Mustaque Ahamad

Orcid: 0000-0002-7955-5126

Affiliations:
  • Georgia Institute of Technology, Atlanta GA, USA


According to our database1, Mustaque Ahamad authored at least 138 papers between 1984 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SoK: An Essential Guide For Using Malware Sandboxes In Security Applications: Challenges, Pitfalls, and Lessons Learned.
CoRR, 2024

Corrective or Backfire: Characterizing and Predicting User Response to Social Correction.
Proceedings of the 16th ACM Web Science Conference, 2024

2023
Reinforcement Learning-based Counter-Misinformation Response Generation: A Case Study of COVID-19 Vaccine Misinformation.
Proceedings of the ACM Web Conference 2023, 2023

Combating Robocalls with Phone Virtual Assistant Mediated Interaction.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Cross-Platform Multimodal Misinformation: Taxonomy, Characteristics and Detection for Textual Posts and Videos.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

2021
Applying Deep Learning to Combat Mass Robocalls.
Proceedings of the IEEE Security and Privacy Workshops, 2021

PETGEN: Personalized Text Generation Attack on Deep Sequence Embedding-based Classification Models.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Compromised Computers Meet Voice Assistants: Stealthily Exfiltrating Data as Voice over Telephony.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

An Inside Look into the Practice of Malware Analysis.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Using Inaudible Audio and Voice Assistants to Transmit Sensitive Data over Telephony.
CoRR, 2020

Fighting Voice Spam with a Virtual Assistant Prototype.
CoRR, 2020

Building a Collaborative Phone Blacklisting System with Local Differential Privacy.
CoRR, 2020

The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Towards a Practical Differentially Private Collaborative Phone Blacklisting System.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2018
Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support Scammers.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Under the Shadow of Sunshine: Characterizing Spam Campaigns Abusing Phone Numbers Across Online Social Networks.
Proceedings of the 10th ACM Conference on Web Science, 2018

Towards Measuring the Effectiveness of Telephony Blacklists.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Towards Measuring the Role of Phone Numbers in Twitter-Advertised Spam.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
By Hook or by Crook: Exposing the Diverse Abuse Tactics of Technical Support Scammers.
CoRR, 2017

Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

SoK: Fraud in Telephony Networks.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
Towards Measuring and Mitigating Social Engineering Software Download Attacks.
Proceedings of the 25th USENIX Security Symposium, 2016

Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution.
Proceedings of the Computer Security - ESORICS 2016, 2016

Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

MobiPot: Understanding Mobile Telephony Threats with Honeycards.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Abusing Phone Numbers and Cross-Application Features for Crafting Targeted Attacks.
CoRR, 2015

WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths.
Proceedings of the 24th USENIX Security Symposium, 2015

Phoneypot: Data-driven Understanding of Telephony Threats.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Augmenting security and accountability within the eHealth Exchange.
IBM J. Res. Dev., 2014

Combating Abuse of Health Data in the Age of eHealth Exchange.
Proceedings of the 2014 IEEE International Conference on Healthcare Informatics, 2014

2013
ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens.
ACM Trans. Internet Techn., 2012

Enabling Robust Information Accountability in E-healthcare Systems.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

Enhancing accountability of electronic health record usage via patient-centric monitoring.
Proceedings of the ACM International Health Informatics Symposium, 2012

Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties.
Proceedings of the Computer Security - ESORICS 2012, 2012

Protecting health information on mobile devices.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Improving Authentication Performance of Distributed SIP Proxies.
IEEE Trans. Parallel Distributed Syst., 2011

2010
Protecting E-healthcare Client Devices against Malware and Physical Theft.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

PinDr0p: using single-ended audio features to determine call provenance.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Packet scheduling for deep packet inspection on multi-core architectures.
Proceedings of the 2010 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2010

2009
User-Centric Handling of Identity Agent Compromise.
Proceedings of the Computer Security, 2009

Using identity credential usage logs to detect anomalous service accesses.
Proceedings of the 5th Workshop on Digital Identity Management, 2009

2008
Privacy analysis and enhancements for data sharing in *nix systems.
Int. J. Inf. Comput. Secur., 2008

SERvartuka: Dynamic Distribution of State to Improve SIP Server Scalability.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Protectit: trusted distributed services operating on sensitive data.
Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, 2008

ALPACA: a lightweight platform for analyzing claim acceptability.
Proceedings of the 2nd ACM Workshop on Information Credibility on the Web, 2008

2007
Countering feedback sparsity and manipulation in reputation systems.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation.
Proceedings of the CEAS 2007, 2007

2006
Trade-offs between reliability and overheads in peer-to-peer reputation tracking.
Comput. Networks, 2006

Countering Security Information Overload through Alert and Packet Visualization.
IEEE Computer Graphics and Applications, 2006

