no code implementations • 23 Oct 2023 • Mohammad Ali Sayed, Mohsen Ghafouri, Ribal Atallah, Mourad Debbabi, Chadi Assi
After the controller synthesis and presentation of the attack scenarios, we demonstrate the effectiveness and success of our defense mechanism against the three known types of LA attacks.
no code implementations • 20 Jul 2022 • Mohammad Ali Sayed, Mohsen Ghafouri, Mourad Debbabi, Chadi Assi
Driven by the necessity to combat climate change, Electric Vehicles (EV) are being deployed to take advantage of their ability in reducing emissions generated by the transportation sector.
no code implementations • 27 Jun 2022 • Meisam Mohammady, Han Wang, Lingyu Wang, Mengyuan Zhang, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Mourad Debbabi, Yuan Hong
Outsourcing anomaly detection to third-parties can allow data owners to overcome resource constraints (e. g., in lightweight IoT devices), facilitate collaborative analysis (e. g., under distributed or multi-party scenarios), and benefit from lower costs and specialized expertise (e. g., of Managed Security Service Providers).
no code implementations • 22 Nov 2021 • Mohammad Ali Sayed, Ribal Atallah, Chadi Assi, Mourad Debbabi
We start by examining the existing vulnerabilities in the EV ecosystem that can be exploited to control the EV charging and launch attacks against the power grid.
no code implementations • 1 Aug 2018 • Serguei A. Mokhov, Miao Song, Jashanjot Singh, Joey Paquet, Mourad Debbabi, Sudhir Mudur
Visualization requirements in Forensic Lucid have to do with different levels of case knowledge abstraction, representation, aggregation, as well as the operational aspects as the final long-term goal of this proposal.
no code implementations • 25 Dec 2017 • ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb
We evaluate MalDozer on multiple Android malware datasets ranging from 1K to 33K malware apps, and 38K benign apps.
no code implementations • 19 Feb 2017 • ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, Djedjiga Mouheb
However, to the best of our knowledge, there is no such fingerprinting technique that leverages dynamic analysis and would act as the first defense against Android malware attacks.
Cryptography and Security
no code implementations • 16 Jul 2012 • Serguei A. Mokhov, Joey Paquet, Mourad Debbabi, Yankui Sun
We present a second iteration of a machine learning approach to static code analysis and fingerprinting for weaknesses related to security, software engineering, and others using the open-source MARF framework and the MARFCAT application based on it for the NIST's SATE IV static analysis tool exposition workshop's data sets that include additional test cases, including new large synthetic cases.