The following are research publications on computer security that have been authored or co-authored by CSRL members.
Conferences
Ch4os: Discretized Generative Adversarial Network for Functionality-preserving Evasive Modification on Malware
Christopher Molloy, Furkan Alaca, Steven H. H. Ding.
International Conference on Artificial Neural Networks 2024, September 17-20, Lugano-Viganello, Switzerland.
Privacy-Preserving Multi-Party Keyword-Based Classification of Unstructured Text Data
Ian Pépin, Furkan Alaca, Farhana Zulkernine.
International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT) 2024, April 29 - May 1, Abu Dhabi, United Arab Emirates.
Authors' copy (PDF) IEEE XploreVulnerability of Open-Source Face Recognition Systems to Blackbox Attacks: A Case Study with InsightFace
Nafiz Sadman, Kazi Amit Hasan, Elyas Rashno, Furkan Alaca, Yuan Tian, Farhana Zulkernine.
IEEE Symposium Series on Computational Intelligence (SSCI) 2023, December 5-8, Mexico City, Mexico.
Authors' copy (PDF) IEEE XploreIf-This-Then-Allow-That (to phone home): A trigger-based network policy enforcement framework for smart homes
Anthony Tam, Furkan Alaca, David Barrera.
International Symposium on Foundations & Practice of Security (FPS) 2022, December 12-14, Ottawa, ON.
Authors' copy (PDF) LNCS (SpringerLink)Device fingerprinting for augmenting web authentication: Classification and analysis of methods
Furkan Alaca, P. C. van Oorschot.
Annual Computer Security Applications Conference (ACSAC) 2016, December 5-9, Los Angeles, CA.
Authors' copy (PDF) ACM Digital LibraryJournals
Comparative analysis and framework evaluating mimicry-resistant and invisible web authentication schemes
Furkan Alaca, AbdelRahman Abdou, P. C. van Oorschot.
IEEE Transactions on Dependable and Secure Computing (TDSC) 18(2):534-549, March-April 2021.
Preprint: arXiv.1708.01706 [cs.CR] IEEE XploreComparative analysis and framework evaluating web single sign-on systems
Furkan Alaca, P. C. van Oorschot.
ACM Computing Surveys, 53 (5) 112:1-112:34, September 2020.
Preprint: arXiv:1805.00094 [cs.CR] ACM Digital LibraryWhy phishing still works: User strategies for combating phishing attacks
Mohamed Alsharnouby, Furkan Alaca, Sonia Chiasson.
International Journal of Human-Computer Studies (Elsevier), 82:69-82, 2015.
Authors' copy (PDF) ScienceDirect