Salman Niksefat

Salman Niksefat
Amirkabir University of Technology | TUS · APA Research Center

PhD
Looking for co-researchers in the Block-chain and cryptocurrency field...

About

14
Publications
9,791
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
322
Citations
Citations since 2017
6 Research Items
270 Citations
2017201820192020202120222023020406080
2017201820192020202120222023020406080
2017201820192020202120222023020406080
2017201820192020202120222023020406080

Publications

Publications (14)
Article
The cyber world is plagued with ever-evolving malware that readily infiltrate all defense mechanisms, operate viciously unbeknownst to the user, and surreptitiously exfiltrate sensitive data. Understanding the inner workings of such malware provides a leverage to effectively combat them. This understanding is pursued often through dynamic analysis...
Preprint
Full-text available
The Cyber world is plagued with ever-evolving malware that readily infiltrates all defense mechanisms, operates viciously unbeknownst to the user and surreptitiously exfiltrate sensitive data. Understanding the inner workings of such malware provides a leverage to effectively combat them. This understanding, is pursued through dynamic analysis whic...
Article
Full-text available
Return-oriented programming (ROP) and jump-oriented programming (JOP) are two well-known code-reuse attacks in which short code sequences ending in ret or jmp instructions are located and chained in a specific order to execute the attacker’s desired payload. JOP, comparing to ROP, is even more effective because it can be invoked without any relianc...
Article
In this study, the authors design efficient protocols for a number of `oblivious decision program (DP) evaluation' problems. Consider a general form of the problem where a client who holds a private input interacts with a server who holds a private DP (e.g. a decision tree or a branching program) with the goal of evaluating his input on the DP with...
Article
Full-text available
We introduce ZIDS, a client-server solution for private detection of intrusions that is suitable for private detection of zero-day attacks in input data. The system includes an intrusion detection system (IDS) server that has a set of sensitive signatures for zero-day attacks and IDS clients that possess some sensitive data (e.g. files, logs). Usin...
Conference Paper
Full-text available
In this paper, we design an efficient protocol for oblivious DFA evaluation between an input holder (client) and a DFA holder (server). The protocol runs in a single round, and only requires a small amount of computation by each party. The most efficient version of our protocol only requires O(k) asymmetric operations by either party, where k is th...
Conference Paper
Full-text available
In this paper, we design efficient protocols for a number of private database query problems. Consider a general form of the problem where a client who holds a private input interacts with a server who holds a private decision program (e.g. a decision tree or a branching program) with the goal of evaluating his input on the decision program without...
Conference Paper
In specification-based detection the correct behavior of a system is modeled formally and would be later verified during system operation for detecting anomalies. In this paper we argue that comparing to anomaly and signature-based approaches, specification-based approach is an appropriate and precise way to build IDSes for web applications. This i...
Conference Paper
Today IPSec virtual private networks are widely used to establish secure network connections between a pair of hosts, between a pair of security gateways, or between a security gateway and a host. The complexity and variety of rules in an IPSec policy may result in a combination of rules which not only do not provide the required security services,...
Conference Paper
Full-text available
In mobile ad hoc networks, communication between distant nodes relies on cooperation of intermediate nodes to forward packets to the destination. But, a selfish node for saving its resources (e.g. battery power and bandwidth) does not cooperate and drops packets which are not belonging to it. If there is no mechanism to cope with selfish nodes, coo...

Network

Cited By