University of Saskatchewan
@inproceedings{Ivanova24, author = {Ivanova, Ekaterina and Stakhanova, Natalia and Sistany, Bahman}, title = {{Adversarial analysis of software composition analysis tools}}, year = {2024}, publisher = {ACM/IEEE}, address = {New York, NY, USA}, booktitle = {Proceedings of The 27th Information Security Conference (ISC 2024) }, pages = {}, numpages = {}, location = {}, }
@inproceedings{Ambati24, author = {Ambati, Sri Haritha and Ridley,Norah and Branca, Enrico and Stakhanova, Natalia}, title = {{Navigating (in)security of AI-generated code}}, year = {2024}, publisher = {IEEE}, address = {New York, NY, USA}, booktitle = {Proceedings of IEEE International Conference on Cyber Security and Resilience (IEEE CSR)}, pages = {}, numpages = {}, location = {}, }
@inproceedings{Oishwee24, author = { Jannat Oishwee,Sahrima and Codabux,Zadia and Stakhanova,Natalia}, title = {{Decoding Android Permissions: A Study of Developer Challenges and Solutions on Stack Overflow}}, year = {2024}, publisher = {ACM/IEEE}, address = {New York, NY, USA}, booktitle = {Proceedings of The ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)}, pages = {}, numpages = {}, location = {}, }
@article{Barzolevskaia24, author = {Barzolevskaia, Anna and Branca, Enrico and Stakhanova, Natalia}, title = {Measuring and Characterizing (mis)compliance of the Android permission system}, year = {2024}, journal = {IEEE Transactions on Software Engineering}, volume = {}, number = {01}, issn = {1939-3520}, pages = {1-23}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, month = {feb} }
@inproceedings{Jannat24, author = {Oishwee, Sahrima Jannat and Codabux, Zadia and Stakhanova, Natalia}, title = {{Large Language Model vs. Stack Overflow in Addressing Android Permission Related Challenges}}, year = {2024}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, booktitle = {Proceedings of the International conference on Mining Software Repositories (MSR 2024)}, pages = {}, numpages = {}, location = {}, }
@article{pan23EtherShield, author = {Pan, Bofeng and Stakhanova, Natalia and Zhu, Zhongwen}, title = {EtherShield: Time-interval Analysis for Detection of Malicious Behavior on Ethereum}, year = {2024}, issue_date = {February 2024}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, volume = {24}, number = {1}, issn = {1533-5399}, url = {https://doi.org/10.1145/3633514}, doi = {10.1145/3633514}, journal = {ACM Trans. Internet Technol.}, month = {jan}, articleno = {2}, numpages = {30}, keywords = {Blockchain, security} }
@inproceedings{Ridley23, author = { Ridley,Norah and Branca, Enrico and Kimber,Jadyn and Stakhanova, Natalia}, title = {{Enhancing Code Security Through Open-source Large Language Models: A Comparative Study}}, year = {2023}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, booktitle = {Proceedings of the 16th International Symposium on Foundations \& Practice of Security (FPS2023)}, pages = {}, numpages = {}, location = {}, }
@inproceedings{Nezhadian23, author = { Nezhadian, Fateme and Branca, Enrico and Stakhanova, Natalia}, title = {Certificate reuse in {Android }applications}, year = {2023}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, booktitle = {Proceedings of the Information Security Conference (ISC2023) }, pages = {}, numpages = {}, location = {}, }
@InProceedings{Kar23overlay, author="Kar, Animesh and Branca, Enrico and Stakhanova, Natalia", title="{Detecting Overlay Attacks in Android}", booktitle="Proceedings of the 14th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN)", year="2023", publisher="Elsevier", address="", pages="", }
