University of Saskatchewan
@inproceedings{Ridley25,
author = {Kimber, Jadyn and Branca, Enrico and Natadze, Andrei and Stakhanova, Natalia},
title = {{An End to End Analysis of Crypto Scams on Ethereum}},
year = {2025},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
booktitle = {ACM Transactions on Internet Technology},
pages = {},
numpages = {},
location = {},
}
@inproceedings{Ridley25,
author = {Ridley,Norah and Branca, Enrico and Stakhanova, Natalia},
title = {{More Than You Signed Up For: Exposing Gaps in the Validation of Android's App Signing}},
year = {2025},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
booktitle = {Proceedings of the 22nd Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '25)},
pages = {},
numpages = {},
location = {},
}
@inproceedings{Silva24,
author = {Silva, George and Ridley,Norah and Branca, Enrico and Stakhanova, Natalia},
title = {{A Systematic Evaluation of Non-SDK Interface Restrictions in Android: Bridging the Gap Between Guidelines and Practice}},
year = {2024},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
booktitle = {Proceedings of the 17th International Symposium on Foundations \& Practice of Security (FPS2024)},
pages = {},
numpages = {},
location = {},
}
@inproceedings{Ivanova24,
author = {Ivanova, Ekaterina and Stakhanova, Natalia and Sistany, Bahman},
title = {{Adversarial analysis of software composition analysis tools}},
year = {2024},
publisher = {ACM/IEEE},
address = {New York, NY, USA},
booktitle = {Proceedings of The 27th Information Security Conference (ISC 2024) },
pages = {},
numpages = {},
location = {},
}
@ARTICLE{Nezhadian24,
author={Nezhadian, Fatemeh and Branca, Enrico and Barzolevskaia, Anna and Natadze, Andrei and Stakhanova, Natalia},
journal={ IEEE/ACM Transactions on Networking },
title={{ Measuring and Characterizing Propagation of Reuse RSA Certificates and Keys Across PKI Ecosystem }},
year={2024},
volume={},
number={01},
ISSN={1558-2566},
pages={1-17},
publisher={IEEE Computer Society},
address={Los Alamitos, CA, USA},
month=nov}
@inproceedings{Ambati24,
author = {Ambati, Sri Haritha and Ridley,Norah and Branca, Enrico and Stakhanova, Natalia},
title = {{Navigating (in)security of AI-generated code}},
year = {2024},
publisher = {IEEE},
address = {New York, NY, USA},
booktitle = {Proceedings of IEEE International Conference on Cyber Security and Resilience (IEEE CSR)},
pages = {},
numpages = {},
location = {},
}
@inproceedings{Oishwee24,
author = { Jannat Oishwee,Sahrima and Codabux,Zadia and Stakhanova,Natalia},
title = {{Decoding Android Permissions: A Study of Developer Challenges and Solutions on Stack Overflow}},
year = {2024},
publisher = {ACM/IEEE},
address = {New York, NY, USA},
booktitle = {Proceedings of The ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)},
pages = {},
numpages = {},
location = {},
}
@article{Barzolevskaia24,
author = {Barzolevskaia, Anna and Branca, Enrico and Stakhanova, Natalia},
title = {Measuring and Characterizing (mis)compliance of the Android permission system},
year = {2024},
journal = {IEEE Transactions on Software Engineering},
volume = {},
number = {01},
issn = {1939-3520},
pages = {1-23},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
month = {feb}
}
@inproceedings{Jannat24,
author = {Oishwee, Sahrima Jannat and Codabux, Zadia and Stakhanova, Natalia},
title = {{Large Language Model vs. Stack Overflow in Addressing Android Permission Related Challenges}},
year = {2024},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
booktitle = {Proceedings of the International conference on Mining Software Repositories (MSR 2024)},
pages = {},
numpages = {},
location = {},
}
@article{pan23EtherShield,
author = {Pan, Bofeng and Stakhanova, Natalia and Zhu, Zhongwen},
title = {EtherShield: Time-interval Analysis for Detection of Malicious Behavior on Ethereum},
year = {2024},
issue_date = {February 2024},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {24},
number = {1},
issn = {1533-5399},
url = {https://doi.org/10.1145/3633514},
doi = {10.1145/3633514},
journal = {ACM Trans. Internet Technol.},
month = {jan},
articleno = {2},
numpages = {30},
keywords = {Blockchain, security}
}
@inproceedings{Ridley23,
