Publications
Group by type
-
William Johnson, Allison Luzader, Irfan Ahmed, Vassil Roussev, Golden G. Richard III, Cynthia B. Lee, “ Development of Peer Instruction Questions for Cybersecurity Education ” , USENIX Advances in Security Education Workshop (ASE'16), August 2016
-
Aisha Ali-Gombe, Golden G. Richard III, Irfan Ahmed, Vassil Roussev, “ Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content Providers ” , In the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16), July 2016 , (Acceptance rate (25.5%): 13 full-papers / 51 full-paper submissions)
-
Aisha Ali-Gombe, Irfan Ahmed, Golden G. Richard III, Vassil Roussev, “ Towards a More Dependable Hybrid Analysis of Android Malware Using Aspect Oriented Programming ” , Journal of Computer Virology and Hacking Techniques, Springer, 2016
-
Irfan Ahmed, Vassil Roussev, “ Analysis of Cloud Digital Evidence ” , In Security, Privacy, and Digital Forensics in the Cloud, L. Chen, and H. Takabi (Eds.) IGI Global, 2016
-
Vassil Roussev, Andres Barreto, Irfan Ahmed, “ Forensic Acquisition of Cloud Drives ” , In the 12th IFIP WG 11.9 International Conference on Digital Forensics, January 2016
-
Vassil Roussev, Irfan Ahmed, Andres Barreto, Shane McCulley, Vivek Shanmughan, “ Cloud Forensics-Tool Development Studies & Future Outlook ” , Digital Investigation, Elsevier, 2016
-
Aisha Ali-Gombe, Irfan Ahmed, Golden G. Richard III, Vassil Roussev, “ OpSeq: Android Malware Fingerprinting ” , In the 5th Program Protection and Reverse Engineering Workshop (PPREW'15) In conjunction with 31st Annual Computer Security Applications Conference (ACSAC'15), December 2016
-
Irfan Ahmed, Vassil Roussev, Aisha Ali Gombe, “ Robust Fingerprinting for Relocatable Code ” , Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (CODASPY'15), March 2015 , (Acceptance rate (20.87%): 19 full papers / 91 submissions)
-
Irfan Ahmed, Vassil Roussev, Aisha Ali Gombe, “ Memory Forensics: Reliable In-Memory Code Identification Using Relocatable Pointers ” , Proceedings of the 67th Annual Meeting of the American Academy of Forensic Sciences, February 2015 , (Extended Abstract)
-
Irfan Ahmed, Golden G. Richard III, “ Kernel Pool Monitoring to Support Malware Forensics in a Cloud Computing Environment ” , Proceedings of the 66th Annual Meeting of the American Academy of Forensic Sciences, February 2014 , (Extended Abstract)
-
Vassil Roussev, Irfan Ahmed, Thomas Sires, “ Image-Based Kernel Fingerprinting ” , Proceedings of the 14th Annual Digital Forensics Research Conference (DFRWS'14), August 2014 , (Acceptance rate (28.8%): 15 regular papers / 52 submissions, published by Digital Investigation Journal, Elsevier)
-
Golden G. Richard III, Irfan Ahmed, “ Compressed RAM and Live Forensics ” , Proceedings of the 66th Annual Meeting of the American Academy of Forensic Sciences, February 2014 , (Extended Abstract)
-
Irfan Ahmed, Golden G. Richard III, Aleksandar Zoranic, Vassil Roussev, “ Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection ” , Proceedings of the 16th Information Security Conference (ISC'13), November 2013 , (Acceptance rate (23%): 16 regular papers / 70 submissions, Best Paper Award)
-
Irfan Ahmed, Golden G. Richard III, “ Live Forensic Analysis of Kernel Code for Malware Detection in Cloud Computing Environments ” , Proceedings of the 65th Annual Meeting of the American Academy of Forensic Sciences , pp. 154-155, February 2013 , (Extended Abstract, Outstanding Research Award)
-
Salman Javaid, Aleksandar Zoranic, Irfan Ahmed, Golden G. Richard III, “ Atomizer: Fast, Scalable and Lightweight Heap Analyzer for Virtual Machines in a Cloud Environment ” , Proceedings of the 6th Layered Assurance Workshop (LAW'12), In conjunction with the 28th Annual Computer Security Applications Conference (ACSAC'12), December 2012 , (Published as a book chapter in Advances in Digital Forensics IX, Springer)
-
Irfan Ahmed, Aleksandar Zoranic, Salman Javaid, Golden G. Richard III, Vassil Roussev, “ Rule-based Integrity Checking of Interrupt Descriptor Table in Cloud Environments ” , Proceedings of the 9th IFIP WG 11.9 International Conference on Digital Forensics, January 2013 , (Published as a book chapter in Advances in Digital Forensics IX, Springer)
-
Irfan Ahmed, Sebastian Obermeier, Martin Naedele, Golden G. Richard III, “ SCADA systems: Challenges for Forensic Investigators ” , IEEE Computer, Vol. 45, No. 12, December 2012
-
Irfan Ahmed, Martin Naedele, Bradley Schatz, Ryoichi Sasaki, Andrew West, “ SCADA System Security ” , International Journal of Information Security, Springer, Vol. 11, No. 4, August 2012 , (Editorial)
-
Irfan Ahmed, Kyung-suk Lhee, “ Classification of Packet Contents for Malware Detection ” , Journal in Computer Virology, Springer, Vol. 7, No. 4, pp. 279-295, October 2011
-
Irfan Ahmed, Kyung-suk Lhee, Hyunjung Shin, ManPyo Hong, “ Content-based File-type Identification using Cosine Similarity and a Divide-and-Conquer approach ” , IETE Technical Review, Vol. 27, No. 6, pp.465-477, November 2010