Select Publications

Conference Papers

Revadigar G; Javali C; Jha S, 2020, 'ProxiCar: Proximity-Based Secure Digital Key Solution for Cars', in 2020 International Conference on COMmunication Systems and NETworkS, COMSNETS 2020, pp. 282 - 289, http://dx.doi.org/10.1109/COMSNETS48256.2020.9027327

Ma S; Feng R; Li J; Liu Y; Nepal S; Ostry D; Bertino E; Deng RH; Ma Z; Jha S, 2019, 'An empirical study of SMS one-time password authentication in android apps', in ACM International Conference Proceeding Series, ACM Press, pp. 339 - 354, presented at the 35th Annual Computer Security Applications Conference, 09 December 2019 - 13 December 2019, http://dx.doi.org/10.1145/3359789.3359828

Maroof U; Shaghaghi A; Jha S, 2019, 'PLAR: Towards a Pluggable Software Architecture for Securing IoT Devices', in IoT S and P 2019 - Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, ACM Press, pp. 50 - 56, presented at the 2nd International ACM Workshop, 15 November 2019 - 15 November 2019, http://dx.doi.org/10.1145/3338507.3358619

Ma S; Bertino E; Nepal S; Li J; Ostry D; Deng RH; Jha S, 2019, 'Finding Flaws from Password Authentication Code in Android Apps', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Luxembourg, pp. 619 - 637, presented at European Symposium on Research in Computer Security, ESORICS 2019, Luxembourg, 23 September 2019, http://dx.doi.org/10.1007/978-3-030-29959-0_30

Shaghaghi A; Kanhere SS; Kaafar MA; Bertino E; Jha S, 2019, 'Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations', in Proceedings - Conference on Local Computer Networks, LCN, pp. 553 - 561, http://dx.doi.org/10.1109/LCN.2018.8638245

Shaghaghi A; Kanhere SS; Kaafar MA; Jha S, 2018, 'Gwardar: Towards protecting a software-defined network from malicious network operating systems', in NCA 2018 - 2018 IEEE 17th International Symposium on Network Computing and Applications, IEEE, Cambridge, MA, USA, presented at The 17th IEEE International Symposium on Network Computing and Applications (NCA 2018), Cambridge, MA, USA, 01 November 2018 - 03 November 2018, http://dx.doi.org/10.1109/NCA.2018.8548074

Xu W; Jha S; Hu W, 2018, 'Exploring the Feasibility of Physical Layer Key Generation for LoRaWAN', in Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, pp. 231 - 236, http://dx.doi.org/10.1109/TrustCom/BigDataSE.2018.00044

Oham C; Jurdak R; Kanhere SS; Dorri A; Jha S, 2018, 'B-FICA: BlockChain based Framework for Auto-Insurance Claim and Adjudication', in Proceedings - IEEE 2018 International Congress on Cybermatics: 2018 IEEE Conferences on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology, iThings/GreenCom/CPSCom/SmartData/Blockchain/CIT 2018, pp. 1171 - 1180, http://dx.doi.org/10.1109/Cybermatics_2018.2018.00210

Tan H; Ostry D; Jha S, 2018, 'Exploiting multiple side channels for secret key agreement in wireless networks', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3154273.3154337

Jahan M; Seneviratne S; Chu B; Seneviratne A; Jha S, 2017, 'Privacy preserving data access scheme for IoT devices', in 2017 IEEE 16th International Symposium on Network Computing and Applications, NCA 2017, pp. 1 - 10, http://dx.doi.org/10.1109/NCA.2017.8171357

Abaid Z; Kaafar MA; Jha S, 2017, 'Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers', in 2017 IEEE 16th International Symposium on Network Computing and Applications, NCA 2017, pp. 1 - 10, http://dx.doi.org/10.1109/NCA.2017.8171381

Kim JY; Holz R; Hu W; Jha S, 2017, 'Automated analysis of secure internet of things protocols', in ACM International Conference Proceeding Series, Orlando, FL, USA, pp. 238 - 249, presented at ACSAC 2017 Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, 04 December 2017 - 08 December 2017, http://dx.doi.org/10.1145/3134600.3134624

Jahan M; Seneviratne S; Chu B; Seneviratne A; Jha S, 2017, 'Privacy Preserving Data Access Scheme for IoT Devices', in Gkoulalasdivanis A; Correia MP; Avresky DR (eds.), 2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), IEEE, Cambridge, MA, pp. 217 - 226, presented at IEEE 16th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, 30 October 2017 - 01 November 2017, http://dx.doi.org/10.1109/NCA.2017.8171357

Tan H; Tsudik G; Jha S, 2017, 'MTRA: Multiple-tier remote attestation in IoT networks', in 2017 IEEE Conference on Communications and Network Security, CNS 2017, Las Vegas, NV, USA, pp. 1 - 9, presented at 2017 IEEE Conference, Las Vegas, NV, USA, 09 October 2017 - 11 October 2017, http://dx.doi.org/10.1109/CNS.2017.8228638

