Author image not provided
 Mourad Debbabi

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article2.78
Citation Count345
Publication count124
Publication years1992-2017
Available for download19
Average downloads per article297.74
Downloads (cumulative)5,657
Downloads (12 Months)691
Downloads (6 Weeks)76
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Advisor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


124 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 124
Result page: 1 2 3 4 5 6 7

Sort by:

1 published by ACM
August 2017 ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 14,   Downloads (12 Months): 69,   Downloads (Overall): 69

Full text available: PDFPDF
Everyday, security experts face a growing number of security events that affecting people well-being, their information systems and sometimes the critical infrastructure. The sooner they can detect and understand these threats, the more they can mitigate and forensically investigate them. Therefore, they need to have a situation awareness of the ...
Keywords: Cyber security events detection, framework, security awareness, word embedding, Twitter, social media

2 published by ACM
April 2017 ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 15,   Downloads (12 Months): 175,   Downloads (Overall): 175

Full text available: PDFPDF
Code reuse detection is a key technique in reverse engineering. However, existing source code similarity comparison techniques are not applicable to binary code. Moreover, compilers have made this problem even more difficult due to the fact that different assembly code and control flow structures can be generated by the compilers ...
Keywords: binary code similarity comparison, malware analysis, bug search, binary code reuse, patch analysis

3
January 2017 IEEE Network: The Magazine of Global Internetworking: Volume 31 Issue 1, January 2017
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

Cyberspace continues to host highly sophisticated malicious entities that have demonstrated their ability to launch debilitating, intimidating, and disrupting cyber attacks. Recently, such entities have been adopting orchestrated, often botmaster- coordinated, stealthy attack strategies aimed at maximizing their targets´┐Ż coverage while minimizing redundancy and overlap. The latter entities, which are ...

4 published by ACM
December 2016 ACSAC '16: Proceedings of the 32nd Annual Conference on Computer Security Applications
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 9,   Downloads (12 Months): 178,   Downloads (Overall): 231

Full text available: PDFPDF
The popularity of Android OS has dramatically increased malware apps targeting this mobile OS. The daily amount of malware has overwhelmed the detection process. This fact has motivated the need for developing malware detection and family attribution solutions with the least manual intervention. In response, we propose Cypider framework, a ...
Keywords: community detection, fingerprinting, android, malware

5
October 2016
Bibliometrics:
Citation Count: 0

This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has ...

6
August 2016 Digital Investigation: The International Journal of Digital Forensics & Incident Response: Volume 18 Issue S, August 2016
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 0

Binary analysis is useful in many practical applications, such as the detection of malware or vulnerable software components. However, our survey of the literature shows that most existing binary analysis tools and frameworks rely on assumptions about specific compilers and compilation settings. It is well known that techniques such as ...
Keywords: Assembly instructions, Data flow analysis, Reverse engineering, Binary Analysis, Binary relation, Semantic features, Semantic flow graph

7
August 2016 Digital Investigation: The International Journal of Digital Forensics & Incident Response: Volume 18 Issue S, August 2016
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 1

Android's market experienced exponential popularity during the last few years. This blazing growth has, unfortunately, opened the door to thousands of malicious applications targeting Android devices everyday. Moreover, with the increasing sophistication of today's malware, the use of traditional hashing techniques for Android malware fingerprinting becomes defenseless against polymorphic malicious ...
Keywords: Fingerprinting, Android, Detection, Family attribution, Malware, Mobile, Fuzzy hashing

8
March 2016 Innovations in Systems and Software Engineering: Volume 12 Issue 1, March 2016
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Aspect-oriented modeling (AOM) emerged as a promising paradigm for handling crosscutting concerns, such as security, at the software modeling level. Most existing AOM contributions are presented from a practical perspective and lack formal syntax and semantics. In this paper, we present a practical and formal AOM framework for software security ...
Keywords: Aspect-oriented modeling (AOM), Unified modeling language (UML), Weaving, Formal semantics, Security hardening

9
January 2016 Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 94 Issue C, January 2016
Publisher: Elsevier North-Holland, Inc.
Bibliometrics:
Citation Count: 0

This paper presents a new approach to infer worldwide malware-infected machines by solely analyzing their generated probing activities. In contrary to other adopted methods, the proposed approach does not rely on symptoms of infection to detect compromised machines. This allows the inference of malware infection at very early stages of ...
Keywords: Cyber security, Probing, Big data correlation, Cyber intelligence, Darknet preprocessing, Malware

10
January 2016 Expert Systems with Applications: An International Journal: Volume 43 Issue C, January 2016
Publisher: Pergamon Press, Inc.
Bibliometrics:
Citation Count: 0

Elaboration of a hierarchy aware and distributed monitoring approach suitable for shared information awareness.Aggregation of distributed nodes into clusters and cluster heads in order to localize the information exchange at the level of the distributed nodes.Gossip based communication across the clusters along with asymmetric clustering to reflect hierarchical relationships among ...
Keywords: Multi-party disseminating protocol, Communication resilience, Hierarchical information awareness, Plan execution monitoring, Probabilistic Model checking

11
December 2015 Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 93 Issue P3, December 2015
Publisher: Elsevier North-Holland, Inc.
Bibliometrics:
Citation Count: 1

While elasticity is valuable to the cloud, it may introduce security flaws due to misconfiguration after virtual machines migration. In this paper, we propose an automated approach to verify distributed firewalls reconfiguration after migration. To this end, we elaborate a language that captures distributed stateless and stateful firewalls with their ...
Keywords: Cloud computing, Security, Stateful firewalls, Constraint satisfaction problem, Distributed firewalls, Verification

12
December 2015 Digital Investigation: The International Journal of Digital Forensics & Incident Response: Volume 15 Issue C, December 2015
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 2

Reverse engineering is the primary step to analyze a piece of malware. After having disassembled a malware binary, a reverse engineer needs to spend extensive effort analyzing the resulting assembly code, and then documenting it through comments in the assembly code for future references. In this paper, we have developed ...
Keywords: Assembly code clone detection, Reverse engineering, Software fingerprinting, Malware analysis, Software security

13
November 2015 CLOUDCOM '15: Proceedings of the 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

Cloud computing has seen a lot of interests and adoption lately. Nonetheless, the widespread adoption of cloud is still being hindered by the lack of transparency and accountability, which has traditionally been ensured through security compliance auditing techniques. Auditing in cloud, however, presents many new challenges in data collection and ...

14
August 2015 Digital Investigation: The International Journal of Digital Forensics & Incident Response: Volume 14 Issue S1, August 2015
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 2

Compiler provenance encompasses numerous pieces of information, such as the compiler family, compiler version, optimization level, and compiler-related functions. The extraction of such information is imperative for various binary analysis applications, such as function fingerprinting, clone detection, and authorship attribution. It is thus important to develop an efficient and automated ...
Keywords: Digital forensics, Compiler provenance, Binary program analysis, Programming analysis, Reverse engineering

15
August 2015 Digital Investigation: The International Journal of Digital Forensics & Incident Response: Volume 14 Issue S1, August 2015
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 1

In this paper, we investigate cyber-threats and the underlying infrastructures. More precisely, we detect and analyze cyber-threat infrastructures for the purpose of unveiling key players (owners, domains, IPs, organizations, malware families, etc.) and the relationships between these players. To this end, we propose metrics to measure the badness of different ...
Keywords: Cyber-threat Characterization, Cyber-threat infrastructure, Graph theory, Graph fingerprinting, Malware Analysis

16
July 2015 Computing: Volume 97 Issue 7, July 2015
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 1

Modern systems are more and more complex and security has become a key component in the success of software and systems development. The main challenge encountered in industry as well as in academia is to develop secure products, prove their security correctness, measure their resilience to attacks, and check if ...
Keywords: Vulnerability, 68Nxx, Attack, Modeling, Security, Specification, SysML, Theorem proving, Model-checking, Security engineering, Security metrics, UML, Temporal logic, Verification

17
June 2015 Expert Systems with Applications: An International Journal: Volume 42 Issue 9, June 2015
Publisher: Pergamon Press, Inc.
Bibliometrics:
Citation Count: 1

Elaboration of an approach for transportation risk assessment and contingency evaluation.Modeling risk prone transportation tasks as composed Markov Decision Process (MDP).Assessment of transportation tasks expressed as MDP via probabilistic model checking.Provision of decision making support via decision trees built from the model checking output.Evaluation of risk related properties expressed in ...
Keywords: Decision making, Transport, Model checking, Risk management

18
April 2015
Bibliometrics:
Citation Count: 0

This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has ...

19 published by ACM
March 2015 ACM Transactions on Information and System Security (TISSEC): Volume 17 Issue 3, March 2015
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 15,   Downloads (12 Months): 73,   Downloads (Overall): 464

Full text available: PDFPDF
The Internet provides an ideal anonymous channel for concealing computer-mediated malicious activities, as the network-based origins of critical electronic textual evidence (e.g., emails, blogs, forum posts, chat logs, etc.) can be easily repudiated. Authorship attribution is the study of identifying the actual author of the given anonymous documents based on ...
Keywords: Authorship attribution, cyber forensics, computational linguistics, text mining

20
March 2015 Digital Investigation: The International Journal of Digital Forensics & Incident Response: Volume 12 Issue S1, March 2015
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 3

The capability of efficiently recognizing reused functions for binary code is critical to many digital forensics tasks, especially considering the fact that many modern malware typically contain a significant amount of functions borrowed from open source software packages. Such a capability will not only improve the efficiency of reverse engineering, ...
Keywords: Digital forensics, Function identification, Malware forensics, Binary program analysis, Reverse engineering



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us