default search action
BibTeX records: Sadegh Torabi
@article{DBLP:journals/tdsc/XingWTZLS24, author = {Yunlong Xing and Xinda Wang and Sadegh Torabi and Zeyu Zhang and Lingguang Lei and Kun Sun}, title = {A Hybrid System Call Profiling Approach for Container Protection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1068--1083}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3268124}, doi = {10.1109/TDSC.2023.3268124}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XingWTZLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/SarieddineSAATKPB24, author = {Khaled Sarieddine and Mohammad Ali Sayed and Chadi Assi and Ribal Atallah and Sadegh Torabi and Joseph Khoury and Morteza Safaei Pour and Elias Bou{-}Harb}, title = {{EV} Charging Infrastructure Discovery to Contextualize Its Deployment Security}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {21}, number = {1}, pages = {1287--1301}, year = {2024}, url = {https://doi.org/10.1109/TNSM.2023.3318406}, doi = {10.1109/TNSM.2023.3318406}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/SarieddineSAATKPB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/SarieddineSTAJA24, author = {Khaled Sarieddine and Mohammad Ali Sayed and Sadegh Torabi and Ribal Attallah and Danial Jafarigiv and Chadi Assi and Mourad Debbabi}, editor = {Jianying Zhou and Tony Q. S. Quek and Debin Gao and Alvaro A. C{\'{a}}rdenas}, title = {Uncovering Covert Attacks on {EV} Charging Infrastructure: How {OCPP} Backend Vulnerabilities Could Compromise Your System}, booktitle = {Proceedings of the 19th {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2024, Singapore, July 1-5, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3634737.3644999}, doi = {10.1145/3634737.3644999}, timestamp = {Fri, 16 Aug 2024 09:08:03 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/SarieddineSTAJA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/Zhang0TA24, author = {Yefei Zhang and Jun Yan and Sadegh Torabi and Chadi Assi}, title = {Securing IoT Malware Classifiers: Dynamic Trigger-Based Attack and Mitigation}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2024, Denver, CO, USA, June 9-13, 2024}, pages = {4638--4643}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICC51166.2024.10622307}, doi = {10.1109/ICC51166.2024.10622307}, timestamp = {Mon, 02 Sep 2024 15:04:36 +0200}, biburl = {https://dblp.org/rec/conf/icc/Zhang0TA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcps/SarieddineSTAA23, author = {Khaled Sarieddine and Mohammad Ali Sayed and Sadegh Torabi and Ribal Atallah and Chadi Assi}, title = {Investigating the Security of {EV} Charging Mobile Applications as an Attack Surface}, journal = {{ACM} Trans. Cyber Phys. Syst.}, volume = {7}, number = {4}, pages = {26:1--26:28}, year = {2023}, url = {https://doi.org/10.1145/3609508}, doi = {10.1145/3609508}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcps/SarieddineSTAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/MolinaBTA23, author = {Ricardo Misael Ayala Molina and Elias Bou{-}Harb and Sadegh Torabi and Chadi Assi}, title = {{RPM:} Ransomware Prevention and Mitigation Using Operating Systems' Sensing Tactics}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2023, Rome, Italy, May 28 - June 1, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICC45041.2023.10279119}, doi = {10.1109/ICC45041.2023.10279119}, timestamp = {Thu, 02 Nov 2023 17:09:41 +0100}, biburl = {https://dblp.org/rec/conf/icc/MolinaBTA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/NasrTBFA23, author = {Tony Nasr and Sadegh Torabi and Elias Bou{-}Harb and Claude Fachkha and Chadi Assi}, title = {ChargePrint: {A} Framework for Internet-Scale Discovery and Security Analysis of {EV} Charging Management Systems}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/chargeprint-a-framework-for-internet-scale-discovery-and-security-analysis-of-ev-charging-management-systems/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/NasrTBFA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-12890, author = {Khaled Sarieddine and Mohammad Ali Sayed and Sadegh Torabi and Ribal Atallah and Chadi Assi}, title = {Edge-Based Detection and Localization of Adversarial Oscillatory Load Attacks Orchestrated By Compromised {EV} Charging Stations}, journal = {CoRR}, volume = {abs/2302.12890}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.12890}, doi = {10.48550/ARXIV.2302.12890}, eprinttype = {arXiv}, eprint = {2302.12890}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-12890.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NasrTBFA22, author = {Tony Nasr and Sadegh Torabi and Elias Bou{-}Harb and Claude Fachkha and Chadi Assi}, title = {Power jacking your station: In-depth security analysis of electric vehicle charging station management systems}, journal = {Comput. Secur.}, volume = {112}, pages = {102511}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102511}, doi = {10.1016/J.COSE.2021.102511}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NasrTBFA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TorabiBAKBD22, author = {Sadegh Torabi and Elias Bou{-}Harb and Chadi Assi and ElMouatez Billah Karbab and Amine Boukhtouta and Mourad Debbabi}, title = {Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {1}, pages = {402--418}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.2979183}, doi = {10.1109/TDSC.2020.2979183}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/TorabiBAKBD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/MolinaTSBBA22, author = {Ricardo Misael Ayala Molina and Sadegh Torabi and Khaled Sarieddine and Elias Bou{-}Harb and Nizar Bouguila and Chadi Assi}, title = {On Ransomware Family Attribution Using Pre-Attack Paranoia Activities}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {19}, number = {1}, pages = {19--36}, year = {2022}, url = {https://doi.org/10.1109/TNSM.2021.3112056}, doi = {10.1109/TNSM.2021.3112056}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/MolinaTSBBA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/DibTBBA22, author = {Mirabelle Dib and Sadegh Torabi and Elias