Jahan M; Seneviratne A; Jha S, 2017, 'Access Mechanism for Outsourced Data by Preserving Data Owner's Preference', in Proceedings - Conference on Local Computer Networks, LCN, Singapore, Singapore, pp. 611 - 614, presented at 2017 IEEE 42nd Conference on Local Computer Networks (LCN), Singapore, Singapore, 09 October 2017 - 12 October 2017, http://dx.doi.org/10.1109/LCN.2017.55

Jahan M; Roy PS; Sakurai K; Seneviratne A; Jha S, 2017, 'Secure and light weight fine-grained access mechanism for outsourced data', in Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017, Sydney, NSW, Australia, pp. 201 - 209, presented at 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, NSW, Australia, 01 August 2017 - 04 August 2017, http://dx.doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.238

Kim JY; Hu W; Sarkar D; Jha S, 2017, 'ESIoT: Enabling secure management of the internet of things', in Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, Massachusetts, pp. 219 - 229, presented at 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Boston, Massachusetts, 18 July 2017 - 20 July 2017, http://dx.doi.org/10.1145/3098243.3098252

Abaid Z; Kaafar MA; Jha S, 2017, 'Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study', in 2017 IFIP Networking Conference, IFIP Networking 2017 and Workshops, pp. 1 - 9, http://dx.doi.org/10.23919/IFIPNetworking.2017.8264866

Shaghaghi A; Kaafar MA; Scott-Hayward S; Kanhere SS; Jha S, 2017, 'Towards Policy Enforcement Point as a Service (PEPS)', in 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2016, pp. 50 - 55, http://dx.doi.org/10.1109/NFV-SDN.2016.7919475

Shaghaghi A; Kaafar MA; Jha S, 2017, 'WedgeTail: An intrusion prevention system for the data plane of software defined networks', in ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates, pp. 849 - 861, presented at 2017 ACM on Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates, 02 April 2017 - 06 April 2017, http://dx.doi.org/10.1145/3052973.3053039

Javali C; Revadigar G; Rasmussen KB; Hu W; Jha S, 2016, 'I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol', in Proceedings - Conference on Local Computer Networks, LCN, pp. 477 - 485, http://dx.doi.org/10.1109/LCN.2016.126

Siddiqi M; Sivaraman V; Jha S, 2016, 'Timestamp Integrity in Wearable Healthcare Devices', in 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2016, IEEE, Bangalore, India, presented at 10th IEEE International Conference on Advanced Networks and Telecommunications Systems, Bangalore, India, 06 November 2016 - 09 November 2016, http://dx.doi.org/10.1109/ANTS.2016.7947783

Rezvani M; Ignjatovic A; Pagnucco M; Jha S, 2016, 'Anomaly-free policy composition in software-defined networks', in 2016 IFIP Networking Conference (IFIP Networking) and Workshops, IFIP Networking 2016, vienna, pp. 28 - 36, presented at 2016 IFIP Networking Conference, vienna, 17 May 2016 - 19 May 2016, http://dx.doi.org/10.1109/IFIPNetworking.2016.7497226

Revadigar G; Javali C; Xu W; Hu W; Jha S, 2016, 'Secure key generation and distribution protocol for wearable devices', in 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016, IEEE, Sydney, AUSTRALIA, presented at IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), Sydney, AUSTRALIA, 14 March 2016 - 19 March 2016, http://dx.doi.org/10.1109/PERCOMW.2016.7457058

Abaid Z; Sarkar D; Kaafar MA; Jha S, 2016, 'The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks', in Proceedings - Conference on Local Computer Networks, LCN, pp. 61 - 68, http://dx.doi.org/10.1109/LCN.2016.17

Rezvani M; Ignjatovic ; Bertino E; Jha , 2015, 'A Collaborative Reputation System Based on Credibility Propagation in WSNs', in Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS, Melbourne, VIC, pp. 1 - 8, presented at IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS), Melbourne, VIC, 14 December 2015 - 17 December 2015, http://dx.doi.org/10.1109/ICPADS.2015.9

Revadigar GS; Javali C; Hu W; Jha S, 2015, 'DLINK: Dual Link Based Radio Frequency Fingerprinting for Wearable Devices', in Proceedings of the 40th IEEE Conference on Local Computer Networks (LCN), Florida, USA, October 2015, Florida, USA, pp. 329 - 337, presented at IEEE Conference on Local Computer Networks (LCN), Florida, USA, 26 October 2015 - 29 October 2015, http://dx.doi.org/10.1109/LCN.2015.7366327

