default search action
Mohamed Elsabagh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c19]David A. Tomassi, Kenechukwu Nwodo, Mohamed Elsabagh:
Libra: Library Identification in Obfuscated Android Apps. ISC 2023: 205-225 - 2022
- [c18]Yuqing Yang, Mohamed Elsabagh, Chaoshun Zuo, Ryan Johnson, Angelos Stavrou, Zhiqiang Lin:
Detecting and Measuring Misconfigured Manifests in Android Apps. CCS 2022: 3063-3077 - [c17]Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky, Mohamed Elsabagh, Nikolaos Kiourtis, Brian Schulte, Angelos Stavrou:
Streaming and Unbalanced PSI from Function Secret Sharing. SCN 2022: 564-587 - 2021
- [c16]Yuede Ji, Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou:
DEFInit: An Analysis of Exposed Android Init Routines. USENIX Security Symposium 2021: 3685-3702 - 2020
- [c15]Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou, Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin:
FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware. USENIX Security Symposium 2020: 2379-2396 - [i4]Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky, Mohamed Elsabagh, Nikolaos Kiourtis, Brian Schulte, Angelos Stavrou:
Function Secret Sharing for PSI-CA: With Applications to Private Contact Tracing. CoRR abs/2012.13053 (2020) - [i3]Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky, Mohamed Elsabagh, Nikolaos Kiourtis, Brian Schulte, Angelos Stavrou:
Function Secret Sharing for PSI-CA: With Applications to Private Contact Tracing. IACR Cryptol. ePrint Arch. 2020: 1599 (2020)
2010 – 2019
- 2018
- [j1]Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou:
On early detection of application-level resource exhaustion and starvation. J. Syst. Softw. 137: 430-447 (2018) - [c14]Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou, Jeff Offutt:
Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities. AsiaCCS 2018: 777-791 - [c13]Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou:
Resilient and Scalable Cloned App Detection Using Forced Execution and Compression Trees. DSC 2018: 1-8 - 2017
- [c12]Mohamed Elsabagh, Dan Fleck, Angelos Stavrou:
Strict Virtual Call Integrity Checking for C++ Binaries. AsiaCCS 2017: 140-154 - [c11]Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou:
Detecting ROP with Statistical Learning of Program Characteristics. CODASPY 2017: 219-226 - [c10]Mohamed Elsabagh, Dan Fleck, Angelos Stavrou, Michael Kaplan, Thomas Bowen:
Practical and Accurate Runtime Application Protection Against DoS Attacks. RAID 2017: 450-471 - 2016
- [c9]Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou:
Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms. ACNS 2016: 193-211 - 2015
- [c8]Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou, Vincent Sritapan:
Targeted DoS on android: how to disable android in 10 seconds or less. MALWARE 2015: 136-143 - [c7]Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou:
Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks. RAID 2015: 515-537 - 2013
- [c6]Mohammad Karami, Mohamed Elsabagh, Parnian Najafiborazjani, Angelos Stavrou:
Behavioral Analysis of Android Applications Using Automated Instrumentation. SERE (Companion) 2013: 182-187 - 2011
- [c5]Ahmed Eleryan, Mohamed Elsabagh, Moustafa Youssef:
Synthetic Generation of Radio Maps for Device-Free Passive Localization. GLOBECOM 2011: 1-5 - [c4]Ahmed Elmorsy, Mohamed Yasser, Mohamed Elsabagh, Moustafa Youssef:
Practical Provably Secure Communication for Half-Duplex Radios. ICC 2011: 1-5 - [c3]Ahmed Eleryan, Mohamed Elsabagh, Moustafa Youssef:
AROMA: automatic generation of radio maps for localization systems. WiNTECH 2011: 93-94 - 2010
- [c2]Mohamed Elsabagh, Yara Abdallah, Moustafa Youssef, Hesham El Gamal:
ARQ security in Wi-Fi and RFID networks. Allerton 2010: 1212-1219 - [c1]Ahmed Eleryan, Mohamed Elsabagh, Moustafa Youssef:
Automatic Generation of Radio Maps for Localization Systems. MobiQuitous 2010: 372-373 - [i2]Ahmed Eleryan, Mohamed Elsabagh, Moustafa Youssef:
AROMA: Automatic Generation of Radio Maps for Localization Systems. CoRR abs/1002.1834 (2010) - [i1]Mohamed Elsabagh, Yara Abdallah, Moustafa Youssef, Hesham El Gamal:
ARQ Security in Wi-Fi and RFID Networks. CoRR abs/1010.3294 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint