Close

Publications

Research is an important part of my learning process. I have worked in areas related to Software Engineering Education, Search in Social Networks and Formal Specification and Verification. My current areas of interest are security and privacy on modern smartphone platforms. Following is a list of my publications. I’ll post as much information about these publications as possible.

Books, Book Chapters and Journal Papers

  1. Nauman, M., Ali, T., Khan, S., Syed, T. A. Deep Neural Architectures for Large Scale Android Malware Analysis. In Cluster Computing. Accepted. pp n–n. Indexed ISI. Impact factor: 1.514. Springer. May, 2017.
  2. Ali, T., Nauman, M., Jan, S. Trust in IoT: dynamic remote attestation through efficient behavior capture. In Cluster Computing. Early Access. pp 1–13. Indexed ISI. Impact factor: 1.514. Springer. April, 2017.
  3. Ali, T., Ismail, R., Musa, S., Nauman, M., Khan, S. Design and implementation of an attestation protocol for measured dynamic behavior. In Journal of Supercomputing. Vol. 73. No. 4. pp 1–28. Indexed ISI. Impact factor: 1.088. Springer. April, 2017.
  4. Nauman, M., Azam, N., Yao, J.T. A three-way decision making approach to malware analysis using probabilistic rough sets. In Information Sciences. Vol. 374 pp 193–209. Indexed ISI. Impact factor: 3.364. Elsevier. December, 2016.
  5. Khan, S., Nauman, M., Othman, A.T., Musa, S., Ali, T. TSSDroid: realization of an efficient and usable TSS API for the Android software stack. In Security and Communication Networks. 9(11) pp 1553–1576. Indexed ISI. Impact factor: 0.806. Wiley. July, 2016.
  6. Nauman, M. Khan, S., Othman, A.T., Musa, S. Realization of a User-Centric, Privacy Preserving Permission Framework for Android. In Security and Communication Networks. Indexed ISI. Impact factor: 0.806. Wiley. February, 2015.
  7. Toegl, R. ,  Winkler, T., Nauman, M., Hong, T.W., Winter, J., Gissing, M. Programming Interfaces for the TPM. [Book Chapter] in Trusted Computing for Embedded Systems. pp 3-32. Springer. November, 2014.
  8. Toegl, R., Winkler, T., Nauman, M. Hong, T. Specification and Standardization of a Java Trusted Computing API. In Software: Practice and Experience. Indexed ISI. Impact factor: 0.652. Wiley. July, 2011.
  9. Alam, M., Ali, T., Khan, S., Khan, S., Ali, M., Nauman, M., Hayat, A., Khan, M.K., Alghathbar, K. Analysis of existing remote attestation techniques. In Security and Communication Networks. Indexed ISI. Impact factor: 0.806. Wiley. 2011.
  10. Alam, M., Zhang X.,Nauman, M. Ali, T., Ali, M., Anwar, S., and Alam, Q. Behavioral Attestation for Web Services using access policies. In Multimedia Tools and Applications. Indexed ISI. Impact factor: 1.331. Volume 53. No. 1. Springer. May, 2011.
  11. Nauman, M. Tamleek Ali and Azhar Rauf. Using Trusted Computing for Privacy Preserving Keystroke-based Authentication in Smartphones. In Telecommunications Systems Journal. Indexed ISI. Impact factor: 0.822. Springer. July, 2011.
  12. Tamleek Ali, Masoom Alam, Nauman, M, Toqeer Ali, Muhammad Ali and Sajid Anwar. A Scalable and Privacy Preserving Remote Attestation. Journal of Information. Indexed ISI. Impact factor: 0.099. Accepted October, 2010.
  13. Nauman, M, Tamleek Ali, Muhammad Khurram Khan and Khaled Alghathbar. Information Flow Analysis of UCON. International Journal of Physical Sciences. June 2010 Vol. 5, Num. 6. pp 865 – 875. Indexed ISI. Impact Factor: 0.554
  14. Masoom Alam, Xinwen Zhang, Nauman, M, Tamleek Ali and Patrick C.K. Hung. Behavioral Attestation for Web Services Based Business ProcessesInternational Journal of Web Services Research. Indexed ISI/SCI-E, Impact factor: 1.200. Vol. 7. Num 3. pp 52-72. 2010.
  15. Nauman, M and Sohail Khan. Design and Implementation of a Fine-grained Resource Usage Model for the Android Platform. International Arab Journal of Information Technology. Indexed ISI/SCI-E. Impact Factor: 0.519.  Vol. 8, No. 4  October 2011.
  16. Integrity Based Access Control: A Case Study in Remote Attestation.
    [Book – Co-authored]
    Publisher: VDM Verlag Dr. Mueller e.K. (Germany) on December 29, 2008.
    ISBN-10: 363910661X
    ISBN-13: 978-3639106619
    Available from Amazon
  17. Nauman, M., Shahbaz Khan and Sanaullah Khan. Helplets: A Collaborative Help Collection and Retrieval Architecture for Web-Enabled Systems.
    [Book Chapter] in Web-based Support Systems. Springer, 2010.
  18. Common Sense and Folksonomy: Engineering a Model for an Intelligent Search System.
    [Book]
    Publisher: VDM Verlag Dr. Mueller e.K. (Germany) on June 10, 2008.
    ISBN-10: 3639040872
    ISBN-13: 978-3639040876
    Available from Amazon

