Profession

I am a postdoctoral Research Associate at the Northeastern University, working with Dr. Long Lu. I was so lucky to had a chance to work with great advisors such as Prof. Giorgio Giacinto, Dr. Lorenzo Cavallaro, Dr. Johannes Kinder during my Ph.D., and Dr. Ashkan Sami during my Master.

Nationality

I'm originally from a small village, Davan in Fars, Iran, but I lived for many years in the beautiful city of Shiraz.

Research interests

I am interested in Computer security, Android security, Malware, Data mining, Machine Learning and Computational Linguistics.

Contact

EMail: m.[My Lastname]@northeastern.edu
Skype: Mansour-Ahmadi

2018

[18] Microsoft Malware Classification Challenge [PDF] [Challenge Website]
Royi Ronen, Marian Radu, Corina Feuerstein, Elad Yom-Tov, Mansour Ahmadi
arXiv, February

[17] IntelliAV: Building an Effective On-Device Android Malware Detector [PDF] [Official Website]
Mansour Ahmadi, Angelo Sotgiu, Giorgio Giacinto
arXiv, February

2017

[16] IntelliAV: Toward the Feasibility of Building Intelligent Anti-Malware on Android Devices [PDF] [Official Website] [Online] [Slides]
Mansour Ahmadi, Angelo Sotgiu, Giorgio Giacinto
International Cross Domain Conference for Machine Learning & Knowledge Extraction (CD-MAKE), Springer, Italy, September

[15] Modeling Neglected Functions of Android Applications to Effectively Detect Malware [PDF]
Mansour Ahmadi
PhD Thesis, University of Cagliari, Italy, April

[14] DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware [PDF] [Online] [Slides] Guillermo Suarez-Tangil, Santanu Kumar Dash, Mansour Ahmadi, Johannes Kinder, Giorgio Giacinto, and Lorenzo Cavallaro
Data and Application Security and Privacy (CODASPY), ACM, USA, March (AR=16%)

2016

[13] Detecting Misuse of Google Cloud Messaging in Android Badware [PDF] [Online] [Slides]
Mansour Ahmadi, Battista Biggio, Steven Arzt, Davide Ariu, Giorgio Giacinto
Security and Privacy in Smartphones and Mobile Devices (SPSM), in conjunction with the CCS, ACM, Vienna, Asuria, October (AR=42%)

[12] DROIDSCRIBE: Classifying Android Malware based on Runtime Behavior [PDF] [Online] [Slides]
Santanu Kumar Dash, Guillermo Suarez-Tangil, Salahuddin Khan, Kimberly Tam, Mansour Ahmadi, Johannes Kinder and Lorenzo Cavallaro, May, Mobile Security Technologies (MoST), in conjunction with the S&P, IEEE, San Jose, CA, USA (AR=28%)

[11] Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification [PDF] [Online] [Slides]
Mansour Ahmadi, Dmitry Ulyanov, Stanislav Semenov and Mikhail Trofimov, Giorgio Giacinto, March, 6th Conference on Data and Applications Security and Privacy (CODASPY), ACM, New Orleans, USA (AR=19%)

2015

[10] Clustering Android Malware Families by Http Traffic [PDF] [Online] [Slides]
Marco Aresu, Davide Ariu, Mansour Ahmadi, Davide Maiorca and Giorgio Giacinto, October, 10th International Conference on Malicious and Unwanted Software (MALCON), IEEE, Puerto Rico, USA (AR=28%)

[9] DLLMiner: structural mining for malware detection [PDF] Extended version of #4, #8, [Online]
Masoud Narouei, Mansour Ahmadi, Giorgio Giacinto, Hassan Takabi, Ashkan Sami, April, security and communication networks, Wiley (SJR=Q2)

2014

[8] Structural Mining for Malware Detection [#9 for PDF] [Online]
Masoud Narouei, Mansour Ahmadi, Hassan Takabi, Giorgio Giacinto, December, 31st Annual Computer Security Applications Conference (ACSAC), USA (Poster)

2013

[7] SePaS: Word Sense Disambiguation by Sequential Patterns in Sentences [PDF], [Online]
Masoud Narouei, Mansour Ahmadi, Ashkan Sami, September, Journal of Natural Language Engineering, Cambridge university press, UK (SJR=Q1)

[6] Malware Detection by Behavioral Sequential patterns [PDF] Extended version of #2, [Online]
Mansour Ahmadi, Ashkan Sami, Hossein Rahimi, Babak Yadegari, Augest, Computer fraud & Security, Volume 2013 Issue 8, Pages: 11-19, Elsevier, Netherlands (SJR=Q3)

2012

[5] A Novel Approach toward Spam Detection Based on Iterative Patterns [PDF] [Online]
Mohammad Razmara, Babak Asadi, Masoud Narouei, Mansour Ahmadi, October, 2nd International eConference on Computer and Knowledge Engineering , Pages: 318-323, IEEE, Mashhad, Iran

[4] Mining Modules’ Dependencies for Malware Detection [Slides] 3rd Paper award [Online]
Masoud Narouei, Mansour Ahmadi, Ashkan Sami, March, Kaspersky Lab Asia Pacific & MEA Cup, Hong Kong

[3] Semantic Malware Detection by Deploying Graph Mining [PDF] [Online]
Fatemeh Karbalaie, Ashkan Sami, Mansour Ahmadi, January, International Journal of Computer Science Issues, Volume 9 Issue 1, Pages: 373-379, Mauritius

2011

[2] Iterative System Call Patterns Blow the Malware Cover [#6 for PDF] [Slides] 1st Paper award [Online]
Mansour Ahmadi, Ashkan Sami, Hossein Rahimi, Babak Yadegari, March, Kaspersky Lab Asia Pacific & MEA Cup, Malaysia (AR=16%)

[1] A Novel Classification Method by SAW [PDF]
Mansour Ahmadi, Peyman Gholami, March, 16th conference of Computer Society of Iran, Tehran, Iran