What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Irfan Ahmed
Google Scholar
ORCID:
0000-0001-5648-388X
18
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/host
3D Bioprinter Firmware Attacks: Categorization, Implementation, and Impacts.
Muhammad Ahsan
Barry Najarro-Blancas
Johanna Tsala Ebode
Nastassja Lewinski
Irfan Ahmed
2025
conf/host
Wattshield: A Power Side-Channel Framework for Detecting Malicious Firmware in Fused Filament Fabrication.
Muhammad Ahsan
Irfan Ahmed
2025
conf/host
WaveSleuth: Retrospective PLC Memory for Anomaly Detection in Industrial Control Systems.
Nehal A. Mansour
Ramyapandian Vijayakanthan
Adeen Ayub
Aisha I. Ali-Gombe
Irfan Ahmed
2024
journals/compsec
LAAKA: Lightweight Anonymous Authentication and Key Agreement Scheme for Secure Fog-Driven IoT Systems.
Hala S. Ali
Irfan Ahmed
2024
conf/host
Charlie, Charlie, Charlie on Industrial Control Systems: PLC Control Logic Attacks by Design, Not by Chance.
Adeen Ayub
Wooyeon Jo
Irfan Ahmed
2024
conf/acsac
BioSaFe: Bioprinting Security Framework for Detecting Sabotage Attacks on Printability and Cell Viability.
Muhammad Ahsan
Eunice Pak
Kate Jackson
Muhammad Haris Rais
Barry Najarro-Blancas
Nastassja Lewinski
Irfan Ahmed
2023
journals/compsec
SWMAT: Mel-frequency cepstral coefficients-based memory fingerprinting for IoT devices.
Ramyapandian Vijayakanthan
Irfan Ahmed
Aisha I. Ali-Gombe
2023
conf/eurosp
SOK: Side Channel Monitoring for Additive Manufacturing - Bridging Cybersecurity and Quality Assurance Communities.
Muhammad Ahsan
Muhammad Haris Rais
Irfan Ahmed
2023
conf/host
Gadgets of Gadgets in Industrial Control Systems: Return Oriented Programming Attacks on PLCs.
Adeen Ayub
Nauman Zubair
Hyunguk Yoo
Wooyeon Jo
Irfan Ahmed
2022
conf/csr2
Control Logic Obfuscation Attack in Industrial Control Systems.
Nauman Zubair
Adeen Ayub
Hyunguk Yoo
Irfan Ahmed
2021
conf/sp
Empirical Study of PLC Authentication Protocols in Industrial Control Systems.
Adeen Ayub
Hyunguk Yoo
Irfan Ahmed
2019
conf/sec
Control Logic Injection Attacks on Industrial Control Systems.
Hyunguk Yoo
Irfan Ahmed
2017
conf/uss
Peer Instruction for Digital Forensics.
William E. Johnson
Irfan Ahmed
Vassil Roussev
Cynthia Bailey Lee
2017
conf/wisa
Automatic Mitigation of Kernel Rootkits in Cloud Environments.
Jonathan Grimm
Irfan Ahmed
Vassil Roussev
Manish Bhatt
Manpyo Hong
2016
conf/uss
Development of Peer Instruction Questions for Cybersecurity Education.
William E. Johnson
Allison Luzader
Irfan Ahmed
Vassil Roussev
Golden G. Richard III
Cynthia Bailey Lee
2016
conf/wisec
Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content Providers.
Aisha I. Ali-Gombe
Golden G. Richard III
Irfan Ahmed
Vassil Roussev
2015
conf/acsac
OpSeq: Android Malware Fingerprinting.
Aisha I. Ali-Gombe
Irfan Ahmed
Golden G. Richard III
Vassil Roussev
2009
conf/acisp
On Improving the Accuracy and Performance of Content-Based File Type Identification.
Irfan Ahmed
Kyung-suk Lhee
Hyunjung Shin
Manpyo Hong
Coauthors
Adeen Ayub
(5)
Aisha I. Ali-Gombe
(4)
Allison Luzader
(1)
Barry Najarro-Blancas
(2)
Cynthia Bailey Lee
(2)
Eunice Pak
(1)
Golden G. Richard III
(3)
Hala S. Ali
(1)
Hyunguk Yoo
(4)
Hyunjung Shin
(1)
Irfan Ahmed
(18)
Johanna Tsala Ebode
(1)
Jonathan Grimm
(1)
Kate Jackson
(1)
Kyung-suk Lhee
(1)
Manish Bhatt
(1)
Manpyo Hong
(2)
Muhammad Ahsan
(4)
Muhammad Haris Rais
(2)
Nastassja Lewinski
(2)
Nauman Zubair
(2)
Nehal A. Mansour
(1)
Ramyapandian Vijayakanthan
(2)
Vassil Roussev
(5)
William E. Johnson
(2)
Wooyeon Jo
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to