Kassem Fawaz

ORCID: 0000-0002-4609-7691
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy, Security, and Data Protection
  • Advanced Malware Detection Techniques
  • Adversarial Robustness in Machine Learning
  • Privacy-Preserving Technologies in Data
  • User Authentication and Security Systems
  • Anomaly Detection Techniques and Applications
  • Internet Traffic Analysis and Secure E-voting
  • Opportunistic and Delay-Tolerant Networks
  • Mobile Ad Hoc Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • Face recognition and analysis
  • Hate Speech and Cyberbullying Detection
  • Innovative Human-Technology Interaction
  • Network Security and Intrusion Detection
  • Caching and Content Delivery
  • Social Media and Politics
  • Mobile Crowdsensing and Crowdsourcing
  • Speech Recognition and Synthesis
  • Power Line Communications and Noise
  • Cognitive Radio Networks and Spectrum Sensing
  • Access Control and Trust
  • Security and Verification in Computing
  • IoT and Edge/Fog Computing
  • Digital Mental Health Interventions
  • Digital and Cyber Forensics

University of Wisconsin–Madison
2017-2025

Loyola University Chicago
2022

University of Michigan
2014-2017

American University of Beirut
2008-2013

Deutsches Zentrum für Luft- und Raumfahrt e. V. (DLR)
2009

Voice has become an increasingly popular User Interaction (UI) channel, mainly contributing to the current trend of wearables, smart vehicles, and home automation systems. assistants such as Alexa, Siri, Google Now, have our everyday fixtures, especially when/where touch interfaces are inconvenient or even dangerous use, driving exercising. The open nature voice channel makes difficult secure, hence exposed various threats demonstrated by security researchers. To defend against these...

10.1145/3117811.3117823 preprint EN 2017-10-04

As smartphones are increasingly used to run apps that provide users with location-based services, the users' location privacy has become a major concern. Existing solutions this concern deficient in terms of practicality, efficiency, and effectiveness. To address problem, we design, implement, evaluate LP-Guardian, novel comprehensive framework for protection Android smartphone users. LP-Guardian's overcomes shortcomings existing approaches by addressing tracking, profiling, identification...

10.1145/2660267.2660270 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2014-11-03

Privacy policies are the primary channel through which companies inform users about their data collection and sharing practices. These often long difficult to comprehend. Short notices based on information extracted from privacy have been shown be useful but face a significant scalability hurdle, given number of evolution over time. Companies, users, researchers, regulators still lack usable scalable tools cope with breadth depth policies. To address these hurdles, we propose an automated...

10.48550/arxiv.1802.02561 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Abstract The EU General Data Protection Regulation (GDPR) is one of the most demanding and comprehensive privacy regulations all time. A year after it went into effect, we study its impact on landscape policies online. We conduct first longitudinal, in-depth, at-scale assessment before GDPR. gauge complete consumption cycle these policies, from user impressions until compliance assessment. create a diverse corpus two sets 6,278 unique English-language inside outside EU, covering their...

10.2478/popets-2020-0004 article EN cc-by-nc-nd Proceedings on Privacy Enhancing Technologies 2020-01-01

Researchers have suggested Vehicular Ad hoc Networks as a way to enable car communications and allow for the exchange of safety other types information among cars. The Wireless Access in Environments (WAVE) protocol stack is standardized by IEEE, it allocates spectrum vehicular communication. In our work we prove that does not provide sufficient reliable information. To alleviate this problem, present system employs cognitive network principles increase allocated control channel (CCH) WAVE...

10.1109/ictel.2010.5478817 article EN 2010-01-01

Demystifying on-device AI on Instagram and TikTok.

10.1145/3714417 article EN Communications of the ACM 2025-02-19

Abstract Objective This Emerging Ideas report explores families' (parents and their children) uses gratification for ChatGPT. Background Generative artificial intelligence–based conversational agents, such as ChatGPT, can be used to accomplish a variety of tasks, yet little is known about how why parents children may use these technologies. Methods We conducted semistructured qualitative exploratory interviews with 12 U.S.‐based families that had experience sharing ChatGPT account. Families...

10.1111/fare.13171 article EN cc-by-nc Family Relations 2025-03-24

The Wireless Access in Vehicular Environments (WAVE) protocol stack is one of the most important protocols used to allocate spectrum for vehicular communication. In a previous work, we proved that WAVE does not provide sufficient reliable exchange safety information. More specifically, message delay acceptable and exceeds application requirements. this paper, propose system provides Data delivery guarantees using Cognitive networks principles congested ad hoc networks. We will refer our as...

10.1109/iwcmc.2011.5982661 article EN 2011-07-01

Biometrics have been widely adopted for enhancing user authentication, benefiting usability by exploiting pervasive and collectible unique characteristics from physiological or behavioral traits of human. However, successful attacks on "static" biometrics such as fingerprints reported where an adversary acquires users' stealthily compromises non-resilient biometrics.

