Adversarial Reconnaissance
We developed a taxonomy of Adversarial Reconnaissance where we categorized Reconnaissance techniques as Internet Intelligence, Social Engineering, Network Scanning, Local Discovery, and Side-channel Attacks.
Cyber Deception
We modeled an attacker's belief update process in a deceptive environment based on passive reconnaissance.
IoT Remote Attestation
We developed an ARM-based IoT Security testbed that enables security research (vulnerability and exploit analysis, remote attestation methods).
Attacker-Defender Security Game
We developed an attacker-defender game-theoretic model and presented a solution concept for both players (Algorithmic and Reinforcement Learning-based approaches).
A Mobile-Fog Computing Framework for COVID-19 Contact Tracing
We developed an E-government Privacy-Preserving Mobile, and Fog computing framework entitled PPMF that can trace infected, and suspected cases nationwide. We use personal mobile devices with a contact tracing app, and two types of stationary fog nodes to trace community transmission alongside maintaining user data privacy.
Smart Contract Security Analysis
We scraped posts from Stack Overflow and Medium; and analyzed the discussions to find out trends of attacks and security tools related to Smart Contract development.