Salman Niksefat
Cited by
Cited by
Malware dynamic analysis evasion techniques: A survey
A Afianian, S Niksefat, B Sadeghiyan, D Baptiste
ACM Computing Surveys (CSUR) 52 (6), 1-28, 2019
An efficient protocol for oblivious DFA evaluation and applications
P Mohassel, S Niksefat, S Sadeghian, B Sadeghiyan
Cryptographers’ Track at the RSA Conference, 398-415, 2012
An efficient scheme to motivate cooperation in mobile ad hoc networks
S Soltanali, S Pirahesh, S Niksefat, M Sabaei
International Conference on Networking and Services (ICNS'07), 98-98, 2007
Pure-Call Oriented Programming (PCOP): chaining the gadgets using call instructions
AA Sadeghi, S Niksefat, M Rostamipour
Journal of Computer Virology and Hacking Techniques 14 (2), 139-156, 2018
ZIDS: A privacy-preserving intrusion detection system using secure two-party computation protocols
S Niksefat, B Sadeghiyan, P Mohassel, S Sadeghian
The Computer Journal 57 (4), 494-509, 2014
Privacy issues in intrusion detection systems: A taxonomy, survey and future directions
S Niksefat, P Kaghazgaran, B Sadeghiyan
Computer Science Review 25, 69-78, 2017
Efficient algorithms for dynamic detection and resolution of IPSec/VPN security policy conflicts
S Niksefat, M Sabaei
2010 24th IEEE International Conference on Advanced Information Networking …, 2010
Oblivious decision programs from oblivious transfer: Efficient reductions
P Mohassel, S Niksefat
International Conference on Financial Cryptography and Data Security, 269-284, 2012
Toward specification-based intrusion detection for web applications
S Niksefat, MM Ahaniha, B Sadeghiyan, M Shajari
International Workshop on Recent Advances in Intrusion Detection, 510-511, 2010
Preventing reflective DLL injection on UWP apps
M Zaheri, S Niksefat, B Sadeghiyan
OIC-CERT Journal of Cyber Security 1 (1), 41-52, 2018
ROPK++: an enhanced ROP attack detection framework for Linux operating system
V Moula, S Niksefat
2017 International Conference on Cyber Security And Protection Of Digital …, 2017
Editorial of the Special issue: Iranian Research in Information and System Security
B Sadeghiyan, S Niksefat
Journal of Computer Virology and Hacking Techniques, 2022
Oblivious decision program evaluation
S Niksefat, B Sadeghiyan, P Mohassel
IET Information Security 7 (2), 155-163, 2013
The system can't perform the operation now. Try again later.
Articles 1–13