Madiba Security Research Group

Concordia Institute for Information Systems Engineering
Faculty of Engineering and Computer Science

Alumni

Philippe Mangeard (M.A.Sc)
WARNE: A Stalkerware Evidence Collection Tool
Aug 27, 2024
Abdelrahman Ragab (M.A.Sc)
Privacy and Security Analysis of Virtual Shopping and AI Companion Platforms
Aug 20, 2024
Supraja Baskaran (M.A.Sc)
Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case
Oct 30, 2023
Xiufen Yu (M.A.Sc)
Privacy Analysis of Technological Solutions Designed for Victims of Intimate Partner Abuse
Sept 12, 2023
Rohan Pagey (M.A.Sc)
Security Weaknesses in E-commerce Platforms
Jan 23, 2023
Bhaskar Tejaswi (M.A.Sc)
Security Weaknesses in IoT Management Platform
Jan 25, 2023
Nayanamana Samarasinghe (Ph.D.)
Measuring for privacy: From tracking to cloaking
Nov 17, 2022
Didem Demirag (Ph.D.)
Moving Multiparty Computation Forward for the Real World
Oct 20, 2022
Pranay Kapoor (M.A.Sc)
Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly
Aug 24, 2022
Sina Pilehchiha (M.A.Sc)
Improving Reproducibility in Smart Contract Research
Aug 15, 2022
Mahdi Nejadgholi (M.A.Sc)
Nullification, a coercion-resistance add-on for e-voting protocols
Aug 1, 2022
Maryna Kluban (M.A.Sc)
On Measuring JavaScript Vulnerabilities in the NPM Packages, Websites and Chrome Extensions
Apr 29, 2022
Mehdi Salehi (M.A.Sc)
An Analysis of Upgradeability, Oracles, and Stablecoins in the Ethereum Blockchain
Apr 28, 2022
Behnam Shobiri (M.A.Sc)
CDNs' Dark Side: Identifying Security Problems in CDN-to-Origin
Dec 8, 2021
Mounir Elgharabawy (M.A.Sc)
Cross-vendor Security Analysis of Android Unix Domain Sockets
Oct 5, 2021
Md. Shahab Uddin (M.A.Sc)
HORUS: A Security Assessment Framework for Android Crypto Wallets
Aug 25, 2021
Tina Safaie (M.A.Sc)
ByPass: Reconsidering the Usability of Password Managers
Mar 31, 2021
Quentin Duchaussoy (M.A.Sc)
Security and Privacy Analysis of Parental Control Solutions
Nov 3, 2020
Tousif Osman (M.A.Sc)
AppVeto: Securing Android Applications through Resource Access Veto
Sept 9, 2020
Mina Jafari (M.A.Sc)
Measuring the Effectiveness of Microsoft Authenticode: A Systematic Analysis of Signed Freeware
Sept 3, 2020
Nan Yang (Ph.D.)
Contamination in Cryptographic Protocols
Aug 6, 2020
Suzan Ali (M.A.Sc)
A Large-Scale Evaluation of Privacy Practices of Public Wifi Captive Portals
May 25, 2020
Xavier de Carné de Carnavalet (Ph.D)
Last-Mile TLS Interception: Analysis and Observation of the Non-Public HTTPS Ecosystem
July 24, 2019
Elizabeth Stobert (Postdoc)
Md Zakir Hossen (M.A.Sc)
On Understanding Permission Usage Contextuality of Android Apps
December 11, 2018
Lianying Zhao (Ph.D)
Authentication and Data Protection under Strong Adversarial Model
July 23, 2018
Mahsa Moosavi (M.A.Sc)
Rethinking Certificate Authorities: Understanding and decentralizing domain validation
March 22, 2018
Chidinma Okoye (M.A.Sc)
New applications of blockchain technology to voting and lending
November 27, 2017
Abhimanyu Khanna (M.A.Sc)
Towards Usable and Fine-grained Security for HTTPS with Middleboxes
April 24, 2017
Parul Khanna (M.A.Sc)
Detecting Privacy Leaks Through Existing Android Frameworks
April 18, 2017
Briti Sundar Mondal (M.A.Sc)
BinType: A Scalable Type Inference Tool for Compiled C Programs
August 26, 2016
Arash Shahkar (M.A.Sc)
On Matching Binary to Source Code
March 1, 2016
Gaby Dagher (Ph.D.)
Secure Protocols for Privacy-preserving Data Outsourcing, Integration, and Auditing
December 18, 2015
Shayan Eskandari (M.A.Sc)
Real-world Deployability and Usability of Bitcoin
October 1, 2015
Suryadipta Majumdar (M.A.Sc)
On End-to-end Encryption for Cloud-based Services
September 8, 2014
A. Mert Kara (M.A.Sc)
Malicious Payload Distribution Channels in Domain Name System
January 10, 2014 (Co-supervisor: Prof M. Debbabi)
Xavier de Carné de Carnavalet (M.A.Sc)
A Large-scale Evaluation of High-impact Password Strength Meters
April 7, 2014
Atieh Saberi Pirouz (M.A.Sc)
Securing Email through Online Social Networks
August 27, 2013
Adam Skillen (M.A.Sc)
Deniable Storage Encryption for Mobile Devices
April 3, 2013