Synthetic generation of radio maps for device-free passive localization A Eleryan, M Elsabagh, M Youssef 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-5, 2011 | 84 | 2011 |
Behavioral Analysis of Android Applications Using Automated Instrumentation M Karami, M Elsabagh, P Najafiborazjani, A Stavrou | 54 | 2013 |
{FIRMSCOPE}: Automatic uncovering of {Privilege-Escalation} vulnerabilities in {Pre-Installed} apps in android firmware M Elsabagh, R Johnson, A Stavrou, C Zuo, Q Zhao, Z Lin 29th USENIX security symposium (USENIX Security 20), 2379-2396, 2020 | 47 | 2020 |
Strict Virtual Call Integrity Checking for C++ Binaries M Elsabagh, D Fleck, A Stavrou The ACM Asia Conference on Computer and Communications Security (AsiaCCS 2017), 2017 | 32 | 2017 |
Detecting ROP with Statistical Learning of Program Characteristics M Elsabagh, D Barbara, D Fleck, A Stavrou 7th ACM Conference on Data and Applications Security and Privacy (CODASPY), 2017 | 31 | 2017 |
AROMA: Automatic generation of radio maps for localization systems A Eleryan, M Elsabagh, M Youssef Proceedings of the 6th ACM international workshop on Wireless network …, 2011 | 27 | 2011 |
Function secret sharing for psi-ca: With applications to private contact tracing S Dittmer, Y Ishai, S Lu, R Ostrovsky, M Elsabagh, N Kiourtis, B Schulte, ... arXiv preprint arXiv:2012.13053, 2020 | 22 | 2020 |
Radmin: early detection of application-level resource exhaustion and starvation attacks M Elsabagh, D Barbará, D Fleck, A Stavrou 18th International Symposium on Research in Attacks, Intrusions, and …, 2015 | 14 | 2015 |
Practical and Accurate Runtime Application Protection against DoS Attacks M Elsabagh, D Fleck, A Stavrou, M Kaplan, T Bowen 20th International Symposium on Research in Attacks, Intrusions, and …, 2017 | 12 | 2017 |
On early detection of application-level resource exhaustion and starvation M Elsabagh, D Barbará, D Fleck, A Stavrou Journal of Systems and Software 137, 430-447, 2018 | 11 | 2018 |
Targeted DoS on Android: How to disable Android in 10 seconds or less R Johnson, M Elsabagh, A Stavrou, V Sritapan 10th International Conference on Malicious and Unwanted Software, 2015 | 10 | 2015 |
Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities R Johnson, M Elsabagh, A Stavrou, J Offutt The ACM Asia Conference on Computer and Communications Security (AsiaCCS 2018), 2018 | 8 | 2018 |
Detecting and measuring misconfigured manifests in android apps Y Yang, M Elsabagh, C Zuo, R Johnson, A Stavrou, Z Lin Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 7 | 2022 |
Why software dos is hard to fix: Denying access in embedded android platforms R Johnson, M Elsabagh, A Stavrou Applied Cryptography and Network Security: 14th International Conference …, 2016 | 7 | 2016 |
ARQ security in Wi-Fi and RFID networks M Elsabagh, Y Abdallah, M Youssef, H El Gamal 2010 48th Annual Allerton Conference on Communication, Control, and …, 2010 | 7 | 2010 |
Streaming and unbalanced psi from function secret sharing S Dittmer, Y Ishai, S Lu, R Ostrovsky, M Elsabagh, N Kiourtis, B Schulte, ... International Conference on Security and Cryptography for Networks, 564-587, 2022 | 6 | 2022 |
Practical provably secure communication for half-duplex radios A Elmorsy, M Yasser, M Elsabagh, M Youssef 2011 IEEE International Conference on Communications (ICC), 1-5, 2011 | 6 | 2011 |
{DEFInit}: An Analysis of Exposed Android Init Routines Y Ji, M Elsabagh, R Johnson, A Stavrou 30th USENIX Security Symposium (USENIX Security 21), 3685-3702, 2021 | 4 | 2021 |
Resilient and Scalable Cloned App Detection using Forced Execution and Compression Trees M Elsabagh, R Johnson, A Stavrou IEEE Conference on Dependable and Secure Computing, 2018 | 4 | 2018 |
Automatic generation of radio maps for localization systems A Eleryan, M Elsabagh, M Youssef International Conference on Mobile and Ubiquitous Systems: Computing …, 2010 | 4 | 2010 |