@InProceedings{Kar23, author="Kar, Animesh and Stakhanova, Natalia", editor="Deng, Jing and Kolesnikov, Vladimir and Schwarzmann, Alexander A.", title="{Exploiting Android Browser}", booktitle="Proceedings of the Conference on Cryptology and Network Security", year="2023", publisher="Springer Nature Singapore", address="Singapore", pages="162--185", }
@INPROCEEDINGS{Ambati23, author={ Ambati, Sriharita and Branca, Enrico and Stakhanova, Natalia}, booktitle={18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2022)}, title={{Learning AI coding style for software plagiarism detection.}}, year={2023}, volume={}, number={}, pages={}, }
@article{Linoy23, author = {Linoy, Shlomi and Ray, Suprio and Stakhanova, Natalia and Scheme, Erik}, title = {{Authenticated Range Querying of Historical Blockchain Healthcare Data using Authenticated Multi-Version Index}}, year = {2023}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, note = {Just Accepted}, journal = {ACM Distrib. Ledger Technol.}, month = {oct}, }
@article{pan23Provenance, author = {Pan, Bofeng and Stakhanova, Natalia and Ray, Suprio}, title = {Data Provenance in Security and Privacy}, year = {2023}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, issn = {0360-0300}, url = {https://doi.org/10.1145/3593294}, doi = {10.1145/3593294}, note = {Just Accepted}, journal = {ACM Comput. Surv.}, month = {apr}, keywords = {Threat provenance, Data provenance, Security, Privacy, Secure provenance} }
@InProceedings{10.1007/978-3-031-25538-0_10, author="Abazari, Farzaneh and Branca, Enrico and Novikova, Evgeniya and Stakhanova, Natalia", editor="Li, Fengjun and Liang, Kaitai and Lin, Zhiqiang and Katsikas, Sokratis K.", title="Language and Platform Independent Attribution of Heterogeneous Code", booktitle="Security and Privacy in Communication Networks", year="2023", publisher="Springer Nature Switzerland", address="Cham", pages="173--191", isbn="978-3-031-25538-0" }
@inproceedings{Sahrima22, author = {Oishwee, Sahrima Jannat and Codabux, Zadia and Stakhanova, Natalia}, title = {An Exploratory Study on the Relationship of Smells and Design Issues with Software Vulnerabilities}, year = {2022}, isbn = {9781450394574}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3549035.3561182}, doi = {10.1145/3549035.3561182}, booktitle = {Proceedings of the 1st International Workshop on Mining Software Repositories Applications for Privacy and Security}, pages = {16–20}, numpages = {5}, keywords = {Software Vulnerabilities, Mining Software Repositories, Code Smells, Design Issues, Software Security}, location = {Singapore, Singapore}, series = {MSR4P&S 2022} }
@INPROCEEDINGS{Linoy22, author={Linoy, Shlomi and Ray, Suprio and Stakhanova, Natalia}, booktitle={2022 IEEE International Conference on Blockchain (Blockchain)}, title={Authenticated Multi-Version Index for Blockchain-based Range Queries on Historical Data}, year={2022}, volume={}, number={}, pages={177-186}, doi={10.1109/Blockchain55522.2022.00032} }
@inproceedings{KarNBS22, author = {Animesh Kar and Andrei Natadze and Enrico Branca and Natalia Stakhanova}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {HTTPFuzz: Web Server Fingerprinting with {HTTP} Request Fuzzing}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {261--271}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011328900003283}, doi = {10.5220/0011328900003283}, }
@inproceedings{Nezhadian22, author = {Nezhadian, Zahra and Branca, Enrico and Stakhanova, Natalia}, title = {Analysis and Prediction of Web Proxies Misbehavior}, year = {2022}, isbn = {9781450396707}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3538969.3544412}, doi = {10.1145/3538969.3544412}, booktitle = {Proceedings of the 17th International Conference on Availability, Reliability and Security}, articleno = {61}, numpages = {11}, location = {Vienna, Austria}, series = {ARES '22} }
