Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fadi Mohsen is active.

Publication


Featured researches published by Fadi Mohsen.


ieee international conference on services computing | 2013

Private and Anonymous Data Storage and Distribution in Cloud

Qi Duan; Yongge Wang; Fadi Mohsen; Ehab Al-Shaer

Cloud storage systems have received extensive attention in recent years. Many individuals and business organizations are beginning to move their data to cloud environments. It becomes increasingly important to investigate secure file storage in cloud environments. In this paper, we present a secure distributed file distribution system in which the customers can directly choose appropriate design parameters and service providers. In our scheme, we use novel coding techniques that almost achieve the Shannon information bound with very efficient coding and decoding process. Our evaluations show the correctness and efficiency of the coding scheme. We show that the problem to find the satisfying file distribution under certain cost and security constraints is NP-hard, and present the Satisfiability Modulo Theories (SMT) formalization to find the satisfying data share distribution with cost and security constraints. The SMT formalization is flexible to be applied to other threshold based cloud file distribution system and can accommodate other constraints. We also analyse the security of the scheme by defining the security metric (compromising probability) for both the eavesdropping and DoS attackers and show that one must carefully choose design parameters to achieve the required security.


color imaging conference | 2016

The Listening Patterns to System Events by Benign and Malicious Android Apps

Fadi Mohsen; Mohamed Shehab

Mobile applications have become an integral component of modern mobile operating systems. The usage pattern for these apps have increased tremendously the last ten years. At the same time, the security and privacy risks of these apps have also expanded in number and severity. In this paper, we spot the light on a critical component of Android mobile applications called Broadcast receivers. We focus on these receivers that are deliberately developed to listen to systems actions and events. The number of these actions has increased tremendously since the initial release of Android operating system. We showed that how such a component can pose serious privacy risks on users without their knowledge and awareness. We first illustrate a prototype of an attack that was possible due to the use of Broadcast receivers. We then show the results of analyzing a large dataset of malicious and benign Android applications in terms of their Broadcast receivers usages. Our prototype shows that with the use of Broadcast receivers the location privacy of users can be compromised, moreover, the dataset analysis results present that the usage of Broadcast receivers by malicious applications is remarkably higher than benign applications. Finally, we end with some conclusions and recommendations.


ieee international conference on mobile services | 2014

Towards Enhancing the Security of OAuth Implementations in Smart Phones

Mohammed Shehab; Fadi Mohsen


collaborative computing | 2013

Android keylogging threat

Fadi Mohsen; Mohammed Shehab


conference on data and application security and privacy | 2014

Securing OAuth implementations in smart phones

Mohamed Shehab; Fadi Mohsen


color imaging conference | 2016

Hardening the OAuth-WebView Implementations in Android Applications by Re-Factoring the Chromium Library

Fadi Mohsen; Mohamed Shehab


2016 Second International Conference on Mobile and Secure Services (MobiSecServ) | 2016

Investigating the keylogging threat in android — User perspective (Regular research paper)

Fadi Mohsen; Emmanuel Bello-Ogunu; Mohamed Shehab


computer and communications security | 2014

POSTER: Android System Broadcast Actions Broadcasts Your Privacy

Fadi Mohsen; Mohamed Shehab; Emmanuel Bello-Ogunu; Abeer Al Jarrah


trust security and privacy in computing and communications | 2018

Countering Intrusiveness Using New Security-Centric Ranking Algorithm Built on Top of Elasticsearch

Fadi Mohsen; Hamed Abdelhaq; Halil Bisgin; Andrew Jolly; Michael Szczepanski


color imaging conference | 2017

Detecting Android Malwares by Mining Statically Registered Broadcast Receivers

Fadi Mohsen; Halil Bisgin; Zachary Scott; Kyle Strait

Collaboration


Dive into the Fadi Mohsen's collaboration.

Top Co-Authors

Avatar

Mohamed Shehab

University of North Carolina at Charlotte

View shared research outputs
Top Co-Authors

Avatar

Ehab Al-Shaer

University of North Carolina at Charlotte

View shared research outputs
Top Co-Authors

Avatar

Emmanuel Bello-Ogunu

University of North Carolina at Charlotte

View shared research outputs
Top Co-Authors

Avatar

Mohammed Shehab

University of North Carolina at Charlotte

View shared research outputs
Top Co-Authors

Avatar

Abeer Al Jarrah

University of North Carolina at Charlotte

View shared research outputs
Top Co-Authors

Avatar

Mohammad Ashiqur Rahman

Tennessee Technological University

View shared research outputs
Top Co-Authors

Avatar

Qi Duan

University of North Carolina at Charlotte

View shared research outputs
Top Co-Authors

Avatar

Yongge Wang

University of North Carolina at Charlotte

View shared research outputs
Researchain Logo
Decentralizing Knowledge