Nahid Shahmehri

Orcid: 0000-0002-0920-2157

Affiliations:
  • Linköping University, Sweden


According to our database1, Nahid Shahmehri authored at least 104 papers between 1988 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
desync-cc: A research tool for automatically applying disassembly desynchronization during compilation.
Sci. Comput. Program., June, 2023

Android decompiler performance on benign and malicious apps: an empirical study.
Empir. Softw. Eng., March, 2023

Characterizing the Use of Code Obfuscation in Malicious and Benign Android Apps.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
desync-cc: An Automatic Disassembly-Desynchronization Obfuscator.
Proceedings of the IEEE International Conference on Software Analysis, 2022

2021
A Large-Scale Empirical Study of Android App Decompilation.
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021

2019
Comment on "AndrODet: An adaptive Android obfuscation detector".
CoRR, 2019

Robust Detection of Obfuscated Strings in Android Apps.
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, 2019

2018
Speeding Up Bug Finding using Focused Fuzzing.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Collaborative framework for protection against attacks targeting BGP and edge networks.
Comput. Networks, 2017

Towards robust instruction-level trace alignment of binary code.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

2016
A Look at the Third-Party Identity Management Landscape.
IEEE Internet Comput., 2016

Does scale, size, and locality matter? Evaluation of collaborative BGP security mechanisms.
Proceedings of the 2016 IFIP Networking Conference, 2016

Towards Accurate Binary Correspondence Using Runtime-Observed Values.
Proceedings of the 2016 IEEE International Conference on Software Maintenance and Evolution, 2016

2015
Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Bandwidth-aware Prefetching for Proactive Multi-video Preloading and Improved HAS Performance.
Proceedings of the 23rd Annual ACM Conference on Multimedia Conference, MM '15, Brisbane, Australia, October 26, 2015

Information Sharing and User Privacy in the Third-party Identity Management Landscape.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Crowd-based detection of routing anomalies on the internet.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Efficient Utilization of Secondary Storage for Scalable Dynamic Slicing.
Proceedings of the 14th IEEE International Working Conference on Source Code Analysis and Manipulation, 2014

Third-Party Identity Management Usage on the Web.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

Quality-adaptive Prefetching for Interactive Branched Video using HTTP-based Adaptive Streaming.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

PrefiSec: A Distributed Alliance Framework for Collaborative BGP Monitoring and Prefix-based Security.
Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, 2014

2013
Empowering the creative user: personalized HTTP-based adaptive streaming of multi-path nonlinear video.
Comput. Commun. Rev., 2013

Helping Hand or Hidden Hurdle: Proxy-Assisted HTTP-Based Adaptive Streaming Performance.
Proceedings of the 2013 IEEE 21st International Symposium on Modelling, 2013

2012
An advanced approach for modeling and detecting software vulnerabilities.
Inf. Softw. Technol., 2012

Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

InputTracer: A Data-Flow Analysis Tool for Manual Program Comprehension of x86 Binaries.
Proceedings of the 12th IEEE International Working Conference on Source Code Analysis and Manipulation, 2012

2011
2-clickAuth: Optical Challenge-Response Authentication Using Mobile Handsets.
Int. J. Mob. Comput. Multim. Commun., 2011

TRAP: Open Decentralized Distributed Spam Filtering.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

2010
Security Levels for Web Authentication Using Mobile Phones.
Proceedings of the Privacy and Identity Management for Life, 2010

Unified modeling of attacks, vulnerabilities and security activities.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2010

2-clickAuth.
Proceedings of the ARES 2010, 2010

2009
A systematic evaluation of disk imaging in EnCase<sup>®</sup> 6.8 and LinEn 6.1.
Digit. Investig., 2009

Introducing Vulnerability Awareness to Common Criteria's Security Targets.
Proceedings of the Fourth International Conference on Software Engineering Advances, 2009

An Architectural Foundation for Security Model Sharing and Reuse.
Proceedings of the The Forth International Conference on Availability, 2009

Prioritisation and Selection of Software Security Activities.
Proceedings of the The Forth International Conference on Availability, 2009

A Post-Mortem Incident Modeling Method.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Contagious errors: Understanding and avoiding issues with imaging drives containing faulty sectors.
Digit. Investig., 2008

A Cause-Based Approach to Preventing Software Vulnerabilities.
Proceedings of the The Third International Conference on Availability, 2008

Integrating a Security Plug-in with the OpenUP/Basic Development Process.
Proceedings of the The Third International Conference on Availability, 2008

2007
On the Design of Safety Communication Systems for Vehicles.
IEEE Trans. Syst. Man Cybern. Part A, 2007

Usable set-up of runtime security policies.
Inf. Manag. Comput. Secur., 2007

An Ontology of Information Security.
Int. J. Inf. Secur. Priv., 2007

Usability and Security of Personal Firewalls.
Proceedings of the New Approaches for Security, 2007

Privacy in the Semantic Web: What Policy Languages Have to Offer.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

User help techniques for usable security.
Proceedings of the 1st ACM Symposium on Computer Human Interaction for Management of Information Technology, 2007

Design of a Process for Software Security.
Proceedings of the The Second International Conference on Availability, 2007

How can the developer benefit from security modeling?
Proceedings of the The Second International Conference on Availability, 2007

2006
Emergency Information Dissemination in Mobile Networks for Vehicles.
Proceedings of the WINSYS 2006, 2006

Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

A Usability Study of Security Policy Management.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Adaptive Dissemination of Safety Data Among Vehicles.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

Alignment of Biomedical Ontologies Using Life Science Literature.
Proceedings of the Knowledge Discovery in Life Science Literature, 2006

Performance Evaluation of Safety Communication for Vehicles.
Proceedings of the 3rd IEEE International Symposium on Wireless Communication Systems, 2006

Modeling Software VulnerabilitiesWith Vulnerability Cause Graphs.
Proceedings of the 22nd IEEE International Conference on Software Maintenance (ICSM 2006), 2006

Towards a structured unified process for software security.
Proceedings of the 2006 international workshop on Software engineering for secure systems, 2006

Semantic Web Policies - A Discussion of Requirements and Research Issues.
Proceedings of the Semantic Web: Research and Applications, 2006

A Trust-Aware, P2P-Based Overlay for Intrusion Detection.
Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 2006

A Platform to Evaluate the Technology for Service Discovery in the Semantic Web.
Proceedings of the Proceedings, 2006

2005
Performance of the Java security manager.
Comput. Secur., 2005

An Evaluation of Java Application Containers according to Security Requirements.
Proceedings of the 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 2005

An Agent-based Framework for Integrating Workflows and Web Services.
Proceedings of the 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 2005

Dynamic Trust Metrics for Peer-to-Peer Systems.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

What help do older people need?: constructing a functional design space of electronic assistive technology applications.
Proceedings of the ACM SIGACCESS Conference on Computers and Accessibility, 2005

2004
Successful Aging.
IEEE Pervasive Comput., 2004

Vehicular communication - a candidate technology for traffic safety.
Proceedings of the IEEE International Conference on Systems, 2004

A context-based vehicular communication protocol.
Proceedings of the IEEE 15th International Symposium on Personal, 2004

2003
Towards Creating Workflows On-the-Fly and Maintaining Them Using the Semantic Web: The sButler Project at Linköping University.
Proceedings of the Twelfth International World Wide Web Conference - Posters, 2003

A Hybrid Key Tree Scheme for Multicast to Balance Security and Efficiency Requirements.
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003

A Flexible Category-Based Collusion-Restistant Key Management Scheme for Multicast.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

2002
An in-vehicle approach for improving traffic safety through GIS utilization.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Yasmine Hammamet, Tunisia, October 6-9, 2002, 2002

