Hassan Asghar
Dr. Hassan Asghar
Research Scientist,
Information Security and Privacy Group
Software and Computational Systems Program
Data61-CSIRO
Contact
email: first{dot}last{@}data61{dot}csiro{dot}au
phone: +61 2 9490 xxxx
News
- Our paper “Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning” has been accepted at PETS 2017. Well done Ikram!
- Our paper “SplitBox: Toward Efficient Private Network Function Virtualization” has been accepted at Hotmiddlebox 2016.
Short Bio
I received my BE degree in computer software engineering from National University of Sciences and Technology (NUST), Pakistan. My final year project was on the design and evaluation of a desktop search utility, predominantly related to information retrieval. I received my ME degree in computer engineering from Kyunghee University, South Korea. I initially started my research in the area of computational trust. At the same time, I started working on human identification protocols. Roughly, these are cryptographic identification protocols in which the entity claiming an identity is a human user. Such protocols need to be usable while secure against powerful adversaries. I did my PhD in cryptography from Macquarie University, Australia. My thesis was in the design and analysis of human identification protocols. During my postdoc at Macquarie University, I also started work on secure multiparty computation. After joining Data61, CSIRO, I have been involved in several topics in cryptography, information security and privacy.
Projects
- Observation Resistant Human Authentication Systems (ORHAS)
- Private Real-time Processing of Outsourced Functions
- Privacy-Preserving Access to User Data
- Secure Identification Protocols
Current Activities
- I am involved in the University of Surrey and Singapore Management University’s COMMANDO-HUMANS project together with Dali Kaafar. The project explores whether human behaviour related insecurity can be detected automatically by applying human cognitive models to model and simulate humans involved in security systems.
Publications
Journals
- On the Linearization of Human Identification Protocols: Attacks based on Linear Algebra, Coding Theory and Lattices
Hassan Asghar, Ron Steinfeld, Shujun Li, Dali Kaafar, Josef Pieprzyk.
IEEE Transactions on Information Forensics and Security, vol. 10, no, 8, pp. 1643-1655, April, 2015. - A Subexponential Construction of Graph Coloring for Multiparty Computation
Hassan Asghar, Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld.
Journal of Mathematical Cryptology, vol. 8, no. 4, pp. 363-403, December, 2014. - On the Hardness of the Sum of k Mins Problem
Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang.
The Computer Journal, vol. 54, no. 10, pp. 1652-1660, 2011. - Cryptanalysis of the Convex Hull Click Human Identification Protocol
Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang.
International Journal of Information Security, vol. 12, no. 2, pp. 83-96, April 2013. - Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks
Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d’Auriol, Heejo Lee, Sungyoung Lee, Young-Jae Song.
IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 11, pp. 1698-1712, 2009.
Conferences
- Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning
Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Balachander Krishnamurthy, Anirban Mahanti
Accepted at PETS 2017. - SplitBox: Toward Efficient Private Network Function Virtualization
Hassan Jameel Asghar, Luca Melis, Cyril Soldani, Emiliano De Cristofaro, Mohamed Ali Kâafar, Laurent Mathy
HotMIddlebox 2016: 1-7. - Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case
Jagmohan Chauhan, Hassan Jameel Asghar, Anirban Mahanti, Mohamed Ali Kaafar
ACNS 2016: 648-665 - Private Processing of Outsourced Network Functions: Feasibility and Constructions
Luca Melis, Hassan Jameel Asghar, Emiliano De Cristofaro, Mohamed Ali Kaafar
SDN-NFV@CODASPY 2016: 39-44 - Mobility Independent Secret Key Generation for Wearable Health-care Devices
Girish Revadigar, Chitra Javali, Hassan Jameel Asghar, Kasper Bonne Rasmussen, Sanjay Jha
10th EAI International Conference on Body Area Networks, accepted, 2015. - iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel
Girish Revadigar, Chitra Javali, Hassan Asghar, Kasper B. Rasmussen, Sanjay Jha
Poster Presentation. 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), Singapore, April, 2015. - On the Intrusiveness of JavaScript on the Web
Muhammad Ikram, Hassan Asghar, Dali Kaafar, Anirban Mahanti. ACM CoNext, Sydney, 2014. - Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks
Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pieprzyk.
The 20th Annual Network and Distributed System Security Symposium (NDSS 2013), 2013. - A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm
Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang.
The 8th International Conference on Applied Cryptography and Network Security (ACNS 2010), pp. 349-366, 2010. - Cryptanalysis of the Convex Hull Click Human Identification Protocol
Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang.
The 13th Information Security Conference (ISC 2010), pp. 24-30, 2010. - On the Security of PAS (Predicate-based Authentication Service)
Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang.
The 25th Annual Computer Security Applications Conference (ACSAC 2009), pp. 209-218, 2009. - Image-Feature Based Human Identification Protocols on Limited Display Devices
Hassan Jameel, Riaz Ahmed Shaikh, Le Xuan Hung, Yuan Wei Wei, Syed Muhammad Khaliq-ur-rehman Raazi, Ngo Trong Canh, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes.
The 9th International Workshop on Information Security Applications (WISA 2008), pp. 211-224, 2008. - Human Identification Through Image Evaluation Using Secret Predicates
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungyoung Lee.
The Cryptographers’ Track at the RSA Conference 2007 (CT-RSA 2007), pp. 67-84, 2007. - A Trust Model for Ubiquitous Systems based on Vectors of Trust Values
Hassan Jameel, Le Xuan Hung, Umar Kalim, Ali Sajjad, Sungyoung Lee, Young-Koo Lee.
The 7th IEEE International Symposium on Multimedia (ISM 2005), pp. 674-679, 2005.
E-prints
- When are Identification Protocols with Sparse Challenges Safe? The Case of the Coskun and Herley Attack
Hassan Jameel Asghar and Mohamed Ali Kaafar
Submitted, 2016.
PhD Thesis
- Design and Analysis of Human Identification Protocols
Hassan Jameel Asghar
PhD Thesis. Macquarie University, 2012.