author = { Ridley,Norah and Branca, Enrico and Kimber,Jadyn and Stakhanova, Natalia},
title = {{Enhancing Code Security Through Open-source Large Language Models: A Comparative Study}},
year = {2023},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
booktitle = {Proceedings of the 16th International Symposium on Foundations \& Practice of Security (FPS2023)},
pages = {},
numpages = {},
location = {},
}
@inproceedings{Nezhadian23,
author = { Nezhadian, Fateme and Branca, Enrico and Stakhanova, Natalia},
title = {Certificate reuse in {Android }applications},
year = {2023},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
booktitle = {Proceedings of the Information Security Conference (ISC2023) },
pages = {},
numpages = {},
location = {},
}
@InProceedings{Kar23overlay,
author="Kar, Animesh and Branca, Enrico
and Stakhanova, Natalia",
title="{Detecting Overlay Attacks in Android}",
booktitle="Proceedings of the 14th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN)",
year="2023",
publisher="Elsevier",
address="",
pages="",
}
@InProceedings{Kar23,
author="Kar, Animesh
and Stakhanova, Natalia",
editor="Deng, Jing
and Kolesnikov, Vladimir
and Schwarzmann, Alexander A.",
title="{Exploiting Android Browser}",
booktitle="Proceedings of the Conference on Cryptology and Network Security",
year="2023",
publisher="Springer Nature Singapore",
address="Singapore",
pages="162--185",
}
@INPROCEEDINGS{Ambati23,
author={ Ambati, Sriharita and Branca, Enrico and Stakhanova, Natalia},
booktitle={18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2022)},
title={{Learning AI coding style for software plagiarism detection.}},
year={2023},
volume={},
number={},
pages={},
}
@article{Linoy23,
author = {Linoy, Shlomi and Ray, Suprio and Stakhanova, Natalia and Scheme, Erik},
title = {{Authenticated Range Querying of Historical Blockchain Healthcare Data using Authenticated Multi-Version Index}},
year = {2023},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
note = {Just Accepted},
journal = {ACM Distrib. Ledger Technol.},
month = {oct},
}
@article{pan23Provenance,
author = {Pan, Bofeng and Stakhanova, Natalia and Ray, Suprio},
title = {Data Provenance in Security and Privacy},
year = {2023},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
issn = {0360-0300},
url = {https://doi.org/10.1145/3593294},
doi = {10.1145/3593294},
note = {Just Accepted},
journal = {ACM Comput. Surv.},
month = {apr},
keywords = {Threat provenance, Data provenance, Security, Privacy, Secure provenance}
}
@InProceedings{10.1007/978-3-031-25538-0_10,
author="Abazari, Farzaneh
and Branca, Enrico
and Novikova, Evgeniya
and Stakhanova, Natalia",
editor="Li, Fengjun
and Liang, Kaitai
and Lin, Zhiqiang
and Katsikas, Sokratis K.",
title="Language and Platform Independent Attribution of Heterogeneous Code",
booktitle="Security and Privacy in Communication Networks",
year="2023",
publisher="Springer Nature Switzerland",
address="Cham",
pages="173--191",
isbn="978-3-031-25538-0"
}
@inproceedings{Sahrima22,
author = {Oishwee, Sahrima Jannat and Codabux, Zadia and Stakhanova, Natalia},
title = {An Exploratory Study on the Relationship of Smells and Design Issues with Software Vulnerabilities},
year = {2022},
isbn = {9781450394574},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3549035.3561182},
doi = {10.1145/3549035.3561182},
booktitle = {Proceedings of the 1st International Workshop on Mining Software Repositories Applications for Privacy and Security},
pages = {16–20},
numpages = {5},
keywords = {Software Vulnerabilities, Mining Software Repositories, Code Smells, Design Issues, Software Security},
location = {Singapore, Singapore},
series = {MSR4P&S 2022}
}
@INPROCEEDINGS{Linoy22,
author={Linoy, Shlomi and Ray, Suprio and Stakhanova, Natalia},
booktitle={2022 IEEE International Conference on Blockchain (Blockchain)},
title={Authenticated Multi-Version Index for Blockchain-based Range Queries on Historical Data},
year={2022},
volume={},
number={},
pages={177-186},
doi={10.1109/Blockchain55522.2022.00032}
}
@inproceedings{KarNBS22,
author = {Animesh Kar and
Andrei Natadze and
Enrico Branca and
Natalia Stakhanova},
editor = {Sabrina De Capitani di Vimercati and
Pierangela Samarati},
