Publications

Research Reports

Talks

Useful Links

Publications

  • Daniel Klischies, Moritz Schloegel, Tobias Scharnowski, Mikhail Bogodukhov, David Rupprecht, and Veelasha Moonsamy (2023). Instructions Unclear: Undefined Behaviour in Cellular Network Specifications, To appear at the 32nd USENIX Security Symposium, Anaheim, August 2023 [pre-print] [artifact]

  • Dimitri Mankowski, Thom Wiggers, and Veelasha Moonsamy (2023). TLS → Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android, Proceedings of the 8th IEEE European Symposium on Security and Privacy Workshops, Delft, The Netherlands, July 2023 [pre-print] [code]

  • Paul Staat, Simon Mulzer, Stefan Roth, Veelasha Moonsamy, Aydin Sezgin and Christof Paar (2022). IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing, Proceedings of the 43rd IEEE Symposium on Security and Privacy (IEEE S&P 2022), pages 1705-1721, San Francisco, USA, May 2022 [pdf] [bib] [YouTube]

  • Hamid Bostani and Veelasha Moonsamy (2021). EvadeDroid: A Practical Evasion Attack on Machine Learning for Black-box Android Malware Detection, arXiv preprint arXiv:2110.03301 [pre-print]

  • Carlo Meijer, Veelasha Moonsamy, and Jos Wetzels. Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code, Proceedings of the 30th USENIX Security Symposium (USENIX Security 21), pages 555-572, August 2021 (online) [pdf] [bib]

  • Rafa Gálvez, Veelasha Moonsamy, and Claudia Diaz. Less is More: A privacy-respecting Android malware classifier using Federated Learning, Proceedings on Privacy Enhancing Technologies (PoPETS 2021), pages 96-116, July 2021 (online) [pdf] [bib] [YouTube]

  • Radhesh Krishnan Konoth, Rolf van Wegberg, Veelasha Moonsamy, and Herbert Bos (2019). Malicious cryptocurrency miners: Status and Outlook, arXiv preprint arXiv:1901.10794 [pre-print]

  • Radhesh Krishnan Konoth, Emanuele Vineti, Veelasha Moonsamy, Martina Lindorfer, Christopher Kruegel, Herbert Bos and Giovanni Vigna (2018). MineSweeper: An In-depth Look into Drive-by Mining and its Defense, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS 2018), pages 1714-1730, Toronto, Canada, October 2018 [pdf] [bib]

  • Raphael Spreitzer, Veelasha Moonsamy, Thomas Korak and Stefan Mangard (2018). Systematic Classification of Side-Channel Attacks on Mobile Devices: A Case Study for Mobile Devices, IEEE Communications Surveys & Tutorials, vol.20, pages 465-488 [pdf] [bib]

  • Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti and Radha Poovendran. No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices, Proceedings of the 15th International Conference on Applied Cryptography and Network Security (ACNS 2017), pages 83-102, Kanazawa, Japan, July 2017 [pdf] [bib]
  • Gergely Alpár, Lejla Batina, Lynn Batten, Veelasha Moonsamy, Anna Krasnova, Antoine Guellier and Iynkaran Natgunanathan. New Directions in IoT Privacy Using Attribute-Based Authentication, Proceedings of the ACM International Conference on Computing Frontiers (CF), pages 461-466, Como, Italy, May 2016 [pdf] [bib]

  • Hossein Fereidooni, Veelasha Moonsamy, Mauro Conti and Lejla Batina. Efficient Classification of Android Malware in the wild using Robust Static Features, in Protecting Mobile Networks and Devices: Challenges and Solutions, CRC Press - Taylor & Francis, pages 181-205 [pdf] [bib]

  • Lynn Batten, Veelasha Moonsamy and Moutaz Alazab. Smartphone Applications, Malware and Data Theft, Proceedings of the 2nd International Conference on Computational Models, Cyber Security & Computational Intelligence (ICC3), pages 1-10, Coimbatore, India, December 2015 [pdf] [bib]

  • Veelasha Moonsamy, Jia Rong and Shaowu Liu (2014). Mining Permission Patterns for Contrasting Clean and Malicious Android Applications, Journal of Future Generation Computer Systems (FGCS), vol.36, pages 122-132 [pdf] [bib]

  • Veelasha Moonsamy and Lynn Batten. Mitigating Man-in-The-Middle Attacks on Smartphones - a Discussion of SSL Pinning and DNSSec, Proceedings of the 12th Australian Information Security Management Conference (AISM), pages 5-13, Perth, Australia, December 2014 [pdf] [bib]

  • Yogachandran Rahulamathavan, Veelasha Moonsamy, Lynn Batten, Su Shunliang and Muttukrishnan Rajarajan. An Analysis of Tracking Service Settings in Blackberry 10 and Windows Phone 8 Smartphones, Proceedings of the 19th Australasian Conference on Information Security and Privacy (ACISP), pages 430-437, Sydney, Australia, July 2014 [pdf] [bib]

