Abdulla Aldoseri

ORCID: 0000-0002-4959-6832
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Security and Verification in Computing
  • Advanced Malware Detection Techniques
  • Software System Performance and Reliability
  • Digital and Cyber Forensics
  • Software Reliability and Analysis Research
  • Diamond and Carbon-based Materials Research
  • User Authentication and Security Systems
  • Software Testing and Debugging Techniques

University of Birmingham
2019-2023

University College of Bahrain
2022

University of Bahrain
2022

This paper analyzes the vulnerability space arising in Trusted Execution Environments (TEEs) when interfacing a trusted enclave application with untrusted, potentially malicious code. Considerable research and industry effort has gone into developing TEE runtime libraries purpose of transparently shielding code from an adversarial environment. However, our analysis reveals that requirements are generally not well-understood real-world implementations. We expose several sanitization...

10.1145/3319535.3363206 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2019-11-06

Ensuring the integrity of a remote app or device is one most challenging concerns for Android ecosystem. Software-based solutions provide limited protection and can usually be circumvented by repacking mobile rooting device. Newer protocols use trusted hardware to stronger attestation guarantees, e.g., Google SafetyNet, Samsung Knox (V2 V3 attestation), Key Attestation. So far, used these systems have received relatively little attention. In this paper, we formally model platforms using...

10.1145/3579856.3582812 article EN 2023-07-05

Uniform Resource Identifier (URI) schemes instruct browsers to conduct specific actions depending on the requested scheme.Previous research has addressed numerous issues with web URI (e.g., http: and https:) both for desktop mobile browsers.Less attention been paid local data: file:), specifically browsers.In this work, we examined implementation of such in Android OS browsers, analysing top-15 browsers.As a result, discovered three vulnerability types that affect several major (including...

10.14722/madweb.2022.23003 article EN 2022-01-01
Coming Soon ...