Publications
For a full and up-to-date list, please see my Google Scholar profile.
2023
-
Those Aren’t Your Memories, They’re Somebody Else’s: Seeding Misinformation in Chat Bot Memories C Atkins, BZH Zhao, HJ Asghar, ID Wood, D Kaafar. ACNS 2023.
-
Unintended Memorization and Timing Attacks in Named Entity Recognition Models
RS Ali, BZH Zhao, HJ Asghar, T Nguyen, ID Wood, D Kaafar.
PETS 2023.
2022
-
SoK: use of cryptography in malware obfuscation
HJ Asghar, B Zhao, M Ikram, DLG Nguyen, D Kaafar, S Lamont, D Coscia.
arxiv preprint arXiv:2212.04008. -
Making the most of parallel composition in differential privacy
J Smith, HJ Asghar, G Gioiosa, S Mrabet, S Gaspers, P Tyler.
PETS 2022. -
A Differentially Private Framework for Deep Learning with Convexified Loss Functions
Z Lu, HJ Asghar, MA Kaafar, D Webb, P Dickinson.
IEEE Transactions on Information Forensics and Security
Older
Journals
- On the Linearization of Human Identification Protocols: Attacks based on Linear Algebra, Coding Theory and Lattices
Hassan Asghar, Ron Steinfeld, Shujun Li, Dali Kaafar, Josef Pieprzyk.
IEEE Transactions on Information Forensics and Security, vol. 10, no, 8, pp. 1643-1655, April, 2015. - A Subexponential Construction of Graph Coloring for Multiparty Computation
Hassan Asghar, Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld.
Journal of Mathematical Cryptology, vol. 8, no. 4, pp. 363-403, December, 2014. - On the Hardness of the Sum of k Mins Problem
Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang.
The Computer Journal, vol. 54, no. 10, pp. 1652-1660, 2011. - Cryptanalysis of the Convex Hull Click Human Identification Protocol
Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang.
International Journal of Information Security, vol. 12, no. 2, pp. 83-96, April 2013. - Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks
Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d’Auriol, Heejo Lee, Sungyoung Lee, Young-Jae Song.
IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 11, pp. 1698-1712, 2009.
Conferences
- Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning
Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Balachander Krishnamurthy, Anirban Mahanti
Accepted at PETS 2017. - SplitBox: Toward Efficient Private Network Function Virtualization
Hassan Jameel Asghar, Luca Melis, Cyril Soldani, Emiliano De Cristofaro, Mohamed Ali Kâafar, Laurent Mathy
HotMIddlebox 2016: 1-7. - Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case
Jagmohan Chauhan, Hassan Jameel Asghar, Anirban Mahanti, Mohamed Ali Kaafar
ACNS 2016: 648-665 - Private Processing of Outsourced Network Functions: Feasibility and Constructions
Luca Melis, Hassan Jameel Asghar, Emiliano De Cristofaro, Mohamed Ali Kaafar
SDN-NFV@CODASPY 2016: 39-44 - Mobility Independent Secret Key Generation for Wearable Health-care Devices
Girish Revadigar, Chitra Javali, Hassan Jameel Asghar, Kasper Bonne Rasmussen, Sanjay Jha
10th EAI International Conference on Body Area Networks, accepted, 2015. - iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel
Girish Revadigar, Chitra Javali, Hassan Asghar, Kasper B. Rasmussen, Sanjay Jha
Poster Presentation. 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), Singapore, April, 2015. - On the Intrusiveness of JavaScript on the Web
Muhammad Ikram, Hassan Asghar, Dali Kaafar, Anirban Mahanti. ACM CoNext, Sydney, 2014. - Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks
Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pieprzyk.
The 20th Annual Network and Distributed System Security Symposium (NDSS 2013), 2013. - A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm
Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang.
The 8th International Conference on Applied Cryptography and Network Security (ACNS 2010), pp. 349-366, 2010. - Cryptanalysis of the Convex Hull Click Human Identification Protocol
Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang.
The 13th Information Security Conference (ISC 2010), pp. 24-30, 2010. - On the Security of PAS (Predicate-based Authentication Service)
Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang.
The 25th Annual Computer Security Applications Conference (ACSAC 2009), pp. 209-218, 2009. - Image-Feature Based Human Identification Protocols on Limited Display Devices
Hassan Jameel, Riaz Ahmed Shaikh, Le Xuan Hung, Yuan Wei Wei, Syed Muhammad Khaliq-ur-rehman Raazi, Ngo Trong Canh, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes.
The 9th International Workshop on Information Security Applications (WISA 2008), pp. 211-224, 2008. - Human Identification Through Image Evaluation Using Secret Predicates
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungyoung Lee.
The Cryptographers’ Track at the RSA Conference 2007 (CT-RSA 2007), pp. 67-84, 2007. - A Trust Model for Ubiquitous Systems based on Vectors of Trust Values
Hassan Jameel, Le Xuan Hung, Umar Kalim, Ali Sajjad, Sungyoung Lee, Young-Koo Lee.
The 7th IEEE International Symposium on Multimedia (ISM 2005), pp. 674-679, 2005.
E-prints
- When are Identification Protocols with Sparse Challenges Safe? The Case of the Coskun and Herley Attack
Hassan Jameel Asghar and Mohamed Ali Kaafar
Submitted, 2016.
PhD Thesis
- Design and Analysis of Human Identification Protocols
Hassan Jameel Asghar
PhD Thesis. Macquarie University, 2012.