Research is an important part of my learning process. I have worked in areas related to Software Engineering Education, Search in Social Networks and Formal Specification and Verification. My current areas of interest are security and privacy on modern smartphone platforms. Following is a list of my publications. I’ll post as much information about these publications as possible.

Books, Book Chapters and Journal Papers

  1. Nauman, M., Azam, N., Yao, J.T. A three-way decision making approach to malware analysis using probabilistic rough sets. In Information Sciences. Vol. 374 pp 193–209. Indexed ISI. Impact factor: 3.364. Elsevier. December, 2016.
  2. Khan, S., Nauman, M., Othman, A.T., Musa, S., Ali, T. TSSDroid: realization of an efficient and usable TSS API for the Android software stack. In Security and Communication Networks. 9(11) pp 1553–1576. Indexed ISI. Impact factor: 0.806. Wiley. July, 2016.
  3. Nauman, M. Khan, S., Othman, A.T., Musa, S. Realization of a User-Centric, Privacy Preserving Permission Framework for Android. In Security and Communication Networks. Indexed ISI. Impact factor: 0.806. Wiley. February, 2015.
  4. Toegl, R. ,  Winkler, T., Nauman, M., Hong, T.W., Winter, J., Gissing, M. Programming Interfaces for the TPM. [Book Chapter] in Trusted Computing for Embedded Systems. pp 3-32. Springer. November, 2014.
  5. Toegl, R., Winkler, T., Nauman, M. Hong, T. Specification and Standardization of a Java Trusted Computing API. In Software: Practice and Experience. Indexed ISI. Impact factor: 0.652. Wiley. July, 2011.
  6. Alam, M., Ali, T., Khan, S., Khan, S., Ali, M., Nauman, M., Hayat, A., Khan, M.K., Alghathbar, K. Analysis of existing remote attestation techniques. In Security and Communication Networks. Indexed ISI. Impact factor: 0.806. Wiley. 2011.
  7. Alam, M., Zhang X.,Nauman, M. Ali, T., Ali, M., Anwar, S., and Alam, Q. Behavioral Attestation for Web Services using access policies. In Multimedia Tools and Applications. Indexed ISI. Impact factor: 1.331. Volume 53. No. 1. Springer. May, 2011.
  8. Nauman, M. Tamleek Ali and Azhar Rauf. Using Trusted Computing for Privacy Preserving Keystroke-based Authentication in Smartphones. In Telecommunications Systems Journal. Indexed ISI. Impact factor: 0.822. Springer. July, 2011.
  9. Tamleek Ali, Masoom Alam, Nauman, M, Toqeer Ali, Muhammad Ali and Sajid Anwar. A Scalable and Privacy Preserving Remote Attestation. Journal of Information. Indexed ISI. Impact factor: 0.099. Accepted October, 2010.
  10. Nauman, M, Tamleek Ali, Muhammad Khurram Khan and Khaled Alghathbar. Information Flow Analysis of UCON. International Journal of Physical Sciences. June 2010 Vol. 5, Num. 6. pp 865 – 875. Indexed ISI. Impact Factor: 0.554
  11. Masoom Alam, Xinwen Zhang, Nauman, M, Tamleek Ali and Patrick C.K. Hung. Behavioral Attestation for Web Services Based Business ProcessesInternational Journal of Web Services Research. Indexed ISI/SCI-E, Impact factor: 1.200. Vol. 7. Num 3. pp 52-72. 2010.
  12. Nauman, M and Sohail Khan. Design and Implementation of a Fine-grained Resource Usage Model for the Android Platform. International Arab Journal of Information Technology. Indexed ISI/SCI-E. Impact Factor: 0.519.  Vol. 8, No. 4  October 2011.
  13. Integrity Based Access Control: A Case Study in Remote Attestation.
    [Book – Co-authored]
    Publisher: VDM Verlag Dr. Mueller e.K. (Germany) on December 29, 2008.
    ISBN-10: 363910661X
    ISBN-13: 978-3639106619
    Available from Amazon
  14. Nauman, M., Shahbaz Khan and Sanaullah Khan. Helplets: A Collaborative Help Collection and Retrieval Architecture for Web-Enabled Systems.
    [Book Chapter] in Web-based Support Systems. Springer, 2010.
  15. Common Sense and Folksonomy: Engineering a Model for an Intelligent Search System.
    Publisher: VDM Verlag Dr. Mueller e.K. (Germany) on June 10, 2008.
    ISBN-10: 3639040872
    ISBN-13: 978-3639040876
    Available from Amazon
  16. Nauman, M., Khan, S. and Amin, M. Addressing Polysemy and Synonymy in Collaborative Tagging Systems through Machine Common Sense. Journal of Computer and Information Sciences. Volume 1. Issue 2. February 2008. Peshawar, Pakistan.

