Salman Niksefat
Cited by
Cited by
Malware dynamic analysis evasion techniques: A survey
A Afianian, S Niksefat, B Sadeghiyan, D Baptiste
ACM Computing Surveys (CSUR) 52 (6), 1-28, 2019
An efficient protocol for oblivious DFA evaluation and applications
P Mohassel, S Niksefat, S Sadeghian, B Sadeghiyan
Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012
An efficient scheme to motivate cooperation in mobile ad hoc networks
S Soltanali, S Pirahesh, S Niksefat, M Sabaei
International Conference on Networking and Services (ICNS'07), 98-98, 2007
Pure-Call Oriented Programming (PCOP): chaining the gadgets using call instructions
AA Sadeghi, S Niksefat, M Rostamipour
Journal of Computer Virology and Hacking Techniques 14, 139-156, 2018
ZIDS: A privacy-preserving intrusion detection system using secure two-party computation protocols
S Niksefat, B Sadeghiyan, P Mohassel, S Sadeghian
The Computer Journal 57 (4), 494-509, 2014
Privacy issues in intrusion detection systems: A taxonomy, survey and future directions
S Niksefat, P Kaghazgaran, B Sadeghiyan
Computer Science Review 25, 69-78, 2017
Efficient algorithms for dynamic detection and resolution of IPSec/VPN security policy conflicts
S Niksefat, M Sabaei
2010 24th IEEE International Conference on Advanced Information Networking …, 2010
Oblivious Decision Programs from Oblivious Transfer: Efficient Reductions.
P Mohassel, S Niksefat
Financial Cryptography 2014, 269-284, 2012
Toward specification-based intrusion detection for web applications
S Niksefat, MM Ahaniha, B Sadeghiyan, M Shajari
Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010
Preventing reflective DLL injection on UWP apps
M Zaheri, S Niksefat, B Sadeghiyan
OIC-CERT Journal of Cyber Security 1 (1), 41-52, 2018
ROPK++: an enhanced ROP attack detection framework for Linux operating system
V Moula, S Niksefat
2017 International Conference on Cyber Security And Protection Of Digital …, 2017
Editorial of the Special issue: Iranian Research in Information and System Security
B Sadeghiyan, S Niksefat
Journal of Computer Virology and Hacking Techniques, 2022
Oblivious decision program evaluation
S Niksefat, B Sadeghiyan, P Mohassel
IET Information Security 7 (2), 155-163, 2013
The system can't perform the operation now. Try again later.
Articles 1–13