Publications
Click on the following link for a complete list of publications: Google Scholar Profile (Sadegh Torabi)
Select Publications
- [2024]
- Zhang, Y., Yan, J., Torabi, S., and Assi, C. Securing IoT Malware Classifiers: Dynamic Trigger-Based Attack and Mitigation. ACCEPTED at IEEE ICC 2024.
- Sarieddine, K., Sayed, M. A., Torabi, S., Atallah, R., Jafarigiv, D., Assi, C., and Debbabi, M. Uncovering Covert Attacks on EV Charging Infrastructure: How OCPP Backend Vulnerabilities Could Compromise Your System. ACM AsiaCCS.
- Sarieddine, K., Sayed, M. A., Torabi, S., Atallah, R., & Assi, C. Edge-based detection and localization of adversarial oscillatory load attacks orchestrated by compromised EV charging stations. International Journal of Electrical Power & Energy Systems.
- [2023]
- Sarieddine, K., Sayed, M. A., Assi, C., Atallah, R., Torabi, S., Khoury, J., Safaei Pour, M., and Bou-Harb, E. EV Charging Infrastructure Discovery to Contextualize its Deployment Security. IEEE TNSM.
- Sarieddine, K., Sayed, M. A., Torabi, S., Atallah, R., and Assi, C. Investigating the Security of EV Charging Mobile Applications As an Attack Surface. ACM Transactions on Cyber-Physical Systems (TCPS).
- Yunlong Xing, Xinda Wang, Sadegh Torabi, Zeyu Zhang, Lingguang Lei, and Kun Sun. A Hybrid System Call Profiling Approach for Container Protection. IEEE TDSC.
- Nasr, T., Torabi, S., Fachkha, C., Bou-Harb, E., and Assi, C. ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems. NDSS Symposium.
- Ayala, R., Bou-Harb, E., Torabi, S., and Assi, C. RPM: Ransomware Prevention and Mitigation Using Operating Systems’ Sensing Tactics. ICC 2023.
- [2022]
- Yunlong Xing, Jiahao Cao, Xinda Wang, Sadegh Torabi, Kun Sun, Fei Yan, Qi Li. SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images. IEEE CNS.
- Dib, M., Torabi, S., Bou-Harb, E., Bouguila, N., and Assi, C. EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants. ACM AsiaCCS.
- [2021]
- Nasr, T., Torabi, S., Fachkha, C., Bou-Harb, E., and Assi, C. Power Jacking Your Station: In-Depth Security Analysis of Electric Vehicle Charging Station Management Systems. Journal of Computers & Security (COSE).
- Ayala, R., Torabi, S., Sarieddine, K., Bou-Harb, E., Bouguila, N., and Assi, C. On Ransomware Family Attribution Using Pre-Attack Paranoia Activities. IEEE TNSM.
- Torabi, S., Dib, M., Bou-Harb, E., Assi, C., and Debbabi, M. A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships. IEEE Networking Letters.
- Dib, M., Torabi, S., Assi, C., and Bou-Harb, E. A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution. IEEE TNSM.
- [2020]
- Torabi, S., Bou-Harb, E., Assi, C., Karbab, E., Boukhtouta, A., and Debbabi, M. Inferring and Investigating IoT-Generated Scanning Campaigns Targeting A Large Network Telescope. IEEE TDSC.
- Torabi, S., Bou-Harb, E., Assi, C., and Debbabi, M. A Scalable Platform for Investigating Exploited IoT Devices and Fingerprinting Unsolicited Activities. DFRWS EU Conference. Forensic Science International: Digital Investigation.
- [2018]
- Torabi, S., Boukhtouta, A., Assi, C., and Debbabi, M. (2018). Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems. IEEE COMST.
- Torabi, S., Bou-Harb, E., Assi, C., Galluscio, M., Boukhtouta, A., and Debbabi, M. Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective. DSN Conference.
- [2016]
- Torabi, S., and Beznosov, K. Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users. USENIX SOUPS’16.
- [2013]
- Torabi, S., and Beznosov, K. Privacy Aspects of Health Related Information Sharing in Online Social Networks. USENIX HealthTech’13 Workshop.