Editorial Services

  1. Program Committee: Served on the Program Committee of 6thInternational Conference on Trust & Trustworthy Computing, London, UK — the leading conference on Trusted Computing technologies
  2. Journal and Conference Reviews: Reviewed papers for several journals including IEEE Computer, Springer TeleSys, Wiley Security and Communication Networks, and Elsevier EIS as well as several high-ranking conferences including Trust’11, Trust’12, SACMAT’09, SACMAT’12 among others.

Conference Papers

  1. Backes, M., Nauman, M. LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning. April, 2017. Proceedings of the IEEE European Symposium on Security and Privacy (Euro S&P ’17). Paris, France.
  2. Ali, T., Ali, J., Ali, T., Nauman, M., Musa, S. Efficient, Scalable and Privacy Preserving Application Attestation in a Multi Stakeholder Scenario. 16th International Conference on Computer Science and its Applications (ICCSA’2016). July 2016. LNCS Vol. 9789, pp 407-421. Beijing, China.
  3. Nauman, M., Azam, N. A Three-way Decision Making Approach to Malware Analysis. 2015 International Joint Conference on Rough Sets. December, 2015. Tianjin, China.
  4. Nauman, M., Khan, S., Othman, A.T., Musa, S., Najeeb-ur-Rehman. POAuth: Privacy-aware Open Authorization for Native Apps on Smartphone Platforms. 6th ACM International Conference on Ubiquitous Information Management and Communication (ACM ICUIMC 2012). February, 2012. Kuala Lumpur, Malaysia.
  5. Syed, T.A., Ismail, R., Musa, S., Nauman, M., Khan, S. A Sense of Others: Behavioral Attestation of Unix Processes on Remote Platforms. 6th ACM International Conference on Ubiquitous Information Management and Communication (ACM ICUIMC 2012). February, 2012. Kuala Lumpur, Malaysia.
  6. Khan, S., Nauman, M., Othman, A.T., Musa. M. How Secure is your Smartphone: An Analysis of Smartphone Security Mechanisms. 8th IEEE International Conference on Networked Computing and Advanced Information Management (NCM 2012). April, 2012. Seoul, Korea.
  7. Tamleek Ali, Nauman, M and Xinwen Zhang. On Leveraging Stochastic Models for Remote Attestation. 2nd International Conference on Trusted Systems (InTrust2010). December 2010. Beijing, China.
  8. Nauman, M., Sohail Khan, Xinwen Zhang and Jean-Pierre Seifert. Beyond Kernel-level Integrity Measurement: Enabling Remote Attestation for the Android Platform. 3rd International Conference on Trust and Trustworthy Computing (Trust 2010). June, 2010. Berlin, Germany.
  9. Alam, M., Zhang, X., Nauman, M , Khan, S., Alam, Q. MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services. 6th World Congress on Services, SERVICES 2010. July 2010. Florida, USA.
  10. Nauman, M. and Ali, T. TOKEN: Trustable Keystroke-based Authentication for Web-based Applications on Smartphones. International Workshop on Wireless and Network Security (WSN’10) in conjunction with International Conference on Information Security and Assurance (ISA’10). June, 2010. Miyazaki, Japan.
  11. Tamleek Ali, Nauman, M. Fazl-e-Hadi, Fahad bin Muhaya. On Usage Control of Multimedia Content in and through Cloud Computing Paradigm. 5th International Conference on Future Information Technology (FutureTech2010).  May 2010. Busan, Korea.
  12. Tamleek Ali, Nauman, M., Muhammad Amin, Masoom Alam. Scalable, Privacy-preserving Remote Attestation in and through Federated Identity Management Frameworks. International Conference on Information Science and Applications (ICISA 2010). April 2010. Seoul, Korea.
  13. Nauman, M., Sohail Khan and Xinwen Zhang. Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints.(Full version) 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS2010). April 2010. Beijing, China.
  14. Tamleek Ali, Nauman, M. and Masoom Alam. Scalable, Privacy-preserving Remote Attestation. International Conference on Trusted Systems (Intrust09). December 2009. Beijing, China.
  15. Imran Khan, Nauman, M., Masoom Alam and Furqan Aziz. SAuthMash: Mobile Agent based Self Authorization in MashupsInternational ACM Conference on Frontiers of Information Technology  (FIT’09). 2009. ACM. Abottabad, Pakistan.
  16. Shahbaz Khan, Sanullah Khan, Nauman, M., Tamleek Ali and Masoom Alam. Realizing Dynamic Behavior Attestation for Mobile.  International ACM Conference on Frontiers of Information Technology  (FIT’09). 2009. ACM. Abottabad, Pakistan.
