Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian, M Frantz, M Kantarcioglu, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 146 | 2019 |
SGX-BigMatrix: A practical encrypted data analytic framework with trusted processors F Shaon, M Kantarcioglu, Z Lin, L Khan Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 91 | 2017 |
Securing big data in the age of AI M Kantarcioglu, F Shaon 2019 First IEEE International Conference on Trust, Privacy and Security in …, 2019 | 66 | 2019 |
Danfeng (Daphne) Yao. Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian, M Frantz, M Kantarcioglu Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 0 | 9 | |
SGX-IR: Secure information retrieval with trusted processors F Shaon, M Kantarcioglu IFIP Annual Conference on Data and Applications Security and Privacy, 367-387, 2020 | 8 | 2020 |
CHIRON: deployment-quality detection of Java cryptographic vulnerabilities S Rahaman, Y Xiao, K Tian, F Shaon, M Kantarcioglu, D Yao arXiv preprint arXiv:1806.06881, 2018 | 6 | 2018 |
A practical framework for executing complex queries over encrypted multimedia data F Shaon, M Kantarcioglu Data and Applications Security and Privacy XXX: 30th Annual IFIP WG 11.3 …, 2016 | 6 | 2016 |
SoK: A Tale of Reduction, Security, and Correctness-Evaluating Program Debloating Paradigms and Their Compositions M Ali, M Muzammil, F Karim, A Naeem, R Haroon, M Haris, H Nadeem, ... European Symposium on Research in Computer Security, 229-249, 2023 | 5 | 2023 |
Being the developers’ friend: Our experience developing a high-precision tool for secure coding DD Yao, S Rahaman, Y Xiao, S Afrose, M Frantz, K Tian, N Meng, ... IEEE Security & Privacy 20 (6), 43-52, 2022 | 4 | 2022 |
Evaluating container debloaters M Hassan, T Tahir, M Farrukh, A Naveed, A Naeem, F Zaffar, F Shaon, ... 2023 IEEE Secure Development Conference (SecDev), 88-98, 2023 | 1 | 2023 |
Poster: Deployment-quality and accessible solutions for cryptography code development S Rahaman, Y Xiao, S Afrose, K Tian, M Frantz, N Meng, BP Miller, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 1 | 2019 |
The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms F Shaon, S Rahaman, M Kantarcioglu Proceedings of the 39th Annual Computer Security Applications Conference …, 2023 | | 2023 |
Systems and methods for proactive and reactive data security F Shaon, S Rahaman US Patent App. 18/130,340, 2023 | | 2023 |
Systems and methods for proactive and reactive data security F Shaon, S Rahaman US Patent 11,620,378, 2023 | | 2023 |
Deployment-quality and Accessible Solutions for Cryptography Code Development S Rahaman, Y Xiao, S Afrose, K Tian, M Frantz, N Meng, BP Miller, ... Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | | 2020 |
If the Prospect of Some Occupations Are Stagnating With Technological Advancement? A Task Attribute Approach to Detect Employment Vulnerability I Islam, F Shaon arXiv preprint arXiv:2001.02783, 2020 | | 2020 |
Secure Cloud Data Analytics with Trusted Processors F Shaon The University of Texas at Dallas, 2019 | | 2019 |
SecureDL: A system for securing big data M Kantarcioglu, F Shaon | | |