University of Saskatchewan

Computer Security Research Lab


Publications

2022

Authenticated Multi-Version Index for Blockchain-Based Range Queries on Historical Data S. Linoy, S.Ray, N. Stakhanova IEEE International Conference on Blockchain (IEEE Blockchain 2022)
HTTPFuzz: Web Server Fingerprinting with HTTP Request Fuzzing A. Kar, A. Natadze, E. Branca, and N. Stakhanova The 19th International Conference on Security and Cryptography (SECRYPT 2022)
Analysis and prediction of web proxies misbehavior Z.Nezhadian, E. Branca, and N. Stakhanova The 5th International Workshop on Emerging Network Security (ENS 2022)
AndroClonium: bytecode level clone detection for obfuscated Android apps A.Foroughipour N. Stakhanova, F. Abazari, B. Sistany 37th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) 2022

Simulator:
Smali Simulator
Execution trace analyzer
@article{Foroughipour22,
author = {A.Foroughipour  N. Stakhanova, F. Abazari and B. Sistany},
title = {AndroClonium: bytecode level clone detection for obfuscated Android apps},
year = {2022},
issue_date = {June 2022},
publisher="Springer International Publishing",
address="Cham",
volume = {},
number = {},
booktitle= {37th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC},
month = {},
articleno = {},
numpages = {}}          

2021

Dataset characteristics for reliable code authorship attribution F. Abazari, E. Branca, N. Ridley, N. Stakhanova, M. Dalla Preda. Transactions on Dependable and Secure Computing (TDSC), 2022
@inproceedings{Abazari22,
author = {Farzaneh Abazari, Enrico Branca, Norah Ridley,  Natalia Stakhanova, Mila Dalla Preda},
title = {Dataset characteristics for reliable code authorship attribution},
year = {2022},
issue_date = {February 2022},
publisher = {IEEE},
address = {New York, NY, USA},
volume = {},
number = {},
journal = {Transactions on Dependable and Secure Computing},
month = {},
articleno = {},
numpages = {}}          
EtherProv: Provenance-Aware Detection, Analysis, and Mitigation of Ethereum Smart Contract Security Issues S.Linoy, S.Ray, N. Stakhanova. IEEE International Conference on Blockchain (Blockchain 2021)
@inproceedings{Linoy21,
author = {S.Linoy, S.Ray, N. Stakhanova},
title={EtherProv: Provenance-Aware Detection, Analysis, and Mitigation of Ethereum Smart Contract Security Issues},
year = {2021},
}
                  
Automated Security Assessment Framework for Wearable BLE-enabled Health Monitoring Devices G.Zendehdel, R. Kaur, I. Chopra, N. Stakhanova, E. Scheme. ACM Transactions on Internet Technology, 2022
@article{Zendehdel22,
author = {Zendehdel, Ghazale Amel and Kaur, Ratinder and Chopra, Inderpreet and Stakhanova, Natalia and Scheme, Erik},
title = {Automated Security Assessment Framework for Wearable BLE-Enabled Health Monitoring Devices},
year = {2021},
issue_date = {February 2022},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {22},
number = {1},
journal = {ACM Trans. Internet Technol.},
month = {sep},
articleno = {14},
numpages = {31}
}
              
Origin Attribution of RSA Public Keys E. Branca, F. Abazari, R. Rivera Carranza, N. Stakhanova. EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2021)
@InProceedings{Branca21,
                                    author="Branca, Enrico
                                    and Abazari, Farzaneh
                                    and Carranza, Ronald Rivera
                                    and Stakhanova, Natalia",
                                    editor="Garcia-Alfaro, Joaquin
                                    and Li, Shujun
                                    and Poovendran, Radha
                                    and Debar, Herv{\'e}
                                    and Yung, Moti",
                                    title="Origin Attribution of RSA Public Keys",
                                    booktitle="Security and Privacy in Communication Networks",
                                    year="2021",
                                    publisher="Springer International Publishing",
                                    address="Cham",
                                    pages="374--396"
                                  }

                                