  17. Ronald Toegl, Thomas Winkler, Nauman, M. and Theordore Hong. Towards Platform Independent Trusted Computing. Proceedings of the Fourth Annual Workshop on Scalable Trusted Computing (STC’09) at the 16th International ACM Conference on Computers and Communication Security (CCS’09). 2009. ACM. Chicago, Illinois, USA.
  18. Tamleek Ali and Nauman, M. Incorporating Remote Attestation for End-to-End Protection in Web Communications Paradigm. International Conference on Internet Technologies and Applications (ITA’09). September 2009. Wrexham, UK.
  19. Masoom Alam, Nauman, M., Xinwen Zhang, Tamleek Ali and Patrick Hung. Behavioral Attestation for Business Processes (BA4BP). 7th IEEE International Conference on Web Services (ICWS’09). IEEE. July, 2009. Los Angeles, USA.
  20. Nauman, M., Masoom Alam, Xinwen Zhang and Tamleek Ali. Remote Attestation of Information Flows and Attribute Updates in a UCON System. 2nd International Conference on Techncial and Socio-Economic Aspects of Trusted Computing (Trust2009). Springer. April, 2009. Oxford, UK. [PPTX] Talk Sponsored by the ICT R&D Fund, Pakistan.
  21. Nauman M. and Tamleek Ali. HUE: A Hardware UCON Engine for Fine-grained, Continuous Usage Control. 12th International IEEE Multitopic Conference (INMIC 2008). December, 2008. Karachi, Pakistan.
  22. Masoom Alam, Xinwen Zhang, Nauman, M., and Tamleek Ali. Behavioral Attestation for Web Services (BA4WS). In Proceedings of International Workshop on Secure Web Services (SWS’08.) at the 15th International ACM Conference on Computers and Communication Security (CCS’08). 2008. ACM. Fairfax, Virginia, USA.
  23. Nauman, M., Khan, S., Amin, M. and Hussain, F. Resolving Lexical Ambiguities in Folksonomy Based Search Systems through Common Sense and Personalization. in Proceedings of the Semantic Search 2008 Workshop. (SemSearch 2008): located at the 5th European Semantic Web Conference (ESWC2008), Tenerife, Spain.
  24. Masoom Alam, Zhang, X., Nauman, M., Ali, T., and Seifert, J. Model-based Behavioral Attestation. In Proceedings of the 13th ACM Symposium on Access Control Models and Technologies. SACMAT ‘08. ACM, New York, NY, 175-184. Estes Park, CO, USA.
  25. Khan S., Amin, M and Nauman, M. A Comprehensive Analysis of MAC Enhancements for Leveraging Distributed MAC. In Proceedings of the International MultiConference of Engineers and Computer Scientists (IMECS 08), Hong Kong.
  26. Ali, T. Nauman, M. and Alam M. An Accessible Formal Specification of UML and OCL Meta-Model in Isabelle/HOL. In Proceedings of the International Multitopic Conference 2007 (INMIC’07). Lahore, Pakistan.
    [Isabelle Theory File]
  27. Nauman, M. and Khan, S.  Using PersonalizedWeb Search for Enhancing Common Sense and Folksonomy Based Intelligent Search Systems. In Proceedings of the IEEE/WIC/ACM international Conference on Web intelligence (November 02 – 05, 2007). Web Intelligence. IEEE Computer Society, Washington, DC, 423-426. Silicon Valley, USA.
    Sponsored by the Higher Education Commission of Pakistan.
  28. Nauman, M. and Hussain, F. “Common Sense and Folksonomy: Engineering an Intelligent Search System,” in Proceedings of ICIET’07: International Conference on Information and Emerging Technologies. ICET. IEEE. Karachi, Pakistan. 2007.
    [PPT | IEEE Link]
  29. Nauman, M. and Uzair, M. 2007. SE and CS Collaboration: Training Students for Engineering Large, Complex Systems. In Proceedings of the 20th Conference on Software Engineering Education & Training (July 03 – 05, 2007). CSEET. IEEE Computer Society. Dublin, Ireland.
    Talk sponsored by the CSEE&T and Dublin City University, Ireland.
    [PPT | IEEE DOI]

Countries Visited

  1. Ireland. For presenting a paper in CSE&T 2007. April 2007
  2. United Kingdom. For presenting a paper in Trust 2009. April 2009
  3. United States. For presenting a paper in STC09 at CCS09. November 2009
  4. Malaysia. For PhD studies and presenting papers at conferences. 2011-2014.
  5. Germany. For visiting Saarland University, Sarbrücken. Sponsored by CISPA. March 2015.
  6. Spain. As a visiting scholar to the Machine Learning Summer School. Supported by the Max Planck Institute for Software Systems, Germany. May 2016.