Follow
Mohamed Elsabagh
Mohamed Elsabagh
Kryptowire
Verified email at kryptowire.com - Homepage
Title
Cited by
Cited by
Year
Synthetic generation of radio maps for device-free passive localization
A Eleryan, M Elsabagh, M Youssef
2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-5, 2011
862011
Behavioral Analysis of Android Applications Using Automated Instrumentation
M Karami, M Elsabagh, P Najafiborazjani, A Stavrou
552013
{FIRMSCOPE}: Automatic uncovering of {Privilege-Escalation} vulnerabilities in {Pre-Installed} apps in android firmware
M Elsabagh, R Johnson, A Stavrou, C Zuo, Q Zhao, Z Lin
29th USENIX security symposium (USENIX Security 20), 2379-2396, 2020
542020
Strict Virtual Call Integrity Checking for C++ Binaries
M Elsabagh, D Fleck, A Stavrou
The ACM Asia Conference on Computer and Communications Security (AsiaCCS 2017), 2017
352017
Detecting ROP with Statistical Learning of Program Characteristics
M Elsabagh, D Barbara, D Fleck, A Stavrou
7th ACM Conference on Data and Applications Security and Privacy (CODASPY), 2017
312017
AROMA: Automatic generation of radio maps for localization systems
A Eleryan, M Elsabagh, M Youssef
Proceedings of the 6th ACM international workshop on Wireless network …, 2011
272011
Function secret sharing for psi-ca: With applications to private contact tracing
S Dittmer, Y Ishai, S Lu, R Ostrovsky, M Elsabagh, N Kiourtis, B Schulte, ...
arXiv preprint arXiv:2012.13053, 2020
232020
Radmin: early detection of application-level resource exhaustion and starvation attacks
M Elsabagh, D Barbará, D Fleck, A Stavrou
18th International Symposium on Research in Attacks, Intrusions, and …, 2015
142015
On early detection of application-level resource exhaustion and starvation
M Elsabagh, D Barbará, D Fleck, A Stavrou
Journal of Systems and Software 137, 430-447, 2018
122018
Practical and Accurate Runtime Application Protection against DoS Attacks
M Elsabagh, D Fleck, A Stavrou, M Kaplan, T Bowen
20th International Symposium on Research in Attacks, Intrusions, and …, 2017
122017
Targeted DoS on Android: How to disable Android in 10 seconds or less
R Johnson, M Elsabagh, A Stavrou, V Sritapan
10th International Conference on Malicious and Unwanted Software, 2015
102015
Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities
R Johnson, M Elsabagh, A Stavrou, J Offutt
The ACM Asia Conference on Computer and Communications Security (AsiaCCS 2018), 2018
92018
Detecting and measuring misconfigured manifests in android apps
Y Yang, M Elsabagh, C Zuo, R Johnson, A Stavrou, Z Lin
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
82022
Streaming and unbalanced psi from function secret sharing
S Dittmer, Y Ishai, S Lu, R Ostrovsky, M Elsabagh, N Kiourtis, B Schulte, ...
International Conference on Security and Cryptography for Networks, 564-587, 2022
72022
Why software dos is hard to fix: Denying access in embedded android platforms
R Johnson, M Elsabagh, A Stavrou
Applied Cryptography and Network Security: 14th International Conference …, 2016
72016
ARQ security in Wi-Fi and RFID networks
M Elsabagh, Y Abdallah, M Youssef, H El Gamal
2010 48th Annual Allerton Conference on Communication, Control, and …, 2010
72010
Practical provably secure communication for half-duplex radios
A Elmorsy, M Yasser, M Elsabagh, M Youssef
2011 IEEE International Conference on Communications (ICC), 1-5, 2011
62011
{DEFInit}: An Analysis of Exposed Android Init Routines
Y Ji, M Elsabagh, R Johnson, A Stavrou
30th USENIX Security Symposium (USENIX Security 21), 3685-3702, 2021
42021
Resilient and Scalable Cloned App Detection using Forced Execution and Compression Trees
M Elsabagh, R Johnson, A Stavrou
IEEE Conference on Dependable and Secure Computing, 2018
42018
Automatic generation of radio maps for localization systems
A Eleryan, M Elsabagh, M Youssef
International Conference on Mobile and Ubiquitous Systems: Computing …, 2010
42010
The system can't perform the operation now. Try again later.
Articles 1–20