Publications
2024
- [PDF] [Source] M. A. Ayub and S. Majumdar, “Embedding-based classifiers can detect prompt injection attacks,” Conference on Applied Machine Learning for Information Security (CAMLIS), October 24–25, 2024, Arlington, VA, USA.
2023
[PDF] M. A. Ayub, A. Siraj, B. Filar, and M. Gupta, “RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware,” International Journal of Information Security (2023), pp. 1-24.
[PDF] [Source] M. A. Ayub, A. Siraj, B. Filar, and M. Gupta, “Static-RWArmor: A Static Analysis Approach for Prevention of Cryptographic Windows Ransomware,” 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Exeter, UK, 2023, pp. 1681-1688.
[PDF] M. A. Ayub and A. Siraj, “Understanding the Behavior of Ransomware: An I/O Request Packet (IRP) Driven Study on Ransomware Detection against Execution Time,” 2023 IEEE 9th International Conference on Collaboration and Internet Computing (CIC), Atlanta, GA, USA, 2023, pp. 62–71.
2021
[PDF] [Source] M. A. Ayub and A. Siraj, “Similarity Analysis of Ransomware based on Portable Executable (PE) File Metadata,” 2021 IEEE Symposium Series on Computational Intelligence (SSCI), Orlando, FL, USA, 2021.
[PDF] M. A. Ayub, S. Smith, A. Siraj, and P. Tinker, “Domain Generating Algorithm based Malicious Domains Detection,” 2021 8th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2021 7th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), Washington DC, USA, 2021, pp. 77–82.
2020
[PDF] [Source] M. A. Ayub, A. Continella, and A. Siraj, “An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network,” 2020 IEEE International Conference on Information Reuse and Integration (IRI), Las Vegas, NV, USA, 2020, pp. 319-324.
[PDF] M. A. Ayub, W. A. Johnson, D. A. Talbert, and A. Siraj, “Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning,” 2020 54th Annual Conference on Information Sciences and Systems (CISS), Princeton, NJ, USA, 2020, pp. 1-6.
2019
[PDF] [Source] M. A. Ayub, Z. A. Onik, and S. Smith, “Parallelized RSA Algorithm: An Analysis with Performance Evaluation using OpenMP Library in High Performance Computing Environment,” 2019 22nd International Conference on Computer and Information Technology (ICCIT), Dhaka, Bangladesh, 2019, pp. 1-6.
[PDF] [Source] M. A. Ayub, S. Smith, and A. Siraj, “A Protocol Independent Approach in Network Covert Channel Detection,” 2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), New York, NY, USA, 2019, pp. 165-170.
2017
- [PDF] M. A. Ayub, K. A. Kalpoma, H. T. Proma, S. M. Kabir and R. I. H. Chowdhury, “Exhaustive study of essential constraint satisfaction problem techniques based on N-Queens problem,” 2017 20th International Conference of Computer and Information Technology (ICCIT), Dhaka, 2017, pp. 1-6.