Editorial Services

  1. Program Committee: Served on the Program Committee of 6thInternational Conference on Trust & Trustworthy Computing, London, UK — the leading conference on Trusted Computing technologies
  2. Journal and Conference Reviews: Reviewed papers for several journals including IEEE Computer, Springer TeleSys, Wiley Security and Communication Networks, Journal of Computer Security and Elsevier EIS as well as several high-ranking conferences including Trust’11, Trust’12, SACMAT’09, SACMAT’12 among others.

Conference Papers

  1. Backes, M., Nauman, M. LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning. April, 2017. Proceedings of the IEEE European Symposium on Security and Privacy (Euro S&P ’17). Paris, France.
  2. Ali, T., Ali, J., Ali, T., Nauman, M., Musa, S. Efficient, Scalable and Privacy Preserving Application Attestation in a Multi Stakeholder Scenario. 16th International Conference on Computer Science and its Applications (ICCSA’2016). July 2016. LNCS Vol. 9789, pp 407-421. Beijing, China.
  3. Nauman, M., Azam, N. A Three-way Decision Making Approach to Malware Analysis. 2015 International Joint Conference on Rough Sets. December, 2015. Tianjin, China.
  4. Nauman, M., Khan, S., Othman, A.T., Musa, S., Najeeb-ur-Rehman. POAuth: Privacy-aware Open Authorization for Native Apps on Smartphone Platforms. 6th ACM International Conference on Ubiquitous Information Management and Communication (ACM ICUIMC 2012). February, 2012. Kuala Lumpur, Malaysia.
  5. Syed, T.A., Ismail, R., Musa, S., Nauman, M., Khan, S. A Sense of Others: Behavioral Attestation of Unix Processes on Remote Platforms. 6th ACM International Conference on Ubiquitous Information Management and Communication (ACM ICUIMC 2012). February, 2012. Kuala Lumpur, Malaysia.
  6. Khan, S., Nauman, M., Othman, A.T., Musa. M. How Secure is your Smartphone: An Analysis of Smartphone Security Mechanisms. 8th IEEE International Conference on Networked Computing and Advanced Information Management (NCM 2012). April, 2012. Seoul, Korea.
  7. Tamleek Ali, Nauman, M and Xinwen Zhang. On Leveraging Stochastic Models for Remote Attestation. 2nd International Conference on Trusted Systems (InTrust2010). December 2010. Beijing, China.
  8. Nauman, M., Sohail Khan, Xinwen Zhang and Jean-Pierre Seifert. Beyond Kernel-level Integrity Measurement: Enabling Remote Attestation for the Android Platform. 3rd International Conference on Trust and Trustworthy Computing (Trust 2010). June, 2010. Berlin, Germany.
  9. Alam, M., Zhang, X., Nauman, M , Khan, S., Alam, Q. MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services. 6th World Congress on Services, SERVICES 2010. July 2010. Florida, USA.
  10. Nauman, M. and Ali, T. TOKEN: Trustable Keystroke-based Authentication for Web-based Applications on Smartphones. International Workshop on Wireless and Network Security (WSN’10) in conjunction with International Conference on Information Security and Assurance (ISA’10). June, 2010. Miyazaki, Japan.
  11. Tamleek Ali, Nauman, M. Fazl-e-Hadi, Fahad bin Muhaya. On Usage Control of Multimedia Content in and through Cloud Computing Paradigm. 5th International Conference on Future Information Technology (FutureTech2010).  May 2010. Busan, Korea.
  12. Tamleek Ali, Nauman, M., Muhammad Amin, Masoom Alam. Scalable, Privacy-preserving Remote Attestation in and through Federated Identity Management Frameworks. International Conference on Information Science and Applications (ICISA 2010). April 2010. Seoul, Korea.
  13. Nauman, M., Sohail Khan and Xinwen Zhang. Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints.(Full version) 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS2010). April 2010. Beijing, China.
  14. Tamleek Ali, Nauman, M. and Masoom Alam. Scalable, Privacy-preserving Remote Attestation. International Conference on Trusted Systems (Intrust09). December 2009. Beijing, China.
  15. Imran Khan, Nauman, M., Masoom Alam and Furqan Aziz. SAuthMash: Mobile Agent based Self Authorization in Mashups.  International ACM Conference on Frontiers of Information Technology  (FIT’09). 2009. ACM. Abottabad, Pakistan.
  16. Shahbaz Khan, Sanullah Khan, Nauman, M., Tamleek Ali and Masoom Alam. Realizing Dynamic Behavior Attestation for Mobile.  International ACM Conference on Frontiers of Information Technology  (FIT’09). 2009. ACM. Abottabad, Pakistan.
