Mohannad Alhanahnah

ORCID: 0000-0001-7108-3809
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Security and Verification in Computing
  • Software Testing and Debugging Techniques
  • Network Security and Intrusion Detection
  • Cloud Data Security Solutions
  • Software Reliability and Analysis Research
  • Adversarial Robustness in Machine Learning
  • Scientific Computing and Data Management
  • IoT and Edge/Fog Computing
  • Software System Performance and Reliability
  • Software Engineering Research
  • Cloud Computing and Resource Management
  • Radiation Effects in Electronics
  • Topic Modeling
  • Digital and Cyber Forensics
  • Brain Tumor Detection and Classification
  • Business Process Modeling and Analysis
  • Blockchain Technology Applications and Security
  • Spam and Phishing Detection
  • Information and Cyber Security
  • Misinformation and Its Impacts
  • Distributed and Parallel Computing Systems
  • Natural Language Processing Techniques
  • Access Control and Trust
  • Web Application Security Vulnerabilities

University of Wisconsin–Madison
2020-2024

University of Nebraska–Lincoln
2017-2020

Eindhoven University of Technology
2017

Singapore University of Technology and Design
2016

University of Kent
2016

Breast cancer is very popular between females all over the world. However, detecting this in its first stages helps saving lives. Radiologists can predict if mammography images have or not, but they may miss about 15% of them. In paper, we propose a new method to detect breast with high accuracy. This consists two main parts, part image processing techniques are used prepare for feature and pattern extraction process. The second presented by utilizing extracted features as an input types...

10.1109/dese.2016.8 article EN 2021 14th International Conference on Developments in eSystems Engineering (DeSE) 2016-08-01

Internet-of-Things IoT devices are increasingly targeted Uy adversaries due to their unique characteristics such as constant online connection, lack of protection, and full integration in people's daily life. As attackers shift targets towards devices, malware has been developed compromise equipped with different CPU architectures. While detection a well-studied area for desktop PCs, heterogeneous processor architecture brings challenges. Existing approaches utilize static or dynamic binary...

10.1109/cns.2018.8433203 article EN 2018-05-01

The ubiquity of Internet Things (IoT) and our growing reliance on IoT apps are leaving us more vulnerable to safety security threats than ever before. Many these manifested at the interaction level, where undesired or malicious coordinations between physical devices can lead intricate issues. This paper presents IoTCOM, an approach automatically discover such hidden unsafe in a compositional scalable fashion. It is backed with auto-mated program analysis formally rigorous violation detection...

10.1145/3395363.3397347 article EN 2020-07-13

Automatic Program Repair (APR) has garnered significant attention as a practical research domain focused on automatically fixing bugs in programs. While existing APR techniques primarily target imperative programming languages like C and Java, there is growing need for effective solutions applicable to declarative software specification languages. This paper presents systematic investigation into the capacity of Large Language Models (LLMs) repairing specifications Alloy, formal language...

10.48550/arxiv.2404.11050 preprint EN arXiv (Cornell University) 2024-04-16

A large and rapidly increasing number of services are offered through the Internet, in cloud. This enables users to utilize remotely, without even knowing service provider. However, before putting their trust a provider, need be able evaluate how trustworthy is. can daunting task, as many factors considered analyzed. The current paper aims at helping selection provider by presenting taxonomy outlining its application practical scenarios. brief description framework built on this is also given.

10.1109/mcc.2017.20 article EN IEEE Cloud Computing 2017-01-01

Today's software is bloated with both code and features that are not used by most users. This bloat prevalent across the entire stack, from operating systems applications to containers. Containers lightweight virtualization technologies package dependencies, providing portable, reproducible isolated environments. For their ease of use, data scientists often utilize machine learning containers simplify workflow. However, this convenience comes at a cost: unnecessary resulting in very large...

10.1145/3639032 article EN Proceedings of the ACM on Measurement and Analysis of Computing Systems 2024-02-16

Due to the growing presence of Internet Things (IoT) apps and devices in smart homes cities, there are more concerns about their security privacy risks. IoT normally interact with each other physical world offer utility users. In this paper, we investigate safety risks brought by interactive behaviors apps. Two major challenges ensue identifying interaction threats: i) how discover threats across both cyber channels; ii) ensure scalability detection approach. To address these challenges,...

10.1109/tse.2022.3179294 article EN IEEE Transactions on Software Engineering 2022-05-31

Android inter-app communication (IAC) allows apps to request functionalities from other apps, which has been extensively used provide a better user experience. However, IAC also become an enticing target by attackers launch malicious activities. Dynamic class loading (DCL) and reflection are effective features enhance the functionality of apps. In this paper, we expose new attack that leverages these in conjunction with conceal attacks ability bypass existing security mechanisms. To...

10.1109/tifs.2020.2976556 article EN publisher-specific-oa IEEE Transactions on Information Forensics and Security 2020-01-01

Program debloating aims to enhance the performance and reduce attack surface of bloated applications. Several techniques have been recently proposed specialize programs. These approaches are either based on unsound strategies or demanding techniques, leading unsafe results a high-overhead process. In this paper, we address these limitations by applying partial-evaluation principles generate specialized Our approach relies simple observation that an application typically consists...

10.1109/eurosp53844.2022.00024 preprint EN 2022-06-01

Today's software is bloated with both code and features that are not used by most users. This bloat prevalent across the entire stack, from operating systems applications to containers. Containers lightweight virtualization technologies package dependencies, providing portable, reproducible isolated environments. For their ease of use, data scientists often utilize machine learning containers simplify workflow. However, this convenience comes at a cost: unnecessary resulting in very large...

