Selected Publications

The following are some of my peer-reviewed publications. For proper citations (and a complete list) of my publications, please refer to Google Scholar.

  1. SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations
    Mohammad Majid Akhtar, Rahat Masood, Muhammad Ikram, Salil S. Kanhere
    In 19th ACM ASIA Conference on Computer and Communications Security (AsiaCCS), https://asiaccs2024.sutd.edu.sg/, 2024.

  2. SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation
    Houssem Jmal, Firas Ben Hmida, Nardine Basta, Muhammad Ikram, Mohamed Ali Kaafar, Andy Walker
    In IEEE Transactions on Information Forensics and Security (IEEE T-IFS), https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10206, 2024. (Impact Factor: 6.8)

  3. Use of Cryptography in Malware Obfuscation
    Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Nguyen, Mohamed Ali Kaafar, Sean Lamont, Daniel Coscia
    In The Journal of Computer Virology and Hacking Techniques, 2023. (Impact Factor: 3.5)

  4. Don’t be a Victim During a Pandemic! Analysing Security and Privacy Threats in Twitter During COVID-19
    Bibhas Sharma, Ishan Karunanayake, Rahat Masood, Muhammad Ikram
    In IEEE Access, https://ieeeaccess.ieee.org/, 2023. (Impact Factor: 3.9)

  5. An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency Wallet Apps
    I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kaafar
    In The 21st International Conference on Applied Cryptography and Network Security (ACNS), 2023.

  6. A longitudinal study of the top 1% toxic Twitter profiles
    Hina Qayyum, Benjamin Zi Hao Zhao, Ian D. Wood, Muhammad Ikram, Mohamed Ali Kaafar, Nicolas Kourtellis
    In WebSci, 2023.

  7. Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework
    Nardine Basta, Muhammad Ikram, Mohamed Ali Kaafar, Andy Walker
    In NOMS, 2022.

  8. Longitudinal Compliance Analysis of Android Applications with Privacy Policies
    Saad Sajid Hashmi, Nazar Waheed, Gioacchino Tangari, Muhammad Ikram, Stephen Smith
    In Mobiquitous, 2021. (Outstanding Paper Award)

  9. Analyzing security issues of android mobile health and medical applications
    Gioacchino Tangari, Muhammad Ikram, I Wayan Budi Sentana, Kiran Ijaz, Mohamed Ali Kaafar, Shlomo Berkovsky
    In Journal of the American Medical Informatics Association (JAMIA), ocab131, https://doi.org/10.1093/jamia/ocab131, 2021. (Impact Factor: 7.9)

  10. Mobile health and privacy: cross-sectional study
    Gioacchino Tangari, Muhammad Ikram, Kiran Ijaz, Mohamed Ali Kaafar, Shlomo Berkovsky
    In The Britisch Medical Journal (BMJ), 2021. (Impact Factor: 107.7)

  11. Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures
    Nazar Waheed, Xiangjian He, Muhammad Ikram, Muhammad Usman, Saad Sajid Hashmi, Muhammad Usman
    In ACM Comput. Surv., Vol. 53, No. 3, 2020.

  12. iOS, Your OS, Everybody’s OS: Vetting and Analyzing Network Services of iOS Apps
    Zhushou Tang, Ke Tang, Minhui Xue, Yuan Tian, Sen Chen, Muhammad Ikram, Tielei Wang, Haojin Zhu
    In the 29th Usenix Security Symposium (Usenix Security), 2020.

  13. Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading
    Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kaafar, Roya Ensafi
    In ACM Transaction on Privacy and Security (TOPS), 2020.

  14. Decentralized Control: A Case Study of Russia
    Reethika Ramesh, Ram Sundara Raman, Matthew Bernhard, Victor Ongkowijaya, Leonid Evdokimov, Anne Edmundson, Steven Sprecher, Muhammad Ikram, and Roya Ensafi
    In NDSS, 2020.

  15. A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists
    Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Asghar, Mohamed Ali Kaafar, Abdelberi Chaabane, and Kanchana Thilakarathna
    In AsiaCCS, 2019. (Best Paper Award)

  16. DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling
    Muhammad Ikram, Pierrick Beaume, Mohamed Ali Kaafar
    In Secrypt, 2019.

  17. The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading
    Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kaafar, Noha Loizon, and Roya Ensafi
    In WWW, 2019.

  18. Incognito: A Method for Obfuscating Web Data
    Rahat Masood, Dinusha Vatsalan, Muhammad Ikram and Mohamed Ali Kaafar
    In WWW, 2018.

  19. Measuring, Characterizing, Detecting Facebook Like Farms
    Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kaafar and Zubair Shafiq
    In ACM Transaction on Privacy and Security (TOPS), 2017.

  20. Characterizing Key Stakeholders in an Online Black-Hat Marketplace
    Farooqi, Shehroze, Muhammad Ikram, Guillaume Jourjon, Mohamed Ali Kaafar, Emiliano De Cristofaro, Zubair Shafiq, Arik Friedman, and Fareed Zaffar.
    In APWG Symposium on Electronic Crime Research (eCrime), 2017.

  21. A First Look at Ad Blocking Apps
    Muhammad Ikram and Mohamed Ali Kaafar
    In NCA, 2017.

  22. Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning
    Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Anirban Mahanti, and Balachander Krishnamurthy
    In PETS, 2017.

  23. An analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps
    Muhammad Ikram, Narseo Vallina-Rodriguez, Suranga Seneviratne, Mohamed Ali Kaafar, and Vern Paxson
    In IMC, 2016.