10.1145/3319535.3354242 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2019-11-06

Abstract Advances in deep learning have made face recognition technologies pervasive. While useful to social media platforms and users, this technology carries significant privacy threats. Coupled with the abundant information they about service providers can associate users interactions, visited places, activities, preferences–some of which user may not want share. Additionally, facial models used by various agencies are trained data scraped from platforms. Existing approaches mitigate...

10.2478/popets-2021-0032 article EN cc-by-nc-nd Proceedings on Privacy Enhancing Technologies 2021-01-29

This paper proposes distributed cache invalidation mechanism (DCIM), a client-based consistency scheme that is implemented on top of previously proposed architecture for caching data items in mobile ad hoc networks (MANETs), namely COACS, where special nodes the queries and addresses store responses to these queries. We have also server-based scheme, named SSUM, whereas this paper, we introduce DCIM totally client-based. pull-based algorithm implements adaptive time live (TTL), piggybacking,...

10.1109/tmc.2012.37 article EN IEEE Transactions on Mobile Computing 2012-02-07

Voice has become an increasingly popular User Interaction (UI) channel, with voice-activated devices becoming regular fixtures in our homes. The popularity of voice-based assistants (VAs), however, have brought along significant privacy and security threats to their users. Recent revelations indicated that some VAs record user's private conversations continuously innocuously. With the being connected Internet, they can leak recorded content without authorization. Moreover, these often do not...

10.1145/3229565.3229573 article EN 2018-08-01

Port scanning is the most popular reconnaissance technique attackers use to discover services they can break into. detection has received a lot of attention by researchers. However slow port scan attack deceive existing Intrusion Detection Systems (IDS). In this paper, we present new, simple, and efficient method for detecting scans. Our proposed mainly composed two phases: (1) feature collection phase that analyzes network traffic extracts features needed classify certain IP as malicious or...

10.1109/isias.2011.6122824 article EN 2011-12-01

Browser extensions offer a variety of valuable features and functionalities. They also pose significant security risk if not properly designed or reviewed. Prior works have shown that browser can access manipulate data fields, including sensitive such as passwords, credit card numbers, Social Security numbers. In this paper, we present an empirical study the risks posed by extensions. Specifically, first build proof-of-concept extension steal user information. We find passes Chrome Webstore...

10.1145/3589334.3645683 article EN Proceedings of the ACM Web Conference 2022 2024-05-08

Mobile devices are getting more pervasive, and it is becoming increasingly necessary to integrate web services into applications that run on these devices. We introduce a novel approach for dynamically invoking service methods from mobile with minimal user intervention only involves entering search phrase values the method parameters. The architecture overcomes technical challenges involve consuming discovered by introducing man-in-the-middle (MIM) server provides whose responsibility...

10.1109/tsc.2010.49 article EN IEEE Transactions on Services Computing 2010-12-22

As social robots become increasingly prevalent in day-to-day environments, they will participate conversations and appropriately manage the information shared with them. However, little is known about how might discern sensitivity of information, which has major implications for human-robot trust. a first step to address part this issue, we designed privacy controller, Confidant, conversational robots, capable using contextual metadata (e.g., sentiment, relationships, topic) from model...

10.1109/hri53351.2022.9889540 article EN 2016 11th ACM/IEEE International Conference on Human-Robot Interaction (HRI) 2022-03-07

Google has mandated developers to use Data Safety Sections (DSS) increase transparency in data collection and sharing practices. In this paper, we present a comprehensive analysis of Google's Section using both quantitative qualitative methods. We conduct the first large-scale measurement study DSS apps from Android Play store (n=1.1M). find that there are internal inconsistencies within reported also trends over under-reporting practices DSSs. Next, longitudinal explore how evolve time,...

10.48550/arxiv.2306.08111 preprint EN cc-by arXiv (Cornell University) 2023-01-01

Although the Internet of Things (IoT) computing paradigm is promising new applications, it introduces unprecedented security and privacy threats to individuals their environments. The interactions within IoT make more challenging protect users devices against these threats.

10.1109/mc.2018.2888765 article EN Computer 2019-04-01

It is cost-effective to process wireless frames on general purpose processors (GPPs) in place of dedicated hardware. Wireless operators are decoupling signal processing from basestations and implementing it a cloud compute resources, also known as cloud-RAN (C-RAN). A C-RAN must meet the deadlines frames; for example, 3ms transport, decode respond an LTE uplink frame. The design baseband these platforms thus major challenge which various real-time scheduling techniques have been proposed. In...

10.1145/2999572.2999591 article EN 2016-11-29
Coming Soon ...