10.1145/3652963.3655064 article EN 2024-06-01

Security is considered a significant deficiency in cloud computing, and insider threats problem exacerbate security concerns the cloud. In addition to that, computing very complex by itself, because it encompasses numerous technologies concepts. Apparently, overcoming these challenges requires substantial efforts from information researchers develop powerful mitigation solutions for this emerging problem. This entails developing taxonomy of environments encompassing all potential abnormal...

10.1093/comjnl/bxw020 article EN The Computer Journal 2016-06-17

Java reflection and dynamic class loading (DCL) are effective features for enhancing the functionalities of Android apps. However, these can be abused by sophisticated malware to bypass detection schemes. Advanced utilize DCL in conjunction with Inter-App Communication (IAC) launch collusion attacks using two or more Such dynamically revealed malicious behaviors enable a new type stealthy, collusive attacks, bypassing all existing mechanisms. In this paper, we present DINA, novel hybrid...

10.1109/infocom.2019.8737637 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2019-04-01

Developers often make mistakes while incorporating SSL/TLS functionality in their applications due to the complication implementing and fast prototyping requirement. Insecure implementations of are subject different types Man The Middle (MiTM) attacks, which ultimately makes communication between two parties vulnerable eavesdropping hijacking thereby violating confidentiality integrity exchanged information. This paper aims support developers detecting insecure implementation codes by...

10.1109/infcomw.2018.8407011 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2018-04-01

The rising popularity of the Internet-of-Things (IoT) devices has driven their increasing adoption in various settings, such as modern homes. IoT systems integrate physical with third-party apps, which can coordinate arbitrary ways. However, malicious or undesired coordination lead to serious vulnerabilities. This paper explores two different ways, i.e., a commonly-used state-based approach and holistic, rule-based approach, formally model app safety security thereof context platforms. less...

10.1145/3416507.3423188 article EN 2020-11-06

With the advent of Advanced Persistent Threats (APTs) and exploits such as Eurograbber, we can no longer trust user's PC or mobile phone to be honest in their transactions with banks. This paper reviews current state art protecting PCs from malware APTs that modify banking transactions, identifies strengths weaknesses. It then proposes an enhanced USB device based on speech vision. User trials a software prototype show is both user friendly users are less susceptible accepting subtly...

10.1109/ccc.2016.13 article EN 2016-08-01

Managing software dependencies is a crucial maintenance task in development and becoming rapidly growing research field, especially light of the significant increase supply chain attacks. Specialized expertise substantial developer effort are required to fully comprehend reveal hidden properties about (e.g., number dependencies, dependency chains, depth dependencies). Recent advancements Large Language Models (LLMs) allow retrieval information from various data sources for response...

10.48550/arxiv.2405.20455 preprint EN arXiv (Cornell University) 2024-05-30

Today's software is bloated with both code and features that are not used by most users. This bloat prevalent across the entire stack, from operating systems applications to containers. Containers lightweight virtualization technologies package dependencies, providing portable, reproducible isolated environments. For their ease of use, data scientists often utilize machine learning containers simplify workflow. However, this convenience comes at a cost: unnecessary resulting in very large...

10.1145/3673660.3655064 article EN ACM SIGMETRICS Performance Evaluation Review 2024-06-11

Software debloating seeks to mitigate security risks and improve performance by eliminating unnecessary code. In recent years, a plethora of tools have been developed, creating dense varied landscape. Several studies delved into the literature, focusing on comparative analysis these tools. To build upon efforts, this paper presents comprehensive systematization knowledge (SoK) software We conceptualize workflow, which serves as basis for developing multilevel taxonomy. This framework...

10.48550/arxiv.2407.11259 preprint EN arXiv (Cornell University) 2024-07-15

While there has been exponential improvements in hardware performance over the years, software lagged behind. The performance-gap is caused by inefficiencies, many of which are bloat. Software bloat occurs due to ever increasing, mostly unused, features and dependencies a software. Bloat exists all layers software, from operating system, application, resulting computing resource wastage. problem exacerbated both cloud edge setting as number applications running increase. To remove bloat,...

10.48550/arxiv.2305.04641 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Robot Operating System (ROS) is widely used in academia and industry, importantly leveraged safety-critical robotic systems. The quality of ROS software can affect the safety security properties robotics systems; therefore, reliability are imperative to guarantee. Source code static analysis a key approach formally perform verification. We address two concerns this paper: (1) conducting systematic literature review study provide complete picture existing methods that analyze different...

10.48550/arxiv.2012.07196 preprint EN cc-by arXiv (Cornell University) 2020-01-01

Multiple Perspective attack Investigation ( <sc xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">MPI</small> ) is a technique to partition application dependencies based on high-level semantics. It facilitates provenance analysis by generating succinct causal graphs. involves an annotation process that identifies variables and data structures corresponding the partitions communication channels between them. Though amount of small, this requires...

10.1109/tse.2022.3231242 article EN IEEE Transactions on Software Engineering 2022-12-22

Software debloating techniques are applied to craft a specialized version of the program based on user's requirements and remove irrelevant code accordingly. The debloated programs presumably maintain better performance reduce attack surface in contrast original programs. This work unleashes effectiveness applying software robustness machine learning systems malware classification domain. We empirically study how an adversarial can leverage mislead models. apply generate examples demonstrate...

10.48550/arxiv.2309.08058 preprint EN other-oa arXiv (Cornell University) 2023-01-01
Coming Soon ...