Jahan M; Rezvani M; Seneviratne A; Jha S, 2015, 'Method for Providing Secure and Private Fine-grained Access to Outsourced Data', in Proceedings - Conference on Local Computer Networks, LCN, Clearwater Beach, Tampa, Florida, USA, pp. 406 - 409, presented at IEEE Local Computer Networks (LCN)'2015, Clearwater Beach, Tampa, Florida, USA, 26 October 2015 - 29 October 2015, http://dx.doi.org/10.1109/LCN.2015.7366339

Javali C; Revadigar, Girish ; Ding, Ming ; Jha, Sanjay , 2015, 'Secret Key Generation by Virtual Link Estimation', in BodyNets International Conference on Body Area Networks, Sydney, Australia, presented at 10th EAI International Conference on Body Area Networks (BODYNETS), Sydney, Australia, 28 September 2015 - 30 September 2015, http://dx.doi.org/10.4108/eai.28-9-2015.2261448

Revadigar GS; Javali C; Asghar HJ; Rasmussen KB; Jha S, 2015, 'Mobility Independent Secret Key Generation for Wearable Health-care Devices', in Proceedings of 10th EAI International Conference on Body Area Networks (BODYNETS), Sydney, Australia, September 2015., Sydney, Australia, presented at 10th EAI International Conference on Body Area Networks (BODYNETS), Sydney, Australia, 28 September 2015 - 30 September 2015, http://dx.doi.org/10.4108/eai.28-9-2015.2261446

Li K; Ni W; Wang X; Liu RP; Kanhere SS; Jha S, 2015, 'EPLA: Energy-balancing packets scheduling for airborne relaying networks', in IEEE International Conference on Communications, pp. 6246 - 6251, http://dx.doi.org/10.1109/ICC.2015.7249319

Rezvani M; Allah Bakhsh M; Vigentini ; Ignjatovic ; Jha , 2015, 'An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems', in ICT Systems Security and Privacy Protection, Hamburg, Germany, pp. 189 - 203, presented at IFIP SEC 2015, Hamburg, Germany, 26 May 2015 - 28 May 2015, http://dx.doi.org/10.1007/978-3-319-18467-8_13

Rezvani M; Ignjatovic A; Bertino E; Jha S, 2015, 'A Trust Assessment Framework for Streaming Data in WSNs Using Iterative Filtering', in The IEEE 10th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Singapore, presented at The IEEE 10th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Singapore, 07 April 2015 - 09 April 2015, http://dx.doi.org/10.1109/ISSNIP.2015.7106935

Revadigar G; Javali C; Asghar HJ; Rasmussen KB; Jha S, 2015, 'IARC: Secret key generation for resource constrained devices by inducing artificial randomness in the channel', in ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 669, http://dx.doi.org/10.1145/2714576.2714644

Murtaza G; Reinhardt A; Kanhere SS; Jha S, 2015, 'Lightweight clustering of spatio-temporal data in resource constrained mobile sensing', in Proceedings of the WoWMoM 2015: A World of Wireless Mobile and Multimedia Networks, http://dx.doi.org/10.1109/WoWMoM.2015.7158166

Chapre Y; Ignjatovic A; Seneviratne A; Jha S, 2014, 'CSI-MIMO: Indoor Wi-Fi Fingerprinting System', in Turgut D (ed.), 39th Annual IEEE Conference on Local Computer Networks, IEEE, Edmonton, Canada, pp. 202 - 209, presented at Local Computer Networks Conference, Edmonton, Canada, 08 September 2014 - 11 September 2014, http://dx.doi.org/10.1109/LCN.2014.6925773

Murtaza G; Kanhere S; ignjatovic A; Jha S; Jurdak R, 2014, 'Trajectory Approximation for Resource Constrained Mobile Sensor Networks', in Krishnamachari B (ed.), IEEE DCOSS, Australia, pp. 59 - 66, presented at Ghulam Murtaza, Australia, 26 May 2014 - 28 May 2014, http://dx.doi.org/10.1109/DCOSS.2014.27

Mohsen Rezvani ; Aleksandar Ignjatovic ; Elisa Bertino ; Sanjay Jha , 2014, 'Provenance-Aware Security Risk Analysis for Hosts and Network Flows', in Proceedings of NOMS 2014 IEEE/IFIP Network Operations and Management Symposium, Krakow, Poland, pp. 1 - 8, presented at IEEE/IFIP Network Operations and Management Symposium, NOMS 2014, Krakow, Poland, 05 May 2014 - 09 May 2014, http://dx.doi.org/10.1109/NOMS.2014.6838250

Li K; Kusy B; Jurdak R; Ignjatovic A; Kanhere SS; Jha S, 2014, 'κ-FSOM: Fair Link Scheduling Optimization for Energy-Aware Data Collection in Mobile Sensor Networks', in Krishnamachari B; Murphy A; Trigoni N (eds.), Proceedings 11th European Conference, EWSN 2014 : Lecture Notes in Computer Science, Springer, Oxford, UK, pp. 17 - 33, presented at 11th European Conference, EWSN 2014, Oxford, UK, 17 February 2014 - 19 February 2014, http://dx.doi.org/10.1007/978-3-319-04651-8_2