2020

De-anonymizing Ethereum Blockchain Smart Contracts through Code Attribution S. Linoy, N. Stakhanova, S. Ray International Journal of Network Management, 2020
@article{Linoy20,
author = {Linoy, Shlomi and Stakhanova, Natalia and Ray, Suprio},
title = {De‐Anonymizing Ethereum Blockchain Smart Contracts through Code Attribution},
year = {2021},
issue_date = {January/February 2021},
publisher = {John Wiley & Sons, Inc.},
address = {USA},
volume = {31},
number = {1},
issn = {1099-1190},
journal = {Int. J. Netw. Manag.},
month = {jan},
numpages = {24}
}
                
Code authorship attribution: Methods and challenges V. Kalgutkar, R. Kaur, H. Gonzalez, and N. Stakhanova, A.Matyukhina ACM Computing Surveys, 2020
@article{Kalgutkar20,
                        author = {Kalgutkar, Vaibhavi and Kaur, Ratinder and Gonzalez, Hugo and Stakhanova, Natalia and Matyukhina, Alina},
                        title = {Code Authorship Attribution: Methods and Challenges},
                        year = {2020},
                        issue_date = {January 2020},
                        publisher = {Association for Computing Machinery},
                        address = {New York, NY, USA},
                        volume = {52},
                        number = {1},
                        issn = {0360-0300},
                        journal = {ACM Comput. Surv.},
                        month = {feb},
                        articleno = {3},
                        numpages = {36}

                        }
                
Towards Eidetic Blockchain Systems with Enhanced Provenance S. Linoy, S. Ray, N. Stakhanova Blockchain and Data Management (BlockDM'2020)
@INPROCEEDINGS{Linoy20,
                    author={Linoy, Shlomi and Ray, Suprio and Stakhanova, Natalia},
                    booktitle={2020 IEEE 36th International Conference on Data Engineering Workshops (ICDEW)},
                    title={Towards Eidetic Blockchain Systems with Enhanced Provenance},
                    year={2020},
                    volume={},
                    number={},
                    pages={7-10}
                  }
                  

2019

Adversarial author attribution in open-source projects A. Matyukhina, N. Stakhanova, M. Dalla Preda and C. Perley. ACM Conference on Data and Application Security and Privacy (CODASPY'19)

Datasets:
GitHub data
GoogleCodeJam data
@inbook{Matyukhina19,
                      author = {Matyukhina, Alina and Stakhanova, Natalia and Dalla Preda, Mila and Perley, Celine},
                      title = {Adversarial Authorship Attribution in Open-Source Projects},
                      year = {2019},
                      isbn = {9781450360999},
                      publisher = {Association for Computing Machinery},
                      address = {New York, NY, USA},

                      booktitle = {Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy},
                      pages = {291–302},
                      numpages = {12}
                      }
                  
Exploring Ethereum’s blockchain anonymity using smart contract code attribution S. Linoy, N. Stakhanova, A. Matyukhina. 15th International Conference on Network and Service Management (CNSM 2020)
@INPROCEEDINGS{Linoy19,
author={Linoy, Shlomi and Stakhanova, Natalia and Matyukhina, Alina},
booktitle={2019 15th International Conference on Network and Service Management (CNSM)},
title={Exploring Ethereum’s Blockchain Anonymity Using Smart Contract Code Attribution},
year={2019},
volume={},
number={},
pages={1-9},
}

                                
PoliDOM: Mitigation of DOM-XSS by Detection and Prevention of Unauthorized DOM Tampering J. Iqbal, R. Kaur, and N. Stakhanova. International Conference on Availability, Reliability and Security (ARES '19)
@inproceedings{Iqbal19,
author = {Iqbal, Junaid and Kaur, Ratinder and Stakhanova, Natalia},
title = {PoliDOM: Mitigation of DOM-XSS by Detection and Prevention of Unauthorized DOM Tampering},
year = {2019},
isbn = {9781450371643},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
articleno = {17},
numpages = {10},
location = {Canterbury, CA, United Kingdom},
series = {ARES '19}
  }
                                  
Scalable Privacy-Preserving Query Processing Over Ethereum Blockchain S. Linoy, H. Mahdikhani, S. Ray, R. Lu, N. Stakhanova and A. Ghorbani IEEE Symposium on Recent Advances on Blockchain and Its Applications (held in conjunction with IEEE Blockchain)
@INPROCEEDINGS{Linoy19Blockchain,
author={Linoy, Shlomi and Mahdikhani, Hassan and Ray, Suprio and Lu, Rongxing and Stakhanova, Natalia and Ghorbani, Ali},
booktitle={2019 IEEE International Conference on Blockchain (Blockchain)},
title={Scalable Privacy-Preserving Query Processing over Ethereum Blockchain},
year={2019},
volume={},
number={},
pages={398-404}}

