What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mohammad Mannan
Google Scholar
48
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/ccs
Poster: Detecting Ransomware Attacks by Analyzing Replicated Block Snapshots Using Neural Networks.
Seok Min Hong
Beom Heyn Kim
Mohammad Mannan
2024
conf/uss
Racing for TLS Certificate Validation: A Hijacker's Guide to the Android TLS Galaxy.
Sajjad Pourali
Xiufen Yu
Lianying Zhao
Mohammad Mannan
Amr M. Youssef
2024
conf/eurosp
"Trust Me Over My Privacy Policy": Privacy Discrepancies in Romantic AI Chatbot Apps.
Abdelrahman Ragab
Mohammad Mannan
Amr M. Youssef
2023
conf/uss
"My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software.
Jonah Stegman
Patrick J. Trottier
Caroline Hillier
Hassan Khan
Mohammad Mannan
2023
conf/esorics
Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps.
Abdelrahman Ragab
Mohammad Mannan
Amr M. Youssef
2022
journals/compsec
Blindfold: Keeping private keys in PKIs and CDNs out of sight.
Hisham S. Galal
Mohammad Mannan
Amr M. Youssef
2022
conf/ccs
Hidden in Plain Sight: Exploring Encrypted Channels in Android Apps.
Sajjad Pourali
Nayanamana Samarasinghe
Mohammad Mannan
2022
conf/fc
Not so Immutable: Upgradeability of Smart Contracts on Ethereum.
Mehdi Salehi
Jeremy Clark
Mohammad Mannan
2022
conf/eurosp
Got Sick and Tracked: Privacy Analysis of Hospital Websites.
Xiufen Yu
Nayanamana Samarasinghe
Mohammad Mannan
Amr M. Youssef
2022
conf/eurosp
SAUSAGE: Security Analysis of Unix domain Socket usAGE in Android.
Mounir Elgharabawy
Blas Kojusner
Mohammad Mannan
Kevin R. B. Butler
Byron Williams
Amr M. Youssef
2022
conf/esorics
No Salvation from Trackers: Privacy Analysis of Religious Websites and Mobile Apps.
Nayanamana Samarasinghe
Pranay Kapoor
Mohammad Mannan
Amr M. Youssef
2022
conf/asiaccs
On Measuring Vulnerable JavaScript Functions in the Wild.
Maryna Kluban
Mohammad Mannan
Amr M. Youssef
2021
journals/compsec
On cloaking behaviors of malicious websites.
Nayanamana Samarasinghe
Mohammad Mannan
2021
conf/fc
Red-Black Coins: Dai Without Liquidations.
Mehdi Salehi
Jeremy Clark
Mohammad Mannan
2020
conf/uss
Chaperone: Real-time Locking and Loss Prevention for Smartphones.
Jiayi Chen
Urs Hengartner
Hassan Khan
Mohammad Mannan
2020
conf/acsac
Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices.
Kuniyasu Suzaki
Akira Tsukamoto
Andy Green
Mohammad Mannan
2020
conf/acsac
Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions.
Suzan Ali
Mounir Elgharabawy
Quentin Duchaussoy
Mohammad Mannan
Amr M. Youssef
2019
journals/compsec
Another look at TLS ecosystems in networked devices vs. Web servers.
Nayanamana Samarasinghe
Mohammad Mannan
2019
journals/compsec
Towards a global perspective on web tracking.
Nayanamana Samarasinghe
Mohammad Mannan
2019
conf/fc
One-Time Programs Made Practical.
Lianying Zhao
Joseph I. Choi
Didem Demirag
Kevin R. B. Butler
Mohammad Mannan
Erman Ayday
Jeremy Clark
2019
conf/esorics
On Privacy Risks of Public WiFi Captive Portals.
Suzan Ali
Tousif Osman
Mohammad Mannan
Amr M. Youssef
2019
conf/ndss
TEE-aided Write Protection Against Privileged Data Tampering.
Lianying Zhao
Mohammad Mannan
2019
conf/dsn
DeviceVeil: Robust Authentication for Individual USB Devices Using Physical Unclonable Functions.
Kuniyasu Suzaki
Yohei Hori
Kazukuni Kobara
Mohammad Mannan
2019
conf/acsac
AppVeto: mobile application self-defense through resource access veto.
Tousif Osman
Mohammad Mannan
Urs Hengartner
Amr M. Youssef
2018
conf/ccs
To Intercept or Not to Intercept: Analyzing TLS Interception in Network Appliances.
Louis Waked
Mohammad Mannan
Amr M. Youssef
2017
conf/fc
Short Paper: TLS Ecosystems in Networked Devices vs. Web Servers.
Nayanamana Samarasinghe
Mohammad Mannan
2016
journals/istr
An evaluation of recent secure deduplication proposals.
Vladimir Rabotka
Mohammad Mannan
2016
journals/tifs
Deceptive Deletion Triggers Under Coercion.
Lianying Zhao
Mohammad Mannan
2016
conf/ccs
Hypnoguard: Protecting Secrets across Sleep-wake Cycles.
Lianying Zhao
Mohammad Mannan
2016
conf/ccs
Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016).
Long Lu
Mohammad Mannan
2016
conf/ndss
Killed by Proxy: Analyzing Client-end TLS Interception Software.
Xavier de Carné de Carnavalet
Mohammad Mannan
2015
conf/nspw
Peace vs. Privacy: Leveraging Conflicting Jurisdictions for Email Security.
Mohammad Mannan
Arash Shahkar
Atieh Saberi Pirouz
Vladimir Rabotka
2015
conf/ndss
Gracewipe: Secure and Verifiable Deletion under Coercion.
Lianying Zhao
Mohammad Mannan
2014
conf/ndss
From Very Weak to Very Strong: Analyzing Password-Strength Meters.
Xavier de Carné de Carnavalet
Mohammad Mannan
2014
conf/acsac
Challenges and implications of verifiable builds for security-critical open-source software.
Xavier de Carné de Carnavalet
Mohammad Mannan
2013
conf/nspw
Explicit authentication response considered harmful.
Lianying Zhao
Mohammad Mannan
2013
conf/ndss
On Implementing Deniable Storage Encryption for Mobile Devices.
Adam Skillen
Mohammad Mannan
2012
conf/wisa
Lightweight Client-Side Methods for Detecting Email Forgery.
Eric Lin
John Aycock
Mohammad Mannan
2011
journals/tifs
User Study, Analysis, and Usable Security of Passwords Based on Digital Objects.
Robert Biddle
Mohammad Mannan
Paul C. van Oorschot
Tara Whalen
2011
conf/ccs
Unicorn: two-factor attestation for data security.
Mohammad Mannan
Beom Heyn Kim
Afshar Ganjali
David Lie
2011
conf/fc
Mercury: Recovering Forgotten Passwords Using Personal Devices.
Mohammad Mannan
David Barrera
Carson D. Brown
David Lie
Paul C. van Oorschot
2009
journals/compsec
Reducing threats from flawed security APIs: The banking PIN case.
Mohammad Mannan
Paul C. van Oorschot
2008
conf/uss
Digital Objects as Passwords.
Mohammad Mannan
Paul C. van Oorschot
2008
conf/fc
Weighing Down "The Unbearable Lightness of PIN Cracking".
Mohammad Mannan
Paul C. van Oorschot
2008
conf/nspw
Localization of credential information to address increasingly inevitable data breaches.
Mohammad Mannan
Paul C. van Oorschot
2007
conf/fc
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer.
Mohammad Mannan
Paul C. van Oorschot
2007
conf/nspw
Security and usability: the gap in real-world online banking.
Mohammad Mannan
Paul C. van Oorschot
2006
conf/fc
A Protocol for Secure Public Instant Messaging.
Mohammad Mannan
Paul C. van Oorschot
Coauthors
Abdelrahman Ragab
(2)
Adam Skillen
(1)
Afshar Ganjali
(1)
Akira Tsukamoto
(1)
Amr M. Youssef
(12)
Andy Green
(1)
Arash Shahkar
(1)
Atieh Saberi Pirouz
(1)
Beom Heyn Kim
(2)
Blas Kojusner
(1)
Byron Williams
(1)
Caroline Hillier
(1)
Carson D. Brown
(1)
David Barrera
(1)
David Lie
(2)
Didem Demirag
(1)
Eric Lin
(1)
Erman Ayday
(1)
Hassan Khan
(2)
Hisham S. Galal
(1)
Jeremy Clark
(3)
Jiayi Chen
(1)
John Aycock
(1)
Jonah Stegman
(1)
Joseph I. Choi
(1)
Kazukuni Kobara
(1)
Kevin R. B. Butler
(2)
Kuniyasu Suzaki
(2)
Lianying Zhao
(7)
Long Lu
(1)
Louis Waked
(1)
Maryna Kluban
(1)
Mehdi Salehi
(2)
Mohammad Mannan
(48)
Mounir Elgharabawy
(2)
Nayanamana Samarasinghe
(7)
Patrick J. Trottier
(1)
Paul C. van Oorschot
(9)
Pranay Kapoor
(1)
Quentin Duchaussoy
(1)
Robert Biddle
(1)
Sajjad Pourali
(2)
Seok Min Hong
(1)
Suzan Ali
(2)
Tara Whalen
(1)
Tousif Osman
(2)
Urs Hengartner
(2)
Vladimir Rabotka
(2)
Xavier de Carné de Carnavalet
(3)
Xiufen Yu
(2)
Yohei Hori
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to