What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mustaque Ahamad
Google Scholar
29
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/soups
Comparing Malware Evasion Theory with Practice: Results from Interviews with Expert Analysts.
Miuyin Yong Wong
Matthew Landen
Frank Li
Fabian Monrose
Mustaque Ahamad
2023
conf/uss
Combating Robocalls with Phone Virtual Assistant Mediated Interaction.
Sharbani Pandit
Krishanu Sarker
Roberto Perdisci
Mustaque Ahamad
Diyi Yang
2021
conf/ccs
An Inside Look into the Practice of Malware Analysis.
Miuyin Yong Wong
Matthew Landen
Manos Antonakakis
Douglas M. Blough
Elissa M. Redmiles
Mustaque Ahamad
2021
conf/sp
Applying Deep Learning to Combat Mass Robocalls.
Sharbani Pandit
Jienan Liu
Roberto Perdisci
Mustaque Ahamad
2021
conf/dsn
Compromised Computers Meet Voice Assistants: Stealthily Exfiltrating Data as Voice over Telephony.
Zhengxian He
Mohit Narayan Rajput
Mustaque Ahamad
2020
conf/acsac
Towards a Practical Differentially Private Collaborative Phone Blacklisting System.
Daniele Ucci
Roberto Perdisci
Jaewoo Lee
Mustaque Ahamad
2018
conf/ccs
Towards Measuring the Role of Phone Numbers in Twitter-Advertised Spam.
Payas Gupta
Roberto Perdisci
Mustaque Ahamad
2018
conf/ndss
Towards Measuring the Effectiveness of Telephony Blacklists.
Sharbani Pandit
Roberto Perdisci
Mustaque Ahamad
Payas Gupta
2017
conf/eurosp
SoK: Fraud in Telephony Networks.
Merve Sahin
Aurélien Francillon
Payas Gupta
Mustaque Ahamad
2017
conf/ndss
Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis.
Claude Fachkha
Elias Bou-Harb
Anastasis Keliris
Nasir D. Memon
Mustaque Ahamad
2016
conf/ccs
MobiPot: Understanding Mobile Telephony Threats with Honeycards.
Marco Balduzzi
Payas Gupta
Lion Gu
Debin Gao
Mustaque Ahamad
2016
conf/ccs
Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks.
Srishti Gupta
Payas Gupta
Mustaque Ahamad
Ponnurangam Kumaraguru
2016
conf/uss
Towards Measuring and Mitigating Social Engineering Software Download Attacks.
Terry Nelms
Roberto Perdisci
Manos Antonakakis
Mustaque Ahamad
2016
conf/esorics
Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution.
Bharat Srinivasan
Payas Gupta
Manos Antonakakis
Mustaque Ahamad
2015
conf/uss
WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths.
Terry Nelms
Roberto Perdisci
Manos Antonakakis
Mustaque Ahamad
2015
conf/ndss
Phoneypot: Data-driven Understanding of Telephony Threats.
Payas Gupta
Bharat Srinivasan
Vijay Balasubramaniyan
Mustaque Ahamad
2013
conf/uss
ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates.
Terry Nelms
Roberto Perdisci
Mustaque Ahamad
2012
conf/uss
Enabling Robust Information Accountability in E-healthcare Systems.
Daisuke Mashima
Mustaque Ahamad
2012
conf/esorics
Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties.
Italo Dacosta
Mustaque Ahamad
Patrick Traynor
2010
conf/ccs
PinDr0p: using single-ended audio features to determine call provenance.
Vijay A. Balasubramaniyan
Aamir Poonawalla
Mustaque Ahamad
Michael T. Hunter
Patrick Traynor
2010
conf/uss
Protecting E-healthcare Client Devices against Malware and Physical Theft.
Daisuke Mashima
Abhinav Srivastava
Jonathon T. Giffin
Mustaque Ahamad
2009
conf/esorics
User-Centric Handling of Identity Agent Compromise.
Daisuke Mashima
Mustaque Ahamad
Swagath Kannan
2005
conf/soups
Attacking information visualization system usability overloading and deceiving the human.
Gregory J. Conti
Mustaque Ahamad
John T. Stasko
2004
conf/esorics
Parameterized Authentication.
Michael J. Covington
Mustaque Ahamad
Irfan A. Essa
H. Venkateswaran
2004
conf/dsn
Collective Endorsement and the Dissemination Problem in Malicious Environments.
Subramanian Lakshmanan
Deepak J. Manohar
Mustaque Ahamad
H. Venkateswaran
2003
conf/ccs
Attack resistant cache replacement for survivable services.
Vinay Manivel
Mustaque Ahamad
H. Venkateswaran
2002
conf/nspw
Guarding the next Internet frontier: countering denial of information attacks.
Mustaque Ahamad
Leo Mark
Wenke Lee
Edward Omicienski
Andre dos Santos
Ling Liu
Calton Pu
2002
conf/acsac
A Context-Aware Security Architecture for Emerging Applications.
Michael J. Covington
Prahlad Fogla
Zhiyuan Zhan
Mustaque Ahamad
2001
conf/dsn
A Secure and Highly Available Distributed Store for Meeting Diverse Data Storage Needs.
Subramanian Lakshmanan
Mustaque Ahamad
H. Venkateswaran
Coauthors
Aamir Poonawalla
(1)
Abhinav Srivastava
(1)
Anastasis Keliris
(1)
Andre dos Santos
(1)
Aurélien Francillon
(1)
Bharat Srinivasan
(2)
Calton Pu
(1)
Claude Fachkha
(1)
Daisuke Mashima
(3)
Daniele Ucci
(1)
Debin Gao
(1)
Deepak J. Manohar
(1)
Diyi Yang
(1)
Douglas M. Blough
(1)
Edward Omicienski
(1)
Elias Bou-Harb
(1)
Elissa M. Redmiles
(1)
Fabian Monrose
(1)
Frank Li
(1)
Gregory J. Conti
(1)
H. Venkateswaran
(4)
Irfan A. Essa
(1)
Italo Dacosta
(1)
Jaewoo Lee
(1)
Jienan Liu
(1)
John T. Stasko
(1)
Jonathon T. Giffin
(1)
Krishanu Sarker
(1)
Leo Mark
(1)
Ling Liu
(1)
Lion Gu
(1)
Manos Antonakakis
(4)
Marco Balduzzi
(1)
Matthew Landen
(2)
Merve Sahin
(1)
Michael J. Covington
(2)
Michael T. Hunter
(1)
Miuyin Yong Wong
(2)
Mohit Narayan Rajput
(1)
Mustaque Ahamad
(29)
Nasir D. Memon
(1)
Patrick Traynor
(2)
Payas Gupta
(7)
Ponnurangam Kumaraguru
(1)
Prahlad Fogla
(1)
Roberto Perdisci
(8)
Sharbani Pandit
(3)
Srishti Gupta
(1)
Subramanian Lakshmanan
(2)
Swagath Kannan
(1)
Terry Nelms
(3)
Vijay A. Balasubramaniyan
(1)
Vijay Balasubramaniyan
(1)
Vinay Manivel
(1)
Wenke Lee
(1)
Zhengxian He
(1)
Zhiyuan Zhan
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to