A Multidimension Taxonomy of Insider Threats in Cloud Computing.
Comput. J., 2016

Breast Cancer Detection Using K-Nearest Neighbor Machine Learning Algorithm.
Proceedings of the 9th International Conference on Developments in eSystems Engineering, 2016

Boosting Usability for Protecting Online Banking Applications Against APTs.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016


  Loading...