@article{Foroughipour22, author = {A.Foroughipour N. Stakhanova, F. Abazari and B. Sistany}, title = {AndroClonium: bytecode level clone detection for obfuscated Android apps}, year = {2022}, issue_date = {June 2022}, publisher="Springer International Publishing", address="Cham", volume = {}, number = {}, booktitle= {37th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC}, month = {}, articleno = {}, numpages = {}}
@inproceedings{Abazari22, author = {Farzaneh Abazari, Enrico Branca, Norah Ridley, Natalia Stakhanova, Mila Dalla Preda}, title = {Dataset characteristics for reliable code authorship attribution}, year = {2022}, issue_date = {February 2022}, publisher = {IEEE}, address = {New York, NY, USA}, volume = {}, number = {}, journal = {IEEE Transactions on Dependable and Secure Computing}, month = {}, articleno = {}, numpages = {}}
@inproceedings{Linoy21, author = {S.Linoy, S.Ray, N. Stakhanova}, title={EtherProv: Provenance-Aware Detection, Analysis, and Mitigation of Ethereum Smart Contract Security Issues}, year = {2021}, }
@article{Zendehdel22, author = {Zendehdel, Ghazale Amel and Kaur, Ratinder and Chopra, Inderpreet and Stakhanova, Natalia and Scheme, Erik}, title = {Automated Security Assessment Framework for Wearable BLE-Enabled Health Monitoring Devices}, year = {2021}, issue_date = {February 2022}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, volume = {22}, number = {1}, journal = {ACM Trans. Internet Technol.}, month = {sep}, articleno = {14}, numpages = {31} }
@InProceedings{Branca21, author="Branca, Enrico and Abazari, Farzaneh and Carranza, Ronald Rivera and Stakhanova, Natalia", editor="Garcia-Alfaro, Joaquin and Li, Shujun and Poovendran, Radha and Debar, Herv{\'e} and Yung, Moti", title="Origin Attribution of RSA Public Keys", booktitle="Security and Privacy in Communication Networks", year="2021", publisher="Springer International Publishing", address="Cham", pages="374--396" }
@article{Linoy20, author = {Linoy, Shlomi and Stakhanova, Natalia and Ray, Suprio}, title = {De‐Anonymizing Ethereum Blockchain Smart Contracts through Code Attribution}, year = {2021}, issue_date = {January/February 2021}, publisher = {John Wiley & Sons, Inc.}, address = {USA}, volume = {31}, number = {1}, issn = {1099-1190}, journal = {Int. J. Netw. Manag.}, month = {jan}, numpages = {24} }
@article{Kalgutkar20, author = {Kalgutkar, Vaibhavi and Kaur, Ratinder and Gonzalez, Hugo and Stakhanova, Natalia and Matyukhina, Alina}, title = {Code Authorship Attribution: Methods and Challenges}, year = {2020}, issue_date = {January 2020}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, volume = {52}, number = {1}, issn = {0360-0300}, journal = {ACM Comput. Surv.}, month = {feb}, articleno = {3}, numpages = {36} }
@INPROCEEDINGS{Linoy20, author={Linoy, Shlomi and Ray, Suprio and Stakhanova, Natalia}, booktitle={2020 IEEE 36th International Conference on Data Engineering Workshops (ICDEW)}, title={Towards Eidetic Blockchain Systems with Enhanced Provenance}, year={2020}, volume={}, number={}, pages={7-10} }
@inbook{Matyukhina19, author = {Matyukhina, Alina and Stakhanova, Natalia and Dalla Preda, Mila and Perley, Celine}, title = {Adversarial Authorship Attribution in Open-Source Projects}, year = {2019}, isbn = {9781450360999}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, booktitle = {Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy}, pages = {291–302}, numpages = {12} }
@INPROCEEDINGS{Linoy19, author={Linoy, Shlomi and Stakhanova, Natalia and Matyukhina, Alina}, booktitle={2019 15th International Conference on Network and Service Management (CNSM)}, title={Exploring Ethereum’s Blockchain Anonymity Using Smart Contract Code Attribution}, year={2019}, volume={}, number={}, pages={1-9}, }
