9 May 2017: I am no longer maintaining this website. Go to https://veelasha.org/publications.shtml for latest updates.

Publications

Research Reports

Talks

Publications

  • Raphael Spreitzer, Veelasha Moonsamy, Thomas Korak and Stefan Mangard. SoK: Systematic Classification of Side-Channel Attacks on Mobile Devices [arXiv:1611.03748]

  • Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti and Radha Poovendran. No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices [arXiv:1609.0275] Accepted at ACNS 2017

  • Gergely Alpár, Lejla Batina, Lynn Batten, Veelasha Moonsamy, Anna Krasnova, Antoine Guellier and Iynkaran Natgunanathan. New Directions in IoT Privacy Using Attribute-Based Authentication, Proceedings of the ACM International Conference on Computing Frontiers (CF), pages 461-466, Como, Italy, May 2016 [pdf]

  • Hossein Fereidooni, Veelasha Moonsamy, Mauro Conti and Lejla Batina. Efficient Classification of Android Malware in the wild using Robust Static Features, in Protecting Mobile Networks and Devices: Challenges and Solutions, CRC Press - Taylor & Francis (to appear) [pdf]

  • Lynn Batten, Veelasha Moonsamy and Moutaz Alazab. Smartphone Applications, Malware and Data Theft, Proceedings of the 2nd International Conference on Computational Models, Cyber Security & Computational Intelligence (ICC3), pages 1-10, Coimbatore, India, December 2015 [pdf]

  • Veelasha Moonsamy, Jia Rong and Shaowu Liu (2014). Mining Permission Patterns for Contrasting Clean and Malicious Android Applications, Journal of Future Generation Computer Systems (FGCS) , vol.36, pages 122-132 [pdf]

  • Veelasha Moonsamy and Lynn Batten. Mitigating Man-in-The-Middle Attacks on Smartphones - a Discussion of SSL Pinning and DNSSec, Proceedings of the 12th Australian Information Security Management Conference (AISM), pages 5-13, Perth, Australia, December 2014 [pdf]

  • Yogachandran Rahulamathavan, Veelasha Moonsamy, Lynn Batten, Su Shunliang and Muttukrishnan Rajarajan. An Analysis of Tracking Service Settings in Blackberry 10 and Windows Phone 8 Smartphones, Proceedings of the 19th Australasian Conference on Information Security and Privacy (ACISP), pages 430-437, Sydney, Australia, July 2014 [pdf]

  • Veelasha Moonsamy, Lynn Batten and Malcolm Shore. Can Smartphone Users Turn Off Tracking Service Settings, Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM), pages 455-463, Vienna, Austria, December 2013 [pdf]

  • Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li and Lynn Batten. Contrasting Permission Patterns between Clean and Malicious Android Applications, Proceedings of the 9th International Conference on Security and Privacy in Communications Networks (SecureComm), pages 69-85, Sydney, Australia, September 2013 [pdf]

  • Lynn Batten and Veelasha Moonsamy. The Risk of Advertizing Libraries on Android Mobile Devices, Proceedings of the 2013 Crypto'Puces, Island of Porquerolles, France, May 2013 [pdf]

  • Lynn Batten and Veelasha Moonsamy. Identity management on Android mobile devices, Proceedings of the workshop The Future of Identity, Royal Holloway College, London,UK, April 2013.

  • Veelasha Moonsamy, Moutaz Alazab and Lynn Batten (2012). Towards an Understanding of the Impact of Advertising on Data Leaks, International Journal of Security and Networks (IJSN), vol.7, pages 181-193 [pdf]

  • Rafiqul Islam, Ronghua Tian, Veelasha Moonsamy and Lynn Batten (2012). A Comparison of the Classification of Disparate Malware Collected in Different Time Periods, Journal of Networks (JNW), vol.7, pages 946-955 [pdf]

  • Veelasha Moonsamy and Lynn Batten. Zero Permission Android Applications, Proceedings of the 3rd Workshop on Applications and Techniques in Information Security (ATIS), pages 5-10, Melbourne, Australia, November 2012 [pdf]

  • Moutaz Alazab, Veelasha Moonsamy, Lynn Batten, Patrick Lantz and Ronghua Tian. Analysis of Malicious and Benign Android Applications, Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW), pages 608-616, Macau, China, June 2012 [pdf]

  • Veelasha Moonsamy, Ronghua Tian and Lynn Batten. Feature Reduction to Speed Up Malware Classification, Proceedings of the 16th Nordic Conference on Secure IT Systems (NordSec), pages 176-188, Tallinn, Estonia, October 2011 [pdf]

  • Rafiqul Islam, Ronghua Tian, Veelasha Moonsamy and Lynn Batten. A Comparison of Disparate Malware Collected in Different Time Periods, Proceedings of the 2nd Workshop on Applications and Techniques in Information Security (ATIS), pages 22-28, Melbourne, Australia, November 2011 [pdf]

Research Reports

[top of page]

  • Veelasha Moonsamy, Lynn Batten and Malcolm Shore. Smartphone Application Assessment Guidelines. Deakin University & NBN Co.
  • Veelasha Moonsamy, Lynn Batten and Malcolm Shore. Safeguarding Personal Information Privacy. Deakin University & NBN Co.
  • Veelasha Moonsamy, Andreas Ernst and David Sier. Train Schedule Modelling using Discrete Event Simulation. Deakin University & CSIRO

Talks

[top of page]

  • No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices (2016). Seminar talk at Academia Sinica, Taipei, Taiwan [url]
  • Mining Contrasting Permission Patterns for Clean and Malicious Applications. SPRITZ Workshop on Future Systems Security and Privacy 2015, Padova, Italy [website] [talk]
  • Android Applications: Data Leaks via Advertising Libraries. ISITA 2014, Melbourne, Australia [url]
  • An Analysis of Tracking Service Settings in Blackberry 10 and Windows Phone 8 Smartphones. ACSIP 2014, Sydney, Australia [url]
  • Contrasting Permission Patterns between Clean and Malicious Android Applications (2013). Seminar talk at TU Graz, Graz, Austria [url]
  • Can Smartphone Users Turn Off Tracking Service Settings. MoMM 2013, Vienna, Austria [url]
  • Zero Permission Android Applications. ATIS 2012, Melbourne, Australia [url]
  • Feature Reduction to Speed Up Malware Classification. NordSec 2011, Tallinn, Estonia [url]