title = {HTTPFuzz: Web Server Fingerprinting with {HTTP} Request Fuzzing},
booktitle = {Proceedings of the 19th International Conference on Security and Cryptography,
{SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
pages = {261--271},
publisher = {{SCITEPRESS}},
year = {2022},
url = {https://doi.org/10.5220/0011328900003283},
doi = {10.5220/0011328900003283},
}
@inproceedings{Nezhadian22,
author = {Nezhadian, Zahra and Branca, Enrico and Stakhanova, Natalia},
title = {Analysis and Prediction of Web Proxies Misbehavior},
year = {2022},
isbn = {9781450396707},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3538969.3544412},
doi = {10.1145/3538969.3544412},
booktitle = {Proceedings of the 17th International Conference on Availability, Reliability and Security},
articleno = {61},
numpages = {11},
location = {Vienna, Austria},
series = {ARES '22}
}
@article{Foroughipour22,
author = {A.Foroughipour N. Stakhanova, F. Abazari and B. Sistany},
title = {AndroClonium: bytecode level clone detection for obfuscated Android apps},
year = {2022},
issue_date = {June 2022},
publisher="Springer International Publishing",
address="Cham",
volume = {},
number = {},
booktitle= {37th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC},
month = {},
articleno = {},
numpages = {}}
@inproceedings{Abazari22,
author = {Farzaneh Abazari, Enrico Branca, Norah Ridley, Natalia Stakhanova, Mila Dalla Preda},
title = {Dataset characteristics for reliable code authorship attribution},
year = {2022},
issue_date = {February 2022},
publisher = {IEEE},
address = {New York, NY, USA},
volume = {},
number = {},
journal = {IEEE Transactions on Dependable and Secure Computing},
month = {},
articleno = {},
numpages = {}}
@inproceedings{Linoy21,
author = {S.Linoy, S.Ray, N. Stakhanova},
title={EtherProv: Provenance-Aware Detection, Analysis, and Mitigation of Ethereum Smart Contract Security Issues},
year = {2021},
}
@article{Zendehdel22,
author = {Zendehdel, Ghazale Amel and Kaur, Ratinder and Chopra, Inderpreet and Stakhanova, Natalia and Scheme, Erik},
title = {Automated Security Assessment Framework for Wearable BLE-Enabled Health Monitoring Devices},
year = {2021},
issue_date = {February 2022},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {22},
number = {1},
journal = {ACM Trans. Internet Technol.},
month = {sep},
articleno = {14},
numpages = {31}
}
@InProceedings{Branca21,
author="Branca, Enrico
and Abazari, Farzaneh
and Carranza, Ronald Rivera
and Stakhanova, Natalia",
editor="Garcia-Alfaro, Joaquin
and Li, Shujun
and Poovendran, Radha
and Debar, Herv{\'e}
and Yung, Moti",
title="Origin Attribution of RSA Public Keys",
booktitle="Security and Privacy in Communication Networks",
year="2021",
publisher="Springer International Publishing",
address="Cham",
pages="374--396"
}
@article{Linoy20,
author = {Linoy, Shlomi and Stakhanova, Natalia and Ray, Suprio},
title = {De‐Anonymizing Ethereum Blockchain Smart Contracts through Code Attribution},
year = {2021},
issue_date = {January/February 2021},
publisher = {John Wiley & Sons, Inc.},
address = {USA},
volume = {31},
number = {1},
issn = {1099-1190},
journal = {Int. J. Netw. Manag.},
month = {jan},
numpages = {24}
}
@article{Kalgutkar20,
author = {Kalgutkar, Vaibhavi and Kaur, Ratinder and Gonzalez, Hugo and Stakhanova, Natalia and Matyukhina, Alina},
title = {Code Authorship Attribution: Methods and Challenges},
year = {2020},
issue_date = {January 2020},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {52},
number = {1},
issn = {0360-0300},
journal = {ACM Comput. Surv.},
month = {feb},
articleno = {3},
numpages = {36}
}
@INPROCEEDINGS{Linoy20,
author={Linoy, Shlomi and Ray, Suprio and Stakhanova, Natalia},
booktitle={2020 IEEE 36th International Conference on Data Engineering Workshops (ICDEW)},
title={Towards Eidetic Blockchain Systems with Enhanced Provenance},
year={2020},
volume={},
number={},
pages={7-10}
}
@inbook{Matyukhina19,
author = {Matyukhina, Alina and Stakhanova, Natalia and Dalla Preda, Mila and Perley, Celine},
title = {Adversarial Authorship Attribution in Open-Source Projects},
year = {2019},
isbn = {9781450360999},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
booktitle = {Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy},
pages = {291–302},
numpages = {12}
}
@INPROCEEDINGS{Linoy19,
author={Linoy, Shlomi and Stakhanova, Natalia and Matyukhina, Alina},
booktitle={2019 15th International Conference on Network and Service Management (CNSM)},
title={Exploring Ethereum’s Blockchain Anonymity Using Smart Contract Code Attribution},
year={2019},
volume={},
number={},
pages={1-9},
}
@inproceedings{Iqbal19,
author = {Iqbal, Junaid and Kaur, Ratinder and Stakhanova, Natalia},
title = {PoliDOM: Mitigation of DOM-XSS by Detection and Prevention of Unauthorized DOM Tampering},
year = {2019},
isbn = {9781450371643},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
articleno = {17},
numpages = {10},
location = {Canterbury, CA, United Kingdom},
series = {ARES '19}
}
@INPROCEEDINGS{Linoy19Blockchain,
author={Linoy, Shlomi and Mahdikhani, Hassan and Ray, Suprio and Lu, Rongxing and Stakhanova, Natalia and Ghorbani, Ali},
booktitle={2019 IEEE International Conference on Blockchain (Blockchain)},
title={Scalable Privacy-Preserving Query Processing over Ethereum Blockchain},
year={2019},
volume={},
number={},
pages={398-404}}
@inproceedings{Kalgutkar18,
author = {Kalgutkar, Vaibhavi and Stakhanova, Natalia and Cook, Paul and Matyukhina, Alina},
title = {Android Authorship Attribution through String Analysis},
year = {2018},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security},
articleno = {4},
numpages = {10},
keywords = {Obfuscation, String analysis, Android, Authorship attribution, Mobile malware},
location = {Hamburg, Germany},
series = {ARES 2018}
}
@INPROCEEDINGS{Kaur18,
author={Kaur, Ratinder and Li, Yan and Iqbal, Junaid and Gonzalez, Hugo and Stakhanova, Natalia},
booktitle={2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)},
title={A Security Assessment of HCE-NFC Enabled E-Wallet Banking Android Apps},
year={2018},
volume={02},
number={},
pages={492-497},
}
Dataset:
Benigh authors apps
@inproceedings{Gonzalez18, author = {Gonzalez, Hugo and Stakhanova, Natalia and Ghorbani, Ali A.}, title = {Authorship Attribution of Android Apps}, year = {2018}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, booktitle = {Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy}, pages = {277–286}, numpages = {10}, location = {Tempe, AZ, USA}, series = {CODASPY '18} }
@inproceedings{Kaur18,
author={Kaur, Ratinder and Ning, Ye and Gonzalez, Hugo and Stakhanova, Natalia},
booktitle={2018 16th Annual Conference on Privacy, Security and Trust (PST)},
title={Unmasking Android Obfuscation Tools Using Spatial Analysis},
year={2018},
volume={},
number={},
pages={1-10},
}
@article{Jazi17,
title = {Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling},
journal = {Computer Networks},
volume = {121},
pages = {25-36},
year = {2017},
issn = {1389-1286},
author = {Hossein Hadian Jazi and Hugo Gonzalez and Natalia Stakhanova and Ali A. Ghorbani}
}
@INPROCEEDINGS{Gonzalez16,
author={Gonzalez, Hugo and Stakhanova, Natalia and Ghorbani, Ali A.},
booktitle={2016 14th Annual Conference on Privacy, Security and Trust (PST)},
title={Measuring code reuse in Android apps},
year={2016},
volume={},
number={},
pages={187-195},
}
@InProceedings{Mamun16,
author="Mamun, Mohammad Saiful Islam
and Rathore, Mohammad Ahmad
and Lashkari, Arash Habibi
and Stakhanova, Natalia
and Ghorbani, Ali A.",
editor="Chen, Jiageng
and Piuri, Vincenzo
and Su, Chunhua
and Yung, Moti",
title="Detecting Malicious URLs Using Lexical Analysis",
booktitle="Network and System Security",
year="2016",
publisher="Springer International Publishing",
address="Cham",
pages="467--482"}
@article{ChouchaneSWL13,
author = {Radhouane Chouchane and
Natalia Stakhanova and
Andrew Walenstein and
Arun Lakhotia},
title = {Detecting machine-morphed malware variants via engine attribution},
journal = {J. Comput. Virol. Hacking Tech.},
volume = {9},
number = {3},
pages = {137--157},
year = {2013}
}
@ARTICLE{Tavallaee10,
author={Tavallaee, Mahbod and Stakhanova, Natalia and Ghorbani, Ali Akbar},
journal={IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)},
title={Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods},
year={2010},
volume={40},
number={5},
pages={516-524}
}