CV

Education

Work experience

Skills

Publications

2020

– B. Z. Zhao, H. J. Asghar and M. A. Kaafar, “On the Resilience of Biometric Authentication Systems against Random Inputs”, in The Network and Distributed System Security Symposium (NDSS 2020), San Diego, February 2020. pdf,

– H. Asghar, M.A. Kaafar, “Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms”, Accepted in Privacy Preserving Technologies Symposium (PETS 2020), Montreal, July 2020. pdf,

– P. Kamalaruban, V. Perrier, H. Asghar, M. A. Kaafar, “Not All Attributes are Created Equal: dx-Private Mechanisms for Linear Queries”, Accepted in Privacy Preserving Technologies Symposium (PETS 2020), Montreal, July 2020. pdf,

– N. Wu, F. Farokhi, D. Smith and M.A. Kaafar, “The Value of Collaboration in Convex Machine Learning with Differential Privacy”, Accepted in the 41st IEEE Symposium on Security and Privacy (IEEE S&P), San Francisco, May 2020. pdf,

2019

– B.Z. Zhao, H. Asghar, R. Bhaskar and M. A. Kaafar, “On Inferring Training Data Attributes in Machine Learning Models”, In the ACM Conference on Computer and Communications Security CCS workshop on Privacy Preserving Machine Learning (PPML), London, November 2019. pdf,

– Y. Miao, B. Z. Zhao, M. Xue, C. Chen, L. Pan, J. Zhang, M.A. Kaafar, Y. Xiang, “The Audio Auditor: Participant-Level Membership Inference in Internet of Things Voice Services”, In the ACM Conference on Computer and Communications Security CCS workshop on Privacy Preserving Machine Learning (PPML), London, November 2019. pdf,

– Q. Chen, C. Xiang, M. Xue, B. Li, N. Borisov, M.A. Kaafar and H. Zhu, “Differentially Private Data Sharing: Sharing Models versus Sharing Data”, In the ACM Conference on Computer and Communications Security (CCS) Workshop on Privacy Preserving Machine Learning (PPML), London, November 2019. pdf,

– H. J. Asghar, E. De Cristofaro, G. Jourjon, M.A. Kaafar, L. Mathy, L. Melis, C. Russell, and M. Yu, “Fast Privacy-Preserving Network Function Outsourcing”, Computer Networks, Vol. 163, 2019. pdf,

– M. Ikram, P. Beaume, and M. A. Kaafar, “DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Behavior Modeling of Weighted Directed Call Graph”, Security and Cryptography (Secrypt), 2019. pdf,

-S. S. Hashmi, M. Ikram, M.A. Kaafar, “A Longitudinal Analysis of Online Ad-Blocking Blacklists”, In IEEE The 44th IEEE Conference on Local Computer Networks (LCN 2019), Osnabrück, Germany, October 2019. pdf,

– B. Zhao, M. Ikram, H. Asghar, M. A. Kaafar, “A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists”, Asia Computer Communication and Security (ASIA-CCS), 2019. Best Paper Award pdf,

– M. Ikram, R. Masood, G. Tyson, M. A. Kaafar, N. Loizon and R. Ensafi, “The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading”, to be published in the Web Conference ACM WWW 2019, San Francisco May 2019. pdf,

– V. Perrier, H. Asghar and M.A. Kaafar, “Private Continual Release of Real-Valued Data Streams”, in NDSS 2019, San Diego, CA, February 2019. pdf,

2018

– A. Shaghaghi, S. Kanhere, M.A. Kaafar, E. Bertino, S. Jha, “Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations”, in IEEE LCN 2018. pdf,

– F. Jiang, K. Thilakarathna, S. Mrabet, M.A. Kaafar, A. Seneviratne, uStash: a Novel Mobile Content Delivery System for Improving User QoE in Public Transport” in IEEE Transactions of Mobile Computing 2018. pdf,

-R. Masood, M. Ikram, D. Vatsalan, M.A. Kaafar, “Incognito: A Method for Obfuscating Web Data”, In Proceedings of WWW 2018 (Research Track), Lyon, April 2018. pdf,

– A. Shaghaghi, M.A. Kaafar, R. Buyya, S. Jha, “Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions”, Accepted in Cluster Computing 2018. pdf,

-R. Masood, B. Zhao, H. Asghar, M.A. Kaafar, “Touch and You’re Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking”, in Privacy-Enhancing Technologies Symposium (PETS 2018), Barcelona, Spain July 24–27, 2018. TouchTrack_PETS-2018-Final_Kaafar. pdf,

– H. Asghar, M.A. Kaafar, ”When are Identication Protocols with Sparse Challenges Safe? The Case of the Coskun and Herley Attack”, in the Journal of Mathematical Cryptology, 2018. pdf,

M. Ding, D. Lopez-Perez, H. Claussen, M. A. Kaafar, “On the Fundamental Characteristics of Ultra-Dense Small Cell Networks”, In IEEE Network Magazine, 2018. pdf,