[2024] |
Impeding LLM-assisted Cheating in Introductory Programming Assignments via Adversarial Perturbation. |
A Unified Taxonomy and Evaluation of IoT Cybersecurity Guidelines. |
Trust, Because You Can't Verify: Privacy and Security Hurdles in Education Technology Acquisition Practices. |
[2023] |
Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages. |
The Queen’s Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms. |
A Tale of Reduction, Security and Correctness: Evaluating Program Debloating Paradigms and Their Compositions. |
Evaluating Container Debloaters. |
Blade: Towards Scalable Source Code Debloating. |
SpanL: A Language for Screening Improper Use of Security APIs in High-level Languages. |
[2022] |
Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding. |
Evaluation of Static Vulnerability Detection Tools with Java Cryptographic API Benchmarks.
|
``If security is required'': Engineering and Security Practices for
Machine Learning-based IoT Devices.
|
[2021] |
Optimization to the Rescue: Evading Binary Code Stylometry with Adversarial Use of Code Optimizations. |
From Theory to Code: Identifying Logical Flaws in Cryptographic
Implementations. |
[2020] |
Coding Practices and Recommendations of Spring Security for Enterprise
Applications. |
[2019] |
Security Certification in Payment Card Industry: Testbeds, Measurements, and
Recommendations. |
CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in
Massive-sized Java Projects. |
CryptoAPI-Bench: A Comprehensive Benchmark on Java Cryptographic API
Misuses. |
[2017] |
Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear
Revocation. |
Toward Automatic Program Analysis of Cryptography Implementations for
Security. |
[Before '17] |
Antibandwidth Problem for Itchy Caterpillars. |
A Novel Approach for Constructing Emulator for Microsoft Kinect XBOX 360 Sensor
in the .NET Platform. |
Patents
[US Patents] |
Fahad Shaon, Sazzadur Rahaman. Systems and methods for proactive and reactive data security. U.S. Application No: 16/698,328 (filed). |
Department of Computer Science, Gould-Simpson, Room 917, 1040 E 4th St, Tucson, AZ - 85721.