@inproceedings{Iqbal19, author = {Iqbal, Junaid and Kaur, Ratinder and Stakhanova, Natalia}, title = {PoliDOM: Mitigation of DOM-XSS by Detection and Prevention of Unauthorized DOM Tampering}, year = {2019}, isbn = {9781450371643}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, articleno = {17}, numpages = {10}, location = {Canterbury, CA, United Kingdom}, series = {ARES '19} }
@INPROCEEDINGS{Linoy19Blockchain, author={Linoy, Shlomi and Mahdikhani, Hassan and Ray, Suprio and Lu, Rongxing and Stakhanova, Natalia and Ghorbani, Ali}, booktitle={2019 IEEE International Conference on Blockchain (Blockchain)}, title={Scalable Privacy-Preserving Query Processing over Ethereum Blockchain}, year={2019}, volume={}, number={}, pages={398-404}}
@inproceedings{Kalgutkar18, author = {Kalgutkar, Vaibhavi and Stakhanova, Natalia and Cook, Paul and Matyukhina, Alina}, title = {Android Authorship Attribution through String Analysis}, year = {2018}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security}, articleno = {4}, numpages = {10}, keywords = {Obfuscation, String analysis, Android, Authorship attribution, Mobile malware}, location = {Hamburg, Germany}, series = {ARES 2018} }
@INPROCEEDINGS{Kaur18, author={Kaur, Ratinder and Li, Yan and Iqbal, Junaid and Gonzalez, Hugo and Stakhanova, Natalia}, booktitle={2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)}, title={A Security Assessment of HCE-NFC Enabled E-Wallet Banking Android Apps}, year={2018}, volume={02}, number={}, pages={492-497}, }
Dataset:
Benigh authors apps
@inproceedings{Gonzalez18, author = {Gonzalez, Hugo and Stakhanova, Natalia and Ghorbani, Ali A.}, title = {Authorship Attribution of Android Apps}, year = {2018}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, booktitle = {Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy}, pages = {277–286}, numpages = {10}, location = {Tempe, AZ, USA}, series = {CODASPY '18} }
@inproceedings{Kaur18, author={Kaur, Ratinder and Ning, Ye and Gonzalez, Hugo and Stakhanova, Natalia}, booktitle={2018 16th Annual Conference on Privacy, Security and Trust (PST)}, title={Unmasking Android Obfuscation Tools Using Spatial Analysis}, year={2018}, volume={}, number={}, pages={1-10}, }
@article{Jazi17, title = {Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling}, journal = {Computer Networks}, volume = {121}, pages = {25-36}, year = {2017}, issn = {1389-1286}, author = {Hossein Hadian Jazi and Hugo Gonzalez and Natalia Stakhanova and Ali A. Ghorbani} }
@INPROCEEDINGS{Gonzalez16, author={Gonzalez, Hugo and Stakhanova, Natalia and Ghorbani, Ali A.}, booktitle={2016 14th Annual Conference on Privacy, Security and Trust (PST)}, title={Measuring code reuse in Android apps}, year={2016}, volume={}, number={}, pages={187-195}, }
@InProceedings{Mamun16, author="Mamun, Mohammad Saiful Islam and Rathore, Mohammad Ahmad and Lashkari, Arash Habibi and Stakhanova, Natalia and Ghorbani, Ali A.", editor="Chen, Jiageng and Piuri, Vincenzo and Su, Chunhua and Yung, Moti", title="Detecting Malicious URLs Using Lexical Analysis", booktitle="Network and System Security", year="2016", publisher="Springer International Publishing", address="Cham", pages="467--482"}
@article{ChouchaneSWL13, author = {Radhouane Chouchane and Natalia Stakhanova and Andrew Walenstein and Arun Lakhotia}, title = {Detecting machine-morphed malware variants via engine attribution}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {9}, number = {3}, pages = {137--157}, year = {2013} }
@ARTICLE{Tavallaee10, author={Tavallaee, Mahbod and Stakhanova, Natalia and Ghorbani, Ali Akbar}, journal={IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)}, title={Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods}, year={2010}, volume={40}, number={5}, pages={516-524} }