2018

Android authorship attribution through string analysis V. Kalgutkar, N. Stakhanova, P. Cook, and A. Matyukhina. 13th International Conference on Availability, Reliability and Security (ARES 2018)
Best Presentation Award, a runner-up nomination for Best Paper Award

Datasets:
GitHub authors source code
Github authors APKs
Benign authors APKs
@inproceedings{Kalgutkar18,
author = {Kalgutkar, Vaibhavi and Stakhanova, Natalia and Cook, Paul and Matyukhina, Alina},
title = {Android Authorship Attribution through String Analysis},
year = {2018},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security},
articleno = {4},
numpages = {10},
keywords = {Obfuscation, String analysis, Android, Authorship attribution, Mobile malware},
location = {Hamburg, Germany},
series = {ARES 2018}
}
A Security Assessment of HCE-NFC Enabled E-Wallet Banking Android Apps R. Kaur, Y. Li, J. Iqbal, H. Gonzalezand N. Stakhanova. IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC 2018)
@INPROCEEDINGS{Kaur18,
author={Kaur, Ratinder and Li, Yan and Iqbal, Junaid and Gonzalez, Hugo and Stakhanova, Natalia},
booktitle={2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)},
title={A Security Assessment of HCE-NFC Enabled E-Wallet Banking Android Apps},
year={2018},
volume={02},
number={},
pages={492-497},
}

                                                          
Authorship Attribution of Android Apps H. Gonzalez, N. Stakhanova, and A. A. Ghorbani. ACM Conference on Data and Application Security and Privacy (CODASPY 2018)
Dataset:
Benigh authors apps
@inproceedings{Gonzalez18, author = {Gonzalez, Hugo and Stakhanova, Natalia and Ghorbani, Ali A.}, title = {Authorship Attribution of Android Apps}, year = {2018}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, booktitle = {Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy}, pages = {277–286}, numpages = {10}, location = {Tempe, AZ, USA}, series = {CODASPY '18} }
Unmasking Android Obfuscation Tools Using Spatial Analysis R. Kaur, Y.Ning, H. Gonzalez and N. Stakhanova the Privacy, Security and Trust Conference (PST 2018)
@inproceedings{Kaur18,
author={Kaur, Ratinder and Ning, Ye and Gonzalez, Hugo and Stakhanova, Natalia},
booktitle={2018 16th Annual Conference on Privacy, Security and Trust (PST)},
title={Unmasking Android Obfuscation Tools Using Spatial Analysis},
year={2018},
volume={},
number={},
pages={1-10},
}
Understanding Android Financial Malware Attacks: Taxonomy, Characteristics, and Challenges. A. Abdul Kadir, N. Stakhanova, and A. Ghorbani Journal of Cyber Security and Mobility, 2018

Before 2018

Detecting HTTP-based Application Layer DoS attacks on Web Servers in the presence of sampling. H. Jazi, H. Gonzalez, N. Stakhanova, A.A. Ghorbani Computer Networks, 2017
@article{Jazi17,
title = {Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling},
journal = {Computer Networks},
volume = {121},
pages = {25-36},
year = {2017},
issn = {1389-1286},
author = {Hossein Hadian Jazi and Hugo Gonzalez and Natalia Stakhanova and Ali A. Ghorbani}
}
                  
Measuring code reuse in Android apps. H. Gonzalez, N. Stakhanova, and A. Ghorbani. Privacy, Security and Trust Conference, 2016.
@INPROCEEDINGS{Gonzalez16,
author={Gonzalez, Hugo and Stakhanova, Natalia and Ghorbani, Ali A.},
booktitle={2016 14th Annual Conference on Privacy, Security and Trust (PST)},
title={Measuring code reuse in Android apps},
year={2016},
volume={},
number={},
pages={187-195},
}

