Skip to main content

Showing 1–19 of 19 results for author: Mannan, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.19201  [pdf, ps, other

    cs.CY

    Open Problems in DAOs

    Authors: Joshua Tan, Tara Merk, Sarah Hubbard, Eliza R. Oak, Helena Rong, Joni Pirovich, Ellie Rennie, Rolf Hoefer, Michael Zargham, Jason Potts, Chris Berg, Reuben Youngblom, Primavera De Filippi, Seth Frey, Jeff Strnad, Morshed Mannan, Kelsie Nabben, Silke Noa Elrifai, Jake Hartnell, Benjamin Mako Hill, Tobin South, Ryan L. Thomas, Jonathan Dotan, Ariana Spring, Alexia Maddox , et al. (4 additional authors not shown)

    Abstract: Decentralized autonomous organizations (DAOs) are a new, rapidly-growing class of organizations governed by smart contracts. Here we describe how researchers can contribute to the emerging science of DAOs and other digitally-constituted organizations. From granular privacy primitives to mechanism designs to model laws, we identify high-impact problems in the DAO ecosystem where existing gaps might… ▽ More

    Submitted 12 June, 2024; v1 submitted 29 October, 2023; originally announced October 2023.

    Comments: includes major coordination problems

  2. arXiv:2307.13952  [pdf, other

    cs.CR

    Security Weaknesses in IoT Management Platforms

    Authors: Bhaskar Tejaswi, Mohammad Mannan, Amr Youssef

    Abstract: A diverse set of Internet of Things (IoT) devices are becoming an integrated part of daily lives, and playing an increasingly vital role in various industry, enterprise and agricultural settings. The current IoT ecosystem relies on several IoT management platforms to manage and operate a large number of IoT devices, their data, and their connectivity. Considering their key role, these platforms mu… ▽ More

    Submitted 26 July, 2023; originally announced July 2023.

    Comments: Accepted in IEEE Internet of Things Journal in June 2023

  3. arXiv:2307.09317  [pdf, other

    cs.CR

    Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case

    Authors: Supraja Baskaran, Lianying Zhao, Mohammad Mannan, Amr Youssef

    Abstract: We conduct a large-scale measurement of developers' insecure practices leading to mini-app to super-app authentication bypass, among which hard-coding developer secrets for such authentication is a major contributor. We also analyze the exploitability and security consequences of developer secret leakage in mini-apps by examining individual super-app server-side APIs. We develop an analysis framew… ▽ More

    Submitted 18 July, 2023; originally announced July 2023.

    Comments: Accepted at RAID 2023: Symposium on Research in Attacks, Intrusions and Defenses

  4. arXiv:2304.04749  [pdf

    cs.SE cs.CY

    Watch the Gap: Making code more intelligible to users without sacrificing decentralization?

    Authors: Simona Ramos, Morshed Mannan

    Abstract: The potential for blockchain technology to eliminate the middleman and replace the top down hierarchical model of governance with a system of distributed cooperation has opened up many new opportunities, as well as dilemmas. Surpassing the level of acceptance by early tech adopters, the market of smart contracts is now moving towards wider acceptance from regular (non tech) users. For this to happ… ▽ More

    Submitted 10 March, 2023; originally announced April 2023.

    Journal ref: IEEE 24th Conference on Business Informatics; Workshop towards Decentralized Governance Design, June 2022

  5. arXiv:2209.15107  [pdf, other

    cs.CR

    Hidden in Plain Sight: Exploring Encrypted Channels in Android apps

    Authors: Sajjad Pourali, Nayanamana Samarasinghe, Mohammad Mannan

    Abstract: As privacy features in Android operating system improve, privacy-invasive apps may gradually shift their focus to non-standard and covert channels for leaking private user/device information. Such leaks also remain largely undetected by state-of-the-art privacy analysis tools, which are very effective in uncovering privacy exposures via regular HTTP and HTTPS channels. In this study, we design and… ▽ More

    Submitted 29 September, 2022; originally announced September 2022.

    Comments: Extended version of an ACM CCS 2022 paper

  6. arXiv:2209.11878  [pdf, other

    cs.CR cs.HC

    "My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software

    Authors: Jonah Stegman, Patrick J. Trottier, Caroline Hillier, Hassan Khan, Mohammad Mannan

    Abstract: Employees are often required to use Enterprise Security Software ("ESS") on corporate and personal devices. ESS products collect users' activity data including users' location, applications used, and websites visited - operating from employees' device to the cloud. To the best of our knowledge, the privacy implications of this data collection have yet to be explored. We conduct an online survey (n… ▽ More

    Submitted 23 September, 2022; originally announced September 2022.

    Comments: To appear in USENIX Security Symposium 2023

  7. Blindfold: Kee** Private Keys in PKIs and CDNs out of Sight

    Authors: Hisham Galal, Mohammad Mannan, Amr Youssef

    Abstract: Public key infrastructure (PKI) is a certificate-based technology that helps in authenticating systems identities. HTTPS/TLS relies mainly on PKI to minimize fraud over the Internet. Nowadays, websites utilize CDNs to improve user experience, performance, and resilience against cyber attacks. However, combining HTTPS/TLS with CDNs has raised new security challenges. In any PKI system, kee** priv… ▽ More

    Submitted 19 July, 2022; originally announced July 2022.

    Journal ref: Elsevier Computers & Security, volume 118, July 2022

  8. arXiv:2206.00716  [pdf, other

    cs.CR

    Not so immutable: Upgradeability of Smart Contracts on Ethereum

    Authors: Mehdi Salehi, Jeremy Clark, Mohammad Mannan

    Abstract: A smart contract that is deployed to a blockchain system like Ethereum is, under reasonable circumstances, expected to be immutable and tamper-proof. This is both a feature (promoting integrity and transparency) and a bug (preventing security patches and feature updates). Modern smart contracts use software tricks to enable upgradeability, raising the research questions of how upgradeability is ac… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

  9. arXiv:2204.01516  [pdf, other

    cs.CR cs.SE

    SAUSAGE: Security Analysis of Unix domain Socket Usage in Android

    Authors: Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef

    Abstract: The Android operating system is currently the most popular mobile operating system in the world. Android is based on Linux and therefore inherits its features including its Inter-Process Communication (IPC) mechanisms. These mechanisms are used by processes to communicate with one another and are extensively used in Android. While Android-specific IPC mechanisms have been studied extensively, Unix… ▽ More

    Submitted 4 April, 2022; originally announced April 2022.

    Comments: Accepted to EuroS&P 2022

  10. arXiv:2104.01011  [pdf, ps, other

    cs.CR eess.SY

    On Securing Cloud-hosted Cyber-physical Systems Using Trusted Execution Environments

    Authors: Amir Mohammad Naseri, Walter Lucia, Mohammad Mannan, Amr Youssef

    Abstract: Recently, cloud control systems have gained increasing attention from the research community as a solution to implement networked cyber-physical systems (CPSs). Such an architecture can reduce deployment and maintenance costs albeit at the expense of additional security and privacy concerns. In this paper, first, we discuss state-of-the-art security solutions for cloud control systems and their li… ▽ More

    Submitted 31 March, 2021; originally announced April 2021.

  11. Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions

    Authors: S. Ali, M. Elgharabawy, Q. Duchaussoy, M. Mannan, A. Youssef

    Abstract: For parents of young children and adolescents, the digital age has introduced many new challenges, including excessive screen time, inappropriate online content, cyber predators, and cyberbullying. To address these challenges, many parents rely on numerous parental control solutions on different platforms, including parental control network devices (e.g., WiFi routers) and software applications on… ▽ More

    Submitted 11 December, 2020; originally announced December 2020.

    Journal ref: Published at ACSAC 2020

  12. arXiv:1907.02142  [pdf, other

    cs.CR cs.CY

    On Privacy Risks of Public WiFi Captive Portals

    Authors: Suzan Ali, Tousif Osman, Mohammad Mannan, Amr Youssef

    Abstract: Open access WiFi hotspots are widely deployed in many public places, including restaurants, parks, coffee shops, shop** malls, trains, airports, hotels, and libraries. While these hotspots provide an attractive option to stay connected, they may also track user activities and share user/device information with third-parties, through the use of trackers in their captive portal and landing website… ▽ More

    Submitted 3 July, 2019; originally announced July 2019.

  13. arXiv:1907.00935  [pdf, other

    cs.CR

    One-Time Programs made Practical

    Authors: Lianying Zhao, Joseph I. Choi, Didem Demirag, Kevin R. B. Butler, Mohammad Mannan, Erman Ayday, Jeremy Clark

    Abstract: A one-time program (OTP) works as follows: Alice provides Bob with the implementation of some function. Bob can have the function evaluated exclusively on a single input of his choosing. Once executed, the program will fail to evaluate on any other input. State-of-the-art one-time programs have remained theoretical, requiring custom hardware that is cost-ineffective/unavailable, or confined to adh… ▽ More

    Submitted 1 July, 2019; originally announced July 2019.