Intelligent Software Delivery Using P2P.
Proceedings of the 2nd International Conference on Peer-to-Peer Computing (P2P 2002), 2002

A Framework for Generating Task Specific Information Extraction Systems.
Proceedings of the Foundations of Intelligent Systems, 13th International Symposium, 2002

2001
Issues in Image Utilization within Mobile E-Services.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

User Modelling for Live Help Systems.
Proceedings of the Electronic Commerce, Second International Workshop, 2001

User Modelling as an Aid for Human Web Assistants.
Proceedings of the User Modeling 2001, 8th International Conference, 2001

User modelling for live help systems: initial results.
Proceedings of the Proceedings 3rd ACM Conference on Electronic Commerce (EC-2001), 2001

Collection and Exploitation of Expert Knowledge in Web Assistant Systems.
Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34), 2001

An empirical study of human Web assistants: implications for user support in Web information systems.
Proceedings of the CHI 2001 Conference on Human Factors in Computing Systems, Seattle, WA, USA, March 31, 2001

2000
Querying Documents using Content, Structure and Properties.
J. Intell. Inf. Syst., 2000

The role of human Web assistants in e-commerce: an analysis and a usability study.
Internet Res., 2000

Secure Multicast Software Delivery.
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000

Towards Secure e-Services.
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000

Template Generation for Identifying Text Patterns.
Proceedings of the Foundations of Intelligent Systems, 12th International Symposium, 2000

1999
Establishing a Secure Multicast Group for Remote Software Delivery.
Proceedings of the 8th Workshop on Enabling Technologies (WETICE '99), 1999

Final Summary Report on Enterprise Security.
Proceedings of the 8th Workshop on Enabling Technologies (WETICE '99), 1999

Querying Document Bases by Content, Structure and Properties.
Proceedings of the Foundations of Intelligent Systems, 11th International Symposium, 1999

Task-Oriented Restructuring of an Application Domain: A Multi-Agent Architecture for Doing Things in Internet E-Mail.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

1998
CAFE: A Conceptual Model for Managing Information in Electronic Mail.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

A Default Extension to Description Logics for Use in an Intelligent Search Engine.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

TRIFU: The Right Information For yoU.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

Coordination in Message-Based Environments: Restructuring Internet E-Mail to Accomplish Tasks.
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998

1997
Using NFS to Implement Role-Based Access Control.
Proceedings of the 6th Workshop on Enabling Technologies (WET-ICE '97), 1997

Dwebic: An Intelligent Search Engine based on Default Description Logics.
Proceedings of the 1997 International Workshop on Description Logics, 1997

1996
An Intelligent Multi-Agent Architecture for Support of Process Reuse in a Workflow Management System.
Proceedings of the First International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology, 1996

1995
Usability criteria for automated debugging systems.
J. Syst. Softw., 1995

1994
Using assertions in declarative and operational models for automated debugging.
J. Syst. Softw., 1994

1993
Three approaches to interprocedural dynamic slicing.
Microprocess. Microprogramming, 1993

Interprocedural Dynamic Slicing Applied to Interprocedural Data How Testing.
Proceedings of the Conference on Software Maintenance, 1993

1992
Generalized Algorithmic Debugging and Testing.
LOPLAS, 1992

Interprocedural Dynamic Slicing.
Proceedings of the Programming Language Implementation and Logic Programming, 1992

1990
Bug Localization by Algorithmic Debugging and Program Slicing.
Proceedings of the Programming Language Implementation and Logic Programming, 1990

Semi-automatic bug localization in software maintenance.
Proceedings of the Conference on Software Maintenance, 1990

Algorithmic Debugging for Imperative Languages with Side-Effects (Abstract).
Proceedings of the Compiler Compilers, 1990

1988
Affect-Chaining and Dependency Oriented Flow Analysis Applied to Queries of Programs.
Proceedings of the 1988 ACM SIGSMALL/PC Symposium on ACTES, May 4-6, 1988, Cannes, France, 1988


  Loading...