FeedEx: collaborative exchange of news feeds.
Proceedings of the 15th international conference on World Wide Web, 2006

Privacy Analysis for Data Sharing in *nix Systems.
Proceedings of the 2006 USENIX Annual Technical Conference, Boston, MA, USA, May 30, 2006

2005
A Framework for Countering Denial-of-Information Attacks.
IEEE Secur. Priv., 2005

Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries.
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005

Agile Store: Experience with Quorum-Based Data Replication Techniques for Adaptive Byzantine Fault Tolerance.
Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems (SRDS 2005), 2005

Attacking information visualization system usability overloading and deceiving the human.
Proceedings of the 1st Symposium on Usable Privacy and Security, 2005

Incentives in BitTorrent induce free riding.
Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems, 2005

Improving Service Performance through Object Replication in Middleware: A Peer-to-Peer Approach.
Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), 31 August, 2005

Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall.
Proceedings of the Intelligence and Security Informatics, 2005

Mixed Consistency Model: Meeting Data Sharing Needs of Heterogeneous Users.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

Robust Information Dissemination in Uncooperative Environments.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

Preference-aware overlay topologies for group communication.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Harnessing Shared Wide-area Clusters for Dynamic High End Services.
Proceedings of the 2005 IEEE International Conference on Cluster Computing (CLUSTER 2005), September 26, 2005

2004
GT-P2PRMI: Improving Middleware Performance Using Peer-to-Peer Service Replication.
Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 2004

Parameterized Authentication.
Proceedings of the Computer Security, 2004

Collective Endorsement and the Dissemination Problem in Malicious Environments.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Resisting SPAM Delivery by TCP Damping.
Proceedings of the CEAS 2004, 2004

2003
Responsive Security for Stored Data.
IEEE Trans. Parallel Distributed Syst., 2003

A Reconfigurable Byzantine Quorum Approach for the Agile Store.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

Attack resistant cache replacement for survivable services.
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003

Ordering vs Timeliness: Two Facets of Consistency?
Proceedings of the Future Directions in Distributed Computing, 2003

2002
Flexible Robust Programming in Distributed Object Systems.
IEEE Trans. Knowl. Data Eng., 2002

Real-time based strong consistency for distributed objects.
Comput. Syst. Sci. Eng., 2002

Guarding the next Internet frontier: countering denial of information attacks.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002

A Context-Aware Security Architecture for Emerging Applications.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
Securing context-aware applications using environment roles.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

Generalized Role-Based Access Control.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

Shared State Consistency for Time-Sensitive Distributed Applications.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

A Secure and Highly Available Distributed Store for Meeting Diverse Data Storage Needs.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

2000
1/k phase stamping for continuous shared data (extended abstract).
Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, 2000

Distributed Object Implementations for Interactive Applications.
Proceedings of the Middleware 2000, 2000

1999
Scalable Consistency Protocols for Distributed Services.
IEEE Trans. Parallel Distributed Syst., 1999

An adaptive architecture for causally consistent distributed services.
Distributed Syst. Eng., 1999

Plausible Clocks: Constant Size Logical Clocks for Distributed Systems.
Distributed Comput., 1999

Workload Modeling for Highly Interactive Applications.
Proceedings of the 1999 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 1999

Timed Consistency for Shared Distributed Objects.
Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing, 1999

PASS - A service for Efficient Large Scale Dissemination of Time Varying Data Using CORBA.
Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31, 1999

1998
Indigo: user-level support for building distributed shared abstractions.
Concurr. Pract. Exp., 1998

Lifetime Based Consistency Protocols for Distributed Objects.
Proceedings of the Distributed Computing, 12th International Symposium, 1998

RAVEL, a support system for the development of distributed, multi-user VE applications.
Proceedings of the 1998 Virtual Reality Annual International Symposium, 1998

Responsiveness and Consistency Tradoffs in Interactive Groupware.
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998

Exploiting write semantics in implementing partially replicated causal objects.
Proceedings of the Sixth Euromicro Workshop on Parallel and Distributed Processing, 1998

Robust State Sharing for Wide Area Distributed Applications.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998

Flexible Batching and Consistency Mechanisms for Building Interactive Groupware Applications.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998

An Adaptive Protocol for Implementing Causally Consistent Distributed Services.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998

Efficient Implementation of Java Remote Method Invocation (RMI).
Proceedings of the 4th USENIX Conference on Object-Oriented Technologies and Systems (COOTS), 1998

1997
Exploiting Temporal and Spatial Constraints on Distributed Shared Objects.
Proceedings of the 17th International Conference on Distributed Computing Systems, 1997

From serializable to causal transactions for collaborative applications.
Proceedings of the 23rd EUROMICRO Conference '97, 1997

1996
Object Caching in a CORBA Compliant System.
Comput. Syst., 1996

Scalable information sharing in large scale distributed systems.
Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996