  17. Ronald Toegl, Thomas Winkler, Nauman, M. and Theordore Hong. Towards Platform Independent Trusted Computing. Proceedings of the Fourth Annual Workshop on Scalable Trusted Computing (STC’09) at the 16th International ACM Conference on Computers and Communication Security (CCS’09). 2009. ACM. Chicago, Illinois, USA.
  18. Tamleek Ali and Nauman, M. Incorporating Remote Attestation for End-to-End Protection in Web Communications Paradigm. International Conference on Internet Technologies and Applications (ITA’09). September 2009. Wrexham, UK.
  19. Masoom Alam, Nauman, M., Xinwen Zhang, Tamleek Ali and Patrick Hung. Behavioral Attestation for Business Processes (BA4BP). 7th IEEE International Conference on Web Services (ICWS’09). IEEE. July, 2009. Los Angeles, USA.
  20. Nauman, M., Masoom Alam, Xinwen Zhang and Tamleek Ali. Remote Attestation of Information Flows and Attribute Updates in a UCON System. 2nd International Conference on Techncial and Socio-Economic Aspects of Trusted Computing (Trust2009). Springer. April, 2009. Oxford, UK. [PPTX] Talk Sponsored by the ICT R&D Fund, Pakistan.
  21. Nauman M. and Tamleek Ali. HUE: A Hardware UCON Engine for Fine-grained, Continuous Usage Control. 12th International IEEE Multitopic Conference (INMIC 2008). December, 2008. Karachi, Pakistan.
    [Paper]
  22. Masoom Alam, Xinwen Zhang, Nauman, M., and Tamleek Ali. Behavioral Attestation for Web Services (BA4WS). In Proceedings of International Workshop on Secure Web Services (SWS’08.) at the 15th International ACM Conference on Computers and Communication Security (CCS’08). 2008. ACM. Fairfax, Virginia, USA.
  23. Nauman, M., Khan, S., Amin, M. and Hussain, F. Resolving Lexical Ambiguities in Folksonomy Based Search Systems through Common Sense and Personalization. in Proceedings of the Semantic Search 2008 Workshop. (SemSearch 2008): located at the 5th European Semantic Web Conference (ESWC2008), Tenerife, Spain.
  24. Masoom Alam, Zhang, X., Nauman, M., Ali, T., and Seifert, J. Model-based Behavioral Attestation. In Proceedings of the 13th ACM Symposium on Access Control Models and Technologies. SACMAT ‘08. ACM, New York, NY, 175-184. Estes Park, CO, USA.
  25. Khan S., Amin, M and Nauman, M. A Comprehensive Analysis of MAC Enhancements for Leveraging Distributed MAC. In Proceedings of the International MultiConference of Engineers and Computer Scientists (IMECS 08), Hong Kong.
  26. Ali, T. Nauman, M. and Alam M. An Accessible Formal Specification of UML and OCL Meta-Model in Isabelle/HOL. In Proceedings of the International Multitopic Conference 2007 (INMIC’07). Lahore, Pakistan.
    [Isabelle Theory File]
  27. Nauman, M. and Khan, S.  Using PersonalizedWeb Search for Enhancing Common Sense and Folksonomy Based Intelligent Search Systems. In Proceedings of the IEEE/WIC/ACM international Conference on Web intelligence (November 02 – 05, 2007). Web Intelligence. IEEE Computer Society, Washington, DC, 423-426. Silicon Valley, USA.
    Sponsored by the Higher Education Commission of Pakistan.
  28. Nauman, M. and Hussain, F. “Common Sense and Folksonomy: Engineering an Intelligent Search System,” in Proceedings of ICIET’07: International Conference on Information and Emerging Technologies. ICET. IEEE. Karachi, Pakistan. 2007.
  29. Nauman, M. and Uzair, M. 2007. SE and CS Collaboration: Training Students for Engineering Large, Complex Systems. In Proceedings of the 20th Conference on Software Engineering Education & Training (July 03 – 05, 2007). CSEET. IEEE Computer Society. Dublin, Ireland.
    Talk sponsored by the CSEE&T and Dublin City University, Ireland.

Countries Visited

  1. Ireland. For presenting a paper in CSE&T 2007. April 2007
  2. United Kingdom. For presenting a paper in Trust 2009. April 2009
  3. United States. For presenting a paper in STC09 at CCS09. November 2009
  4. Malaysia. For PhD studies and presenting papers at conferences. 2011-2014.
  5. Germany. For visiting Saarland University, Sarbrücken. Sponsored by CISPA. March 2015.
  6. Spain. As a visiting scholar to the Machine Learning Summer School. Supported by the Max Planck Institute for Software Systems, Germany. May 2016.
  7. France. For presenting a paper in EuroS&P 2017. April 2017. Visit sponsored by Max Planck Institute for Software Systems, Germany.

One thought on “Publications

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top
%d bloggers like this: