Publications

The following are research publications on computer security that have been authored or co-authored by CSRL members.

Conferences

Ch4os: Discretized Generative Adversarial Network for Functionality-preserving Evasive Modification on Malware

Christopher Molloy, Furkan Alaca, Steven H. H. Ding.

International Conference on Artificial Neural Networks 2024, September 17-20, Lugano-Viganello, Switzerland.

Privacy-Preserving Multi-Party Keyword-Based Classification of Unstructured Text Data

Ian Pépin, Furkan Alaca, Farhana Zulkernine.

International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT) 2024, April 29 - May 1, Abu Dhabi, United Arab Emirates.

Authors' copy (PDF) IEEE Xplore

Vulnerability of Open-Source Face Recognition Systems to Blackbox Attacks: A Case Study with InsightFace

Nafiz Sadman, Kazi Amit Hasan, Elyas Rashno, Furkan Alaca, Yuan Tian, Farhana Zulkernine.

IEEE Symposium Series on Computational Intelligence (SSCI) 2023, December 5-8, Mexico City, Mexico.

Authors' copy (PDF) IEEE Xplore

If-This-Then-Allow-That (to phone home): A trigger-based network policy enforcement framework for smart homes

Anthony Tam, Furkan Alaca, David Barrera.

International Symposium on Foundations & Practice of Security (FPS) 2022, December 12-14, Ottawa, ON.

Authors' copy (PDF) LNCS (SpringerLink)

Device fingerprinting for augmenting web authentication: Classification and analysis of methods

Furkan Alaca, P. C. van Oorschot.

Annual Computer Security Applications Conference (ACSAC) 2016, December 5-9, Los Angeles, CA.

Authors' copy (PDF) ACM Digital Library

Journals

Comparative analysis and framework evaluating mimicry-resistant and invisible web authentication schemes

Furkan Alaca, AbdelRahman Abdou, P. C. van Oorschot.

IEEE Transactions on Dependable and Secure Computing (TDSC) 18(2):534-549, March-April 2021.

Preprint: arXiv.1708.01706 [cs.CR] IEEE Xplore

Comparative analysis and framework evaluating web single sign-on systems

Furkan Alaca, P. C. van Oorschot.

ACM Computing Surveys, 53 (5) 112:1-112:34, September 2020.

Preprint: arXiv:1805.00094 [cs.CR] ACM Digital Library

Why phishing still works: User strategies for combating phishing attacks

Mohamed Alsharnouby, Furkan Alaca, Sonia Chiasson.

International Journal of Human-Computer Studies (Elsevier), 82:69-82, 2015.

Authors' copy (PDF) ScienceDirect