Li K; Kusy B; Jurdak R; Ignjatovic A; Kanhere SS; Jha S, 2014, 'kappa-FSOM: Fair Link Scheduling Optimization for Energy-Aware Data Collection in Mobile Sensor Networks', in Krishnamachari B; Murphy AL; Trigoni N (eds.), WIRELESS SENSOR NETWORKS, EWSN 2014, SPRINGER-VERLAG BERLIN, Oxford, ENGLAND, pp. 17 - 33, presented at 11th European Conference on Wireless Sensor Networks (EWSN), Oxford, ENGLAND, 17 February 2014 - 19 February 2014, http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000340395900002&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1

Biswas J; Ni W; Liu RP; Collings IB; Jha SK, 2014, 'Low complexity user pairing and resource allocation of heterogeneous users for uplink virtual MIMO system over LTE-A network', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 1903 - 1908, http://dx.doi.org/10.1109/WCNC.2014.6952560

Li K; Akbaş MI; Turgut D; Kanhere SS; Jha S, 2014, 'Reliable positioning with hybrid antenna model for aerial wireless sensor and actor networks', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 2904 - 2909, http://dx.doi.org/10.1109/WCNC.2014.6952912

Ali ST; Sivaraman V; Ostry D; Jha S, 2013, 'Securing data provenance in body area networks using lightweight wireless link fingerprints', in Proceedings of the ACM Conference on Computer and Communications Security, pp. 65 - 72, http://dx.doi.org/10.1145/2517300.2517303

Rezvani M; Ignjatovic A; Bertino E; Jha S, 2013, 'Poster abstract: A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks', in SenSys 2013 - Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, http://dx.doi.org/10.1145/2517351.2517394

Chou CT; Jha SK; Medhi D; Rosenbaum GF, 2012, 'Dynamic routing of restorable QoS connections in MPLS networks', in Proceedings of the 37th IEEE Conference on Local Computer Networks (LCN 2012), IEEE, Clearwater, Florida, pp. 418 - 426, presented at 37th IEEE Conference on Local Computer Networks (LCN 2012), Clearwater, Florida, 22 October 2012 - 25 October 2012, http://dx.doi.org/10.1109/LCN.2005.58

Sabrina F; Kanhere S; Jha SK, 2012, 'Implementation and performance analysis of a packet scheduler on a programmable network processor', in Proceedings of the 37th IEEE Conference on Local Computer Networks (LCN 2012), IEEE, Clearwater, Florida, pp. 242 - 249, presented at 37th IEEE Conference on Local Computer Networks (LCN 2012), Clearwater, Florida, 22 October 2012 - 25 October 2012, http://dx.doi.org/10.1109/LCN.2005.76

Kanhere S; Jha SK; Ahmed N, 2012, 'Probabilistic coverage in wireless sensor networks', in Proceedings of the 37th IEEE Conference on Local Computer Networks (LCN 2012), IEEE, Clearwater, Florida, pp. 672 - 679, presented at 37th IEEE Conference on Local Computer Networks (LCN 2012), Clearwater, Florida, 22 October 2012 - 25 October 2012, http://dx.doi.org/10.1109/LCN.2005.109

Jha SK, 2012, 'Resilience provisioning in provider based overlay networks', in Proceedings of the 37th IEEE Conference on Local Computer Networks (LCN 2012), IEEE, Clearwater, Florida, pp. 427 - 432, presented at 37th IEEE Conference on Local Computer Networks (LCN 2012), Clearwater, Florida, 22 October 2012 - 25 October 2012, http://dx.doi.org/10.1109/LCN.2005.146

Misra P; Hu W; Yang M; Jha SK, 2012, 'Efficient Cross-Correlation via Sparse Representation in Sensor Networks', in Proceedings of the 11th International Conference on Information Processing in Sensor Networks, ACM, New York, NY, USA, pp. 13 - 24, presented at 11th ACM/IEEE Conference on Information Processing in Sensing Networks, IPSN'12, Beijing, China, 16 April 2012 - 20 April 2012, http://dx.doi.org/10.1145/2185677.2185680

Tan H; Hu W; Jha SK, 2011, 'A TPM-enabled Remote Attestation Protocol (TRAP) in wireless sensor networks', in PM2HW2N'11 - Proceedings of the 6th ACM International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks, Association for Computing Machinery, New York, pp. 9 - 16, presented at 6th ACM International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks, PM2HW2N'11, Miami, FL, United states, 31 October 2011 - 31 October 2011, http://dx.doi.org/10.1145/2069087.2069090


Back to profile page