Bou{-}Harb and Nizar Bouguila and Chadi Assi}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {EVOLIoT: {A} Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {452--466}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517393}, doi = {10.1145/3488932.3517393}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/DibTBBA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XingCWTSYL22, author = {Yunlong Xing and Jiahao Cao and Xinda Wang and Sadegh Torabi and Kun Sun and Fei Yan and Qi Li}, title = {SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {236--244}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947248}, doi = {10.1109/CNS56114.2022.9947248}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/XingCWTSYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-10603, author = {Khaled Sarieddine and Mohammad Ali Sayed and Sadegh Torabi and Ribal Atallah and Chadi Assi}, title = {Investigating the Security of {EV} Charging Mobile Applications As an Attack Surface}, journal = {CoRR}, volume = {abs/2211.10603}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.10603}, doi = {10.48550/ARXIV.2211.10603}, eprinttype = {arXiv}, eprint = {2211.10603}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-10603.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeenl/TorabiDBAD21, author = {Sadegh Torabi and Mirabelle Dib and Elias Bou{-}Harb and Chadi Assi and Mourad Debbabi}, title = {A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships}, journal = {{IEEE} Netw. Lett.}, volume = {3}, number = {3}, pages = {161--165}, year = {2021}, url = {https://doi.org/10.1109/lnet.2021.3076600}, doi = {10.1109/LNET.2021.3076600}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeenl/TorabiDBAD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/DibTBA21, author = {Mirabelle Dib and Sadegh Torabi and Elias Bou{-}Harb and Chadi Assi}, title = {A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {18}, number = {2}, pages = {1165--1177}, year = {2021}, url = {https://doi.org/10.1109/TNSM.2021.3075315}, doi = {10.1109/TNSM.2021.3075315}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/DibTBA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TorabiBAD20, author = {Sadegh Torabi and Elias Bou{-}Harb and Chadi Assi and Mourad Debbabi}, title = {A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300922}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300922}, doi = {10.1016/J.FSIDI.2020.300922}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/TorabiBAD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeenl/PourTBAD20, author = {Morteza Safaei Pour and Sadegh Torabi and Elias Bou{-}Harb and Chadi Assi and Mourad Debbabi}, title = {Stochastic Modeling, Analysis and Investigation of IoT-Generated Internet Scanning Activities}, journal = {{IEEE} Netw. Lett.}, volume = {2}, number = {3}, pages = {159--163}, year = {2020}, url = {https://doi.org/10.1109/lnet.2020.2998045}, doi = {10.1109/LNET.2020.2998045}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeenl/PourTBAD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/TorabiBAD18, author = {Sadegh Torabi and Amine Boukhtouta and Chadi Assi and Mourad Debbabi}, title = {Detecting Internet Abuse by Analyzing Passive {DNS} Traffic: {A} Survey of Implemented Systems}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {20}, number = {4}, pages = {3389--3415}, year = {2018}, url = {https://doi.org/10.1109/COMST.2018.2849614}, doi = {10.1109/COMST.2018.2849614}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/TorabiBAD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/TorabiBAGBD18, author = {Sadegh Torabi and Elias Bou{-}Harb and Chadi Assi and Mario Galluscio and Amine Boukhtouta and Mourad Debbabi}, title = {Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: {A} Network Telescope Perspective}, booktitle = {48th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2018, Luxembourg City, Luxembourg, June 25-28, 2018}, pages = {562--573}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/DSN.2018.00064}, doi = {10.1109/DSN.2018.00064}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsn/TorabiBAGBD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/TorabiB16, author = {Sadegh Torabi and Konstantin Beznosov}, title = {Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users}, booktitle = {Twelfth Symposium on Usable Privacy and Security, {SOUPS} 2016, Denver, CO, USA, June 22-24, 2016}, pages = {301--320}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/soups2016/technical-sessions/presentation/torabi}, timestamp = {Thu, 05 Sep 2024 15:37:23 +0200}, biburl = {https://dblp.org/rec/conf/soups/TorabiB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TorabiB13, author = {Sadegh Torabi and Konstantin Beznosov}, editor = {Kevin Fu and Darren Lacey and Zachary N. J. Peterson}, title = {Privacy Aspects of Health Related Information Sharing in Online Social Networks}, booktitle = {2013 {USENIX} Workshop on Health Information Technologies, HealthTech '13, Washington, DC, USA, August 12, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/healthtech13/workshop-program/presentation/torabi}, timestamp = {Mon, 01 Feb 2021 08:43:15 +0100}, biburl = {https://dblp.org/rec/conf/uss/TorabiB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/procedia/MahdiASRT12, author = {Khaled Mahdi and Ahmed Almajid and Maytham Safar and Hernan Riquelme and Sadegh Torabi}, editor = {Elhadi M. Shakshuki and Muhammad Younas}, title = {Social Network Analysis of Kuwait Publicly-Held Corporations}, booktitle = {Proceedings of the 3rd International Conference on Ambient Systems, Networks and Technologies {(ANT} 2012), the 9th International Conference on Mobile Web Information Systems (MobiWIS-2012), Niagara Falls, Ontario, Canada, August 27-29, 2012}, series = {Procedia Computer Science}, volume = {10}, pages = {272--281}, publisher = {Elsevier}, year = {2012}, url = {https://doi.org/10.1016/j.procs.2012.06.037}, doi = {10.1016/J.PROCS.2012.06.037}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/procedia/MahdiASRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.