Skip to main content

Showing 1–6 of 6 results for author: Derhab, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2005.06075  [pdf, other

    cs.CR

    Android Malware Clustering using Community Detection on Android Packages Similarity Network

    Authors: ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb

    Abstract: The daily amount of Android malicious applications (apps) targeting the app repositories is increasing, and their number is overwhelming the process of fingerprinting. To address this issue, we propose an enhanced Cypider framework, a set of techniques and tools aiming to perform a systematic detection of mobile malware by building a scalable and obfuscation resilient similarity network infrastruc… ▽ More

    Submitted 12 May, 2020; originally announced May 2020.

    Comments: 66 pages, Research report (paper submitted to Computers & Security journal)

  2. arXiv:1901.09374  [pdf, other

    cs.CR

    Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends

    Authors: Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab

    Abstract: Bio-features are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose of this investigation is to summaries the factors that hinder biometrics models' development and deployment on a large scale, including human physiological (e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., signature, voice, gait, or keystroke). The differen… ▽ More

    Submitted 27 January, 2019; originally announced January 2019.

    Comments: 13 pages, figure 6, tables 5

  3. arXiv:1901.03899  [pdf, other

    cs.CR

    Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures

    Authors: Leandros Maglaras, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis

    Abstract: As Critical National Infrastructures are becoming more vulnerable to cyber attacks, their protection becomes a significant issue for any organization as well as a nation. Moreover, the ability to attribute is a vital element of avoiding impunity in cyberspace. In this article, we present main threats to critical infrastructures along with protective measures that one nation can take, and which are… ▽ More

    Submitted 12 January, 2019; originally announced January 2019.

  4. Blockchain Technologies for the Internet of Things: Research Issues and Challenges

    Authors: Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros Maglaras, Helge Janicke

    Abstract: This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizing the existing surveys that deal with blockchain technologies. Then, we provide an overview of the application domains of blockchain technologies in IoT, e.g, Internet of Vehicles, Internet of Energy, Internet of Cloud, Fog… ▽ More

    Submitted 24 June, 2018; originally announced June 2018.

    Comments: 14 pages, 5 figures

  5. arXiv:1803.10281  [pdf, other

    cs.CR

    Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues

    Authors: Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, Helge Janicke

    Abstract: This paper presents a comprehensive investigation of authentication schemes for smart mobile devices. We start by providing an overview of existing survey articles published in the recent years that deal with security for mobile devices. Then, we describe and give a classification of threat models in smart mobile devices in five categories, including, identity-based attacks, eavesdrop**-based at… ▽ More

    Submitted 8 March, 2019; v1 submitted 27 March, 2018; originally announced March 2018.

    Comments: 22 pages, 9 figures

  6. arXiv:1712.08996  [pdf, other

    cs.CR cs.AI

    Android Malware Detection using Deep Learning on API Method Sequences

    Authors: ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb

    Abstract: Android OS experiences a blazing popularity since the last few years. This predominant platform has established itself not only in the mobile world but also in the Internet of Things (IoT) devices. This popularity, however, comes at the expense of security, as it has become a tempting target of malicious apps. Hence, there is an increasing need for sophisticated, automatic, and portable malware de… ▽ More

    Submitted 24 December, 2017; originally announced December 2017.

    Comments: 17 pages, submitted to Elsevier Digital Investigations Journal