  • Veelasha Moonsamy, Lynn Batten and Malcolm Shore. Can Smartphone Users Turn Off Tracking Service Settings, Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM), pages 455-463, Vienna, Austria, December 2013 [pdf] [bib]

  • Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li and Lynn Batten. Contrasting Permission Patterns between Clean and Malicious Android Applications, Proceedings of the 9th International Conference on Security and Privacy in Communications Networks (SecureComm), pages 69-85, Sydney, Australia, September 2013 [pdf] [bib]

  • Lynn Batten and Veelasha Moonsamy. The Risk of Advertizing Libraries on Android Mobile Devices, Proceedings of the 2013 Crypto'Puces, Island of Porquerolles, France, May 2013 [pdf]

  • Lynn Batten and Veelasha Moonsamy. Identity management on Android mobile devices, Proceedings of the workshop The Future of Identity, Royal Holloway College, London,UK, April 2013.

  • Veelasha Moonsamy, Moutaz Alazab and Lynn Batten (2012). Towards an Understanding of the Impact of Advertising on Data Leaks, International Journal of Security and Networks (IJSN), vol.7, pages 181-193 [pdf]

  • Rafiqul Islam, Ronghua Tian, Veelasha Moonsamy and Lynn Batten (2012). A Comparison of the Classification of Disparate Malware Collected in Different Time Periods, Journal of Networks (JNW), vol.7, pages 946-955 [pdf]

  • Veelasha Moonsamy and Lynn Batten. Zero Permission Android Applications, Proceedings of the 3rd Workshop on Applications and Techniques in Information Security (ATIS), pages 5-10, Melbourne, Australia, November 2012 [pdf]

  • Moutaz Alazab, Veelasha Moonsamy, Lynn Batten, Patrick Lantz and Ronghua Tian. Analysis of Malicious and Benign Android Applications, Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW), pages 608-616, Macau, China, June 2012 [pdf]

  • Veelasha Moonsamy, Ronghua Tian and Lynn Batten. Feature Reduction to Speed Up Malware Classification, Proceedings of the 16th Nordic Conference on Secure IT Systems (NordSec), pages 176-188, Tallinn, Estonia, October 2011 [pdf]

  • Rafiqul Islam, Ronghua Tian, Veelasha Moonsamy and Lynn Batten. A Comparison of Disparate Malware Collected in Different Time Periods, Proceedings of the 2nd Workshop on Applications and Techniques in Information Security (ATIS), pages 22-28, Melbourne, Australia, November 2011 [pdf]

Research Reports

[top of page]

  • Veelasha Moonsamy, Lynn Batten and Malcolm Shore. Smartphone Application Assessment Guidelines. Deakin University & NBN Co.
  • Veelasha Moonsamy, Lynn Batten and Malcolm Shore. Safeguarding Personal Information Privacy. Deakin University & NBN Co.
  • Veelasha Moonsamy, Andreas Ernst and David Sier. Train Schedule Modelling using Discrete Event Simulation. Deakin University & CSIRO

Talks

[top of page]

  • Detection of browser-based cryptocurrency mining (2019). Invited lecture as part of the 2019 International Summer Schools on Cyber Security [url] [slides]
  • MineSweeper: An In-depth Look into Drive-by Mining and its Defense (2018). Seminar talk at University of Adelaide, Adelaide, Australia [url] [slides]
  • A New Categorization System for Side-Channel Attacks on Mobile Device & more (2017). Accepted talk at RuhrSec 2017, Bochum, Germany [url] [YouTube]
  • A New Categorization System for Side-Channel Attacks on Mobile Device & more (2017). Invited talk at University of Adelaide, Adelaide, Australia [url] [slides]
  • No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices (2016). Seminar talk at Academia Sinica, Taipei, Taiwan [url]
  • Mining Contrasting Permission Patterns for Clean and Malicious Applications. SPRITZ Workshop on Future Systems Security and Privacy 2015, Padova, Italy [website] [YouTube]
  • Android Applications: Data Leaks via Advertising Libraries. ISITA 2014, Melbourne, Australia [url]
  • An Analysis of Tracking Service Settings in Blackberry 10 and Windows Phone 8 Smartphones. ACSIP 2014, Sydney, Australia [url]
  • Contrasting Permission Patterns between Clean and Malicious Android Applications (2013). Seminar talk at TU Graz, Graz, Austria [url]
  • Can Smartphone Users Turn Off Tracking Service Settings. MoMM 2013, Vienna, Austria [url]
  • Zero Permission Android Applications. ATIS 2012, Melbourne, Australia [url]
  • Feature Reduction to Speed Up Malware Classification. NordSec 2011, Tallinn, Estonia [url]

Useful Links

[top of page]