From Serializable to Causal Transactions (Abstract).
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996

A Scalable Technique for Implementing Multiple Consistency Levels for Distributed Objects.
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996

1995
Causal Memory: Definitions, Implementation, and Programming.
Distributed Comput., 1995

Optimizing a Generalized Polling Protocol for Resource Finding over a Multiple Access Channel.
Comput. Networks ISDN Syst., 1995

System Support for Robust Collaborative Applications.
Proceedings of the 14th Symposium on Reliable Distributed Systems, 1995

1994
Detecting Mutual Consistency of Shared Objects.
Proceedings of the First Workshop on Mobile Computing Systems and Applications, 1994

Causal Memory Meets the Consistency and Performance Needs of Distributed Applications.
Proceedings of the 6th ACM SIGOPS European Workshop: Matching Operating Systems to Application Needs, 1994

1993
The Power of Processor Consistency.
Proceedings of the 5th Annual ACM Symposium on Parallel Algorithms and Architectures, 1993

A Characterization of Scalable Shared Memories.
Proceedings of the 1993 International Conference on Parallel Processing, 1993

Coherence, Synchronization and State-sharing in Distributed Shared-memory Applications.
Proceedings of the 1993 International Conference on Parallel Processing, 1993

1992
The Grid Protocol: A High Performance Scheme for Maintaining Replicated Data.
IEEE Trans. Knowl. Data Eng., 1992

1991
Multidimensional Voting.
ACM Trans. Comput. Syst., 1991

The Clouds Distributed Operating System.
Computer, 1991

Resource Finding in Store-and-Forward Networks.
Acta Informatica, 1991

Causal Memory.
Proceedings of the Distributed Algorithms, 5th International Workshop, 1991

Implementing and programming causal distributed shared memory.
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1991), 1991

1990
Fault-Tolerant Atomic Computations in an Object-Based Distributed System.
Distributed Comput., 1990

Optimizing the Performance of Quorum Consensus Replica Control Protocols.
Proceedings of the First Workshop on the Management of Replicated Data, 1990

Slow Memory: Weakening Consistency to Enchance Concurrency in Distributed Shared Memories.
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1990), May 28, 1990

Multi-Dimensional Voting: A General Method for Implementing Synchronization in Distributed Systems.
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1990), May 28, 1990

Checkpointing and rollback-recovery in distributed object based systems.
Proceedings of the 20th International Symposium on Fault-Tolerant Computing, 1990

1989
Performance Characterization of Quorum-Consensus Algorithms for Replicated Data.
IEEE Trans. Software Eng., 1989

Optimizing Vote and Quorum Assignments for Reading and Writing Replicated Data.
IEEE Trans. Knowl. Data Eng., 1989

The Design and Implementation of the Clouds Distributed Operating System.
Comput. Syst., 1989

Applying a Path-Compression technique to Obtain an Efficient Distributed Mutual Exclusion Algorithm.
Proceedings of the Distributed Algorithms, 1989

Using Checkpoints to Localize the Effects of Faults in Distributed Systems.
Proceedings of the Eigthth Symposium on Reliable Distributed Systems, 1989

Using multicast communication for dynamic load balancing in local area networks.
Proceedings of the 14th Conference on Local Computer Networks, 1989

Optimal Selection of Multicast Groups for Resource Location on a Distributed System.
Proceedings of the Proceedings IEEE INFOCOM '89, 1989

Coherence of Distributed Shared Memory: Unifying Synchronization and Data Transfer.
Proceedings of the International Conference on Parallel Processing, 1989

Low Cost Algorithms for Message Delivery in Dynamic Multicast Groups.
Proceedings of the 9th International Conference on Distributed Computing Systems, 1989

1988
Using multicast communication to locate resources in LAN-based distributed system.
Proceedings of the 13th Conference on Local Computer Networks, 1988

Using hint tables to locate resources in distributed systems.
Proceedings of the Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?, 1988

1987
An Efficient Algorithm for Name Resolution in Computer Networks.
Comput. Networks, 1987

Fault Tolerant Computing in Object Based Distributed Operating Systems.
Proceedings of the Sixth Symposium on Reliability in Distributed Software and Database Systems, 1987

Performance Characterization of Quorum-Consensus Allgorihms for Replicated Data.
Proceedings of the Sixth Symposium on Reliability in Distributed Software and Database Systems, 1987

1985
An Application of Name Based Addressing to Low Level Distributed Algorithms.
IEEE Trans. Software Eng., 1985

Multicast Communication in UNIX 4.2BSD.
Proceedings of the 5th International Conference on Distributed Computing Systems, 1985

1984
Executing Distributed Prolog Programs on a Broadcast Network.
Proceedings of the 1984 International Symposium on Logic Programming, 1984


  Loading...