                                
Detecting Malicious URLs Using Lexical Analysis. M. Mamun, M. Rathore, A. Lashkari, N. Stakhanova and A. Ghorbani. International Conference on Network and System Security (NSS), 2016.
@InProceedings{Mamun16,
author="Mamun, Mohammad Saiful Islam
and Rathore, Mohammad Ahmad
and Lashkari, Arash Habibi
and Stakhanova, Natalia
and Ghorbani, Ali A.",
editor="Chen, Jiageng
and Piuri, Vincenzo
and Su, Chunhua
and Yung, Moti",
title="Detecting Malicious URLs Using Lexical Analysis",
booktitle="Network and System Security",
year="2016",
publisher="Springer International Publishing",
address="Cham",
pages="467--482"}

                                
Android malware classication through linguistic analysis of string literals. R. Killam, N. Stakhanova, and P. Cook. Workshop on Text Analytics for Cybersecurity and Online Safety (TA-COS), 2016
A Taxonomy of Application-Layer Denial of Service (DoS) Attacks G. Mantas, N. Stakhanova, H. Gonzalez, and A. Ghorbani. International Journal of Information and Computer Security, 2015
Enriching reverse engineering through visual exploration of Android binaries. A. Jain, H. Gonzalez, and N. Stakhanova. Program Protection and Reverse Engineering Workshop (PPREW-5), 2015
Software: GitHub
        
A performance evaluation of hash functions for IP reputation lookup using Bloom filters. M. A. Gosselin-Lavigne, H. Gonzalez, N. Stakhanova, and A. A. Ghorbani. Conference on Availability, Reliability and Security (ARES), Workshop on Software Assurance, 2015
Android botnets: What urls are telling us. A. Abdul Kadir, N. Stakhanova, and A. Ghorbani. Conference on Network and System Security (NSS'15)
An entropy-based encrypted traffic classification using machine learning. M. S. I. Mamun, A. Ghorbani, and N. Stakhanova. Conference on Information and Communication Security (ICICS 2015)
Exploring reverse engineering symptoms in Android apps. H. Gonzalez, A. A. Kadir, N. Stakhanova, A. J. Alzahrani, and A. A. Ghorbani. European Workshop on System Security (EuroSec '15)
Characterizing Evaluation Practices of Intrusion Detection Methods for Smartphones A. J. Alzahrani, N. Stakhanova, H. Gonzalez, and A. Ghorbani Journal of Cyber Security and Mobility, 2014
Detecting machine-morphed malware variants via engine attribution. R. Chouchane, N. Stakhanova, A.Walenstein, and A. Lakhotia. Journal of Computer Virology, 2013
@article{ChouchaneSWL13,
author    = {Radhouane Chouchane and
Natalia Stakhanova and
Andrew Walenstein and
Arun Lakhotia},
title     = {Detecting machine-morphed malware variants via engine attribution},
journal   = {J. Comput. Virol. Hacking Tech.},
volume    = {9},
number    = {3},
pages     = {137--157},
year      = {2013}
}
                  
Towards cost-sensitive assessment of intrusion response selection. N. Stakhanova, C. Strasburg, S. Basu, and J. S. Wong Journal of Computer Security
Toward Credible Evaluation of Anomaly- Based Intrusion-Detection Methods M. Tavallaee, N. Stakhanova, and A. Ghorbani IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 2010
@ARTICLE{Tavallaee10,
author={Tavallaee, Mahbod and Stakhanova, Natalia and Ghorbani, Ali Akbar},
journal={IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)},
title={Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods},
year={2010},
volume={40},
number={5},
pages={516-524}
}

                  
On the symbiosis of specication-based and anomaly-based detection N. Stakhanova, S. Basu, and J. Wong Computers & Security, 2010
A taxonomy of intrusion response systems N. Stakhanova, S. Basu, and J. Wong International Journal of Information and Computer Security,2007
@article{Stakhanova07,
author = {Stakhanova, Natalia and Basu, Samik and Wong, Johnny},
title = {A Taxonomy of Intrusion Response Systems},
year = {2007},
issue_date = {January 2007},
publisher = {Inderscience Publishers},
address = {Geneva 15, CHE},
volume = {1},
number = {1/2},
issn = {1744-1765},
journal = {Int. J. Inf. Comput. Secur.},
month = {jan},
pages = {169–184},
numpages = {16},

}
Software fault tree and coloured petri net based specication, design and implementation of agent-based intrusion detection systems G. Helmer, J. Wong, M. Slagell, V. Honavar, L. Miller, Y. Wang, X. Wang, and N. Stakhanova Int. Journal Information and Computer Security

