Selected Publications

Security experts often question why some users take actions that could expose them to security and privacy risks. Using unsecured Wi-Fi networks is one common example. Previous studies examined stated preferences — what people said they have done or think they would do — but that may not truly reflect real-life behavior. This study is the first to examine revealed preferences — what people actually do in naturalistic settings.
In ACM WiSec, 2019.

We introduce MaMaDroid, a static-analysis based system that abstracts app’s API calls to their class, package, or family, and builds a model from their sequences obtained from the call graph of an app as Markov chains.
In ACM TOPS, 2019.

Recent Publications

. Factors Influencing Users to Use Unsecured Wi-Fi Networks: Evidence in the Wild. In ACM WiSec, 2019.

Preprint PDF

. MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version). In ACM TOPS, 2019.

Preprint PDF

. A Family of Droids – Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis. In PST, 2018.

Preprint PDF

. Measuring, Characterizing, and Detecting Facebook Like Farms. In ACM TOPS, 2017.

Preprint PDF

. MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models. In NDSS, 2017.

Preprint PDF Code Slides Video

. Combating Fraud in Online Social Networks: Detecting Stealthy Facebook Like Farms. Arxiv, 2016.

Preprint

. Experimental Analysis of Popular Anonymous, Ephemeral, and End-to-End Encrypted Apps. In NDSS UEOP, 2016.

Preprint

. Danger is my middle name: experimenting with SSL vulnerabilities in Android apps. In ACM WiSec, 2015.

Preprint PDF

Recent & Upcoming Talks

Recent Posts

As the number of always-on, always-connected smartphones increase, so does the amount of personal and sensitive information they collect and transmit. Thus, it is crucial to secure traffic exchanged by these devices, especially considering that mobile users might connect to open Wi-Fi networks or even fake cell towers. The go-to protocol to secure network connection is HTTPS i.e., HTTP over SSL/TLS. In the Android ecosystem, applications (apps for short), support HTTPS on sockets by relying on the android.

CONTINUE READING

Teaching & Services

I was teaching assistant for the following MSc Information security modules at UCL:

  • COMPGA02: Computer Security II (3 years)
  • COMPGA18: Cryptanalysis (1 year)

I have also provided academic services either as a reviewer/sub-reviewer for the following security and privacy conferences/journals:

  • Network and Distributed System Security Symposium (NDSS)
  • ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS)
  • IEEE European Symposium on Security and Privacy (Euro S&P)
  • IEEE Transactions on Information Forensics and Security (TIFS)