Mohamed Elsabagh
Mohamed Elsabagh
Geverifieerd e-mailadres voor gmu.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Synthetic generation of radio maps for device-free passive localization
A Eleryan, M Elsabagh, M Youssef
2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-5, 2011
612011
Behavioral Analysis of Android Applications Using Automated Instrumentation
M Karami, M Elsabagh, P Najafiborazjani, A Stavrou
462013
AROMA: Automatic generation of radio maps for localization systems
A Eleryan, M Elsabagh, M Youssef
Proceedings of the 6th ACM international workshop on Wireless network …, 2011
222011
Strict Virtual Call Integrity Checking for C++ Binaries
M Elsabagh, D Fleck, A Stavrou
The ACM Asia Conference on Computer and Communications Security (AsiaCCS 2017), 2017
162017
Detecting ROP with Statistical Learning of Program Characteristics
M Elsabagh, D Barbara, D Fleck, A Stavrou
7th ACM Conference on Data and Applications Security and Privacy (CODASPY), 2017
102017
Radmin: early detection of application-level resource exhaustion and starvation attacks
M Elsabagh, D Barbará, D Fleck, A Stavrou
18th International Symposium on Research in Attacks, Intrusions, and …, 2015
102015
Targeted DoS on Android: How to disable Android in 10 seconds or less
R Johnson, M Elsabagh, A Stavrou, V Sritapan
10th International Conference on Malicious and Unwanted Software, 2015
92015
Why software dos is hard to fix: Denying access in embedded android platforms
R Johnson, M Elsabagh, A Stavrou
International Conference on Applied Cryptography and Network Security, 193-211, 2016
62016
Practical provably secure communication for half-duplex radios
A Elmorsy, M Yasser, M Elsabagh, M Youssef
2011 IEEE International Conference on Communications (ICC), 1-5, 2011
62011
Practical and Accurate Runtime Application Protection against DoS Attacks
M Elsabagh, D Fleck, A Stavrou, M Kaplan, T Bowen
20th International Symposium on Research in Attacks, Intrusions, and …, 2017
52017
ARQ security in Wi-Fi and RFID networks
M Elsabagh, Y Abdallah, M Youssef, H El Gamal
2010 48th Annual Allerton Conference on Communication, Control, and …, 2010
52010
Resilient and Scalable Cloned App Detection using Forced Execution and Compression Trees
M Elsabagh, R Johnson, A Stavrou
IEEE Conference on Dependable and Secure Computing, 2018
42018
Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities
R Johnson, M Elsabagh, A Stavrou, J Offutt
The ACM Asia Conference on Computer and Communications Security (AsiaCCS 2018), 2018
42018
On early detection of application-level resource exhaustion and starvation
M Elsabagh, D Barbará, D Fleck, A Stavrou
Journal of Systems and Software 137, 430-447, 2018
32018
Automatic generation of radio maps for localization systems
A Eleryan, M Elsabagh, M Youssef
International Conference on Mobile and Ubiquitous Systems: Computing …, 2010
32010
Programming on Android: Best Practices for Security and Reliability
A Stavrou
2013 IEEE 7th International Conference on Software Security and Reliability, 1-2, 2013
22013
{FIRMSCOPE}: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware
M Elsabagh, R Johnson, A Stavrou, C Zuo, Q Zhao, Z Lin
29th {USENIX} Security Symposium ({USENIX} Security 20), 2020
2020
Protection from Within: Runtime Hardening Techniques for COTS Binaries
M Elsabagh
2017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–18