  14. TEE-aided Write Protection Against Privileged Data Tampering

    Authors: Lianying Zhao, Mohammad Mannan

    Abstract: Unauthorized data alteration has been a longstanding threat since the emergence of malware. System and application software can be reinstalled and hardware can be replaced, but user data is priceless in many cases. Especially in recent years, ransomware has become high-impact due to its direct monetization model. State-of-the-art defenses are mostly based on known signature or behavior analysis, a… ▽ More

    Submitted 26 May, 2019; originally announced May 2019.

    Comments: 15 pages, Network and Distributed System Security Symposium (NDSS 2019), Feb. 24-27, 2019, San Diego, CA

  15. arXiv:1905.05224  [pdf, other

    cs.CR

    Privacy and Security Risks of "Not-a-Virus" Bundled Adware: The Wajam Case

    Authors: Xavier de Carné de Carnavalet, Mohammad Mannan

    Abstract: Comprehensive case studies on malicious code mostly focus on botnets and worms (recently revived with IoT devices), prominent pieces of malware or Advanced Persistent Threats, exploit kits, and ransomware. However, adware seldom receives such attention. Previous studies on "unwanted" Windows applications, including adware, favored breadth of analysis, uncovering ties between different actors and d… ▽ More

    Submitted 17 May, 2019; v1 submitted 13 May, 2019; originally announced May 2019.

    Comments: Updated draft, less technical details, added prevalence

  16. arXiv:1809.08729  [pdf, other

    cs.CR

    The Sorry State of TLS Security in Enterprise Interception Appliances

    Authors: Louis Waked, Mohammad Mannan, Amr Youssef

    Abstract: Network traffic inspection, including TLS traffic, in enterprise environments is widely practiced. Reasons for doing so are primarily related to improving enterprise security (e.g., malware detection) and meeting legal requirements. To analyze TLS-encrypted data, network appliances implement a Man-in-the-Middle TLS proxy, by acting as the intended web server to a requesting client (e.g., a browser… ▽ More

    Submitted 23 September, 2018; originally announced September 2018.

  17. Playing With Danger: A Taxonomy and Evaluation of Threats to Smart Toys

    Authors: Sharon Shasha, Moustafa Mahmoud, Mohammad Mannan, Amr Youssef

    Abstract: Smart toys have captured an increasing share of the toy market, and are growing ubiquitous in households with children. Smart toys are a subset of Internet of Things (IoT) devices, containing sensors, actuators, and/or artificial intelligence capabilities. They frequently have internet connectivity, directly or indirectly through companion apps, and collect information about their users and enviro… ▽ More

    Submitted 25 October, 2018; v1 submitted 14 September, 2018; originally announced September 2018.

    Comments: IEEE Internet of Things Journal, accepted Oct 2018 (early access URL: https://ieeexplore.ieee.org/document/8502818)

  18. Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials

    Authors: Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan

    Abstract: Personal cryptographic keys are the foundation of many secure services, but storing these keys securely is a challenge, especially if they are used from multiple devices. Storing keys in a centralized location, like an Internet-accessible server, raises serious security concerns (e.g. server compromise). Hardware-based Trusted Execution Environments (TEEs) are a well-known solution for protecting… ▽ More

    Submitted 1 June, 2018; v1 submitted 23 April, 2018; originally announced April 2018.

    Comments: Extended version of a paper to appear in the 3rd Workshop on Security, Privacy, and Identity Management in the Cloud (SECPID) 2018

  19. SafeKeeper: Protecting Web Passwords using Trusted Execution Environments

    Authors: Klaudia Krawiecka, Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan

    Abstract: Passwords are undoubtedly the most dominant user authentication mechanism on the web today. Although they are inexpensive and easy-to-use, security concerns of password-based authentication are serious. Phishing and theft of password databases are two critical concerns. The tendency of users to re-use passwords across different services exacerbates the impact of these two concerns. Current solutio… ▽ More

    Submitted 23 April, 2018; v1 submitted 5 September, 2017; originally announced September 2017.

    Comments: Extended version of a paper appearing in WWW '18 Proceedings of the 2018 World Wide Web Conference