  • J. Cazalas, J. McDonald, T. Andel, and N. Stakhanova. Probing the limits of virtualized software protection. In 4th Program Protection and Reverse Engineering Workshop (PPREW-4) , 2014
  • H. Gonzalez, N. Stakhanova, and A. Ghorbani. Droidkin: Lightweight detection of Android apps similarity. In Proceedings of International Conference on Security and Privacy in Communication Networks (SecureComm 2014) , 2014
  • E. BiglarBeigi, H. Hadian Jazi, N. Stakhanova, and A. Ghorbani. Towards effective feature selection in machine learning-based botnet detection approaches. In IEEE Conference on Communications and Network Security (CNS) , 2014
  • N. Stakhanova, M. Couture, and A. A. Ghorbani. Exploring network-based malware classification. In Malicious and Unwanted Software (MALWARE), 2011 6th International Conference on , pages 14-20. IEEE, 2011
  • N. Stakhanova and A. A. Ghorbani. Managing intrusion detection rule sets. In Proceedings of the Third European Workshop on System Security (EUROSEC) , pages 29-35, New York, NY, USA, 2010. ACM
  • N. Stakhanova, H. Ren, and A. A. Ghorbani. Selective regular expression matching. In M. Burmester, G. Tsudik, S. Magliveras, and I. Ilia, editors, Information Security conference (ISC) , volume 6531 of Lecture Notes in Computer Science , pages 226-240. Springer Berlin Heidelberg, 2011
  • H. Ren, N. Stakhanova, and A. A. Ghorbani. An online adaptive approach to alert correlation. In C. Kreibich and M. Jahnke, editors, Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) , volume 6201 of Lecture Notes in Computer Science , pages 153-172. Springer Berlin Heidelberg, 2010
  • C. Strasburg, N. Stakhanova, S. Basu, and J. S. Wong. A framework for cost sensitive assessment of intrusion response selection. In Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 01 , COMPSAC'09, pages 355-360, Washington, DC, USA, 2009. IEEE Computer Society
  • C. Strasburg, N. Stakhanova, S. Basu, and J. S. Wong. Intrusion response cost assessment methodology. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security , ASIACCS '09, pages 388-391, New York, NY, USA, 2009. ACM
  • N. Stakhanova, Y. Li, and A. A. Ghorbani. Classification and discovery of rule misconfigurations in intrusion detection and response devices. In Proceedings of the 2009 World Congress on Privacy, Security, Trust and the Management of e-Business , CONGRESS '09, pages 29-37, Washington, DC, USA, 2009. IEEE Computer Society
  • N. Stakhanova, C. Strasburg, S. Basu, and J. Wong. On evaluation of response cost for intrusion response systems. In R. Lippmann, E. Kirda, and A. Trachtenberg, editors, Recent Advances in Intrusion Detection (RAID) , volume 5230 of Lecture Notes in Computer Science , pages 390-391. Springer Berlin Heidelberg, 2008
  • N. Stakhanova, S. Basu, W. Z. amd Xia Wang, and J. Wong. Specification synthesis for monitoring and analysis of Manet protocols. In Proceedings of the IEEE International Symposium on Frontiers in Networking with Applications (FINA) , pages 183-187, 2007
  • N. Stakhanova, S. Basu, and J. Wong. A cost-sensitive model for preemptive intrusion response systems. In Proceedings of the IEEE International Conference on Advanced Information Networking and Applications (AINA), pages 428-435, 2007Nokia Best Student Paper
  • N. Stakhanova, S. Basu, R. Lutz, and J. Wong. Automated caching of behavioral patterns for efficient run-time monitoring. In Proceedings of the IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC), pages 333-340, 2006
  • N. Stakhanova, S. Basu, J. Wong, and O. Stakhanov. Trust framework for p2p networks using peer-prole based anomaly technique. In Proceedings of the Second International Workshop on Security in Distributed Computing Systems (SDCS) (ICDCSW'05) - Volume 02 , ICDCSW '05, pages 203-209, Washington, DC, USA, 2005. IEEE Computer Society
  • N. Stakhanova, S. Ferrero, J. S. Wong, and Y. Cai. A reputation-based trust management in peer-to-peer network systems. In D. A. Bader and A. A. Khokhar, editors, ISCA PDCS , pages 510-515. ISCA, 2004