At the end of this page, you can find the full list of publications and patents.
This paper investigates the security of digital wallet transactions, highlighting vulnerabilities in authentication, authorization, and access control. It exposes weaknesses in decentralized authority delegation, allowing attackers to add stolen bank cards, bypass payment authorization, and violate access control policies. The findings underscore the severity of these vulnerabilities, prompting proposed remedies to enhance security measures in digital wallet systems.
Raja Hasnain Anwar, Syed Rafiul Hussain, and Muhammad Taqi Raza
Driver distraction is one of the leading causes of accidents in semi-autonomous vehicles. We identify the relationship between the traffic event, the type of automotive sensing technologies, and its processing resources to capture that event to design the driver’s attention gauge.
Raja Hasnain Anwar, Fatima Muhammad Anwar, Muhammad Kumail Haider, Alon Efrat, and Muhammad Taqi Raza
International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM)
Data-intensive systems are vulnerable to side-channel attacks in which hackers can extract sensitive information from a digital device without actively manipulating the target system. Nevertheless, there is a scarcity of IS research on how businesses can effectively detect and safeguard against side-channel attacks.
Raja Hasnain Anwar, Yi (Zoe) Zou, and Muhammad Taqi Raza
Americas Conference on Information Systems (AMCIS)
We propose MalRNN, a novel deep learning-based approach to automatically generate evasive malware variants without any of these restrictions. Our approach features an adversarial example generation process, which learns a language model via a generative sequence-to-sequence recurrent neural network to augment malware binaries. MalRNN effectively evades three recent deep learning-based malware detectors and outperforms current benchmark methods.
Mohammadreza Ebrahimi, Ning Zhang, James Hu, Muhammad Taqi Raza, and Hsinchun Chen
2024: In Wallet We Trust: Bypassing the Digital Wallets Payment Security for Free Shopping [PDF] [Slides]
Raja Hasnain Anwar, Syed Rafiul Hussain, and Muhammad Taqi Raza
USENIX Security Symposium
2024: Characterizing Encrypted Application Traffic through Cellular Radio Interface Protocol [PDF] [Slides]
Md Ruman Islam, Raja Hasnain Anwar, Spyridon Mastorakis, and Muhammad Taqi Raza
IEEE International Conference on Mobile Ad-Hoc and Smart Systems (MASS)
2023: A Comprehensive Study on Cyber Attacks in Communication Networks in Water Purification and Distribution Plants: Challenges, Vulnerabilities, and Future Prospects
Muhammad Muzamil Aslam, Ali Tufail, Ki-Hyung Kim, Rosyzie Anna Awg Haji Mohd Apong, and Muhammad Taqi Raza
Sensors
2023: Redefining the Driver Attention Gauge in Semi-Autonomous Vehicles [PDF] [Slides]
Raja Hasnain Anwar, Fatima Muhammad Anwar, Muhammad Kumail Haider, Alon Efrat, and Muhammad Taqi Raza
International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM)
2023: Detecting Privacy Threats with Machine Learning: A Design Framework for Identifying Side-Channel Risks of Illegitimate User Profiling [PDF]
Raja Hasnain Anwar, Yi (Zoe) Zou, and Muhammad Taqi Raza
Americas Conference on Information Systems (AMCIS)
2022: Enabling Emerging Edge Applications Through a 5G Control Plane Intervention
Mukhtiar Ahmad, Muhammad Ali Nawazish, Muhammad Taimoor Tariq, Muhammad Basit Iqbal Awan, Muhammad Taqi Raza, and Zafar Ayyub Qazi
International Conference on emerging Networking EXperiments and Technologies
2022: LTE NFV Rollback Recovery
Muhammad Taqi Raza, Zhowei Tan, Ali Tufail, and Fatima Muhammad Anwar
IEEE Transactions on Network and Service Management
2021: Keeping eyes on the road: the role of situated IS delegation in influencing drivers’ situational awareness [PDF]
Raja Hasnain Anwar, Yi (Zoe) Zou, and Muhammad Taqi Raza
International Conference on Information Systems (ICIS) TREOs
2021: On Key Reinstallation Attacks over 4G LTE Control-Plane: Feasibility and Negative Impact
Muhammad Taqi Raza, Yunqi Guo, Songwu Lu, and Fatima Muhammad Anwar
Annual Computer Security Applications Conference
2021: Highly Available Service Access Through Proactive Events Execution in LTE NFV
Muhammad Taqi Raza, Fatima Muhammad Anwar, Dongho Kim, and Kyu-Han Kim
IEEE Transactions on Network and Service Management
2020: Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model
Mohammadreza Ebrahimi, Ning Zhang, James Hu, Muhammad Taqi Raza, and Hsinchun Chen
arXiv:2012.07994
2020: {FERRET}: Fall-back to {LTE} Microservices for Low Latency Data Access
Muhammad Taqi Raza, Fatima Muhammad Anwar, Dongho Kim, and Kyu-Han Kim
USENIX Workshop on Hot Topics in Edge Computing