@ Konya
More Pictures
Shahid Alam
EMAIL
Computer Science Department
University of Victoria
Victoria, BC


    Research Interests   |   Academics   |   Resume/CV   |   Projects   |   Publications  |   Personal  |   Scratchpad  |   Links  |   Volunteer   

Research Interests

Academics
Publications [ DBLP ] [ Google Scholar ]
  • Journal ( SCI and ESCI )
    • Shahid Alam, Zhengyang Qu, Ryan Riley, Yan Chen and Vaibhav Rastogi. DroidNative: Automating and optimizing detection of Android native code malware variants. Computers and Security, Elsevier 65: 230-246 (SCI, SJR 7 year cites per doc. 2.68), 2016 [ doi ] [ pdf, personal copy ].

    • Shahid Alam, R. Nigel Horspool, Issa Traore and Ibrahim Sogukpinar. A Framework for Metamorphic Malware Analysis and Real-Time Detection. Computers and Security, Elsevier 48: 212-233 (SCI, SJR 7 year cites per doc. 2.68), 2015 [ doi ] [ pdf, personal copy ].

    • Shahid Alam and R. Nigel Horspool. A Survey: Software-Managed On-Chip Memories. Journal of Computing and Informatics 34(5): 1168-1200 (SCI, SJR 7 year cites per doc. 0.6), 2015 [ dblp ] [ pdf, personal copy ].

    • Shahid Alam, Ibrahim Sogukpinar, Issa Traore and R. Nigel Horspool. Sliding Window and Control Flow Weight for Metamorphic Malware Detection. Journal in Computer Virology and Hacking Techniques, Springer Computer Science 11(2): 75-88 (ESCI, SJR 7 year cites per doc. 1.66), 2014 [ doi ] [ pdf, personal copy ].

    • Shahid Alam, Issa Traore and Ibrahim Sogukpinar. Annotated Control Flow Graph for Metamorphic Malware Detection. The Computer Journal - Section D: Security in Computer Systems and Networks 58(10): 2608-2621 (SCI, SJR 7 year cites per doc. 1.38), 2014 [ doi ] [ pdf, personal copy ].

    • Shahid Alam and LillAnne Jackson. A Case Study: Are Traditional Face-To-Face Lectures Still Relevant When Teaching Engineering Courses. International Journal of Engineering Pedagogy (iJEP), pages 9-15, Volume 3, Special Issue 4: "TALE2013", (ESCI), 2013 [ doi ] [ pdf, personal copy ].
      This is an extended version of the IEEE TALE 2013 conference paper.

  • Journal ( Others )

    • Shahid Alam. Is Fortran Still Relevant? Comparing Fortran With Java And C++. International Journal of Software Engineering & Applications, pages 25-45, Volume 5, No 3, 2014 [ arXiv:1407.2190 ] [ pdf ] [ the technical report with more details: pdf ].

    • Shahid Alam. CAL: Using constraints with action language for model evolution. International Journal of Software Engineering, pages 1-8, Volume 2, Issue 1, 2013 [ doi ] [ pdf ] [ CAL ].

  • Conference

    • Shahid Alam, Ryan Riley, Ibrahim Sogukpinar, and Necmeddin Carkaci. DroidClone: Detecting Android Malware Variants by Exposing Code Clones. The Sixth International Conference on Digital Information & Communication Technology & its Applications (DICTAP2016), July, 2016. Konya, Turkey, IEEE [ pdf © IEEE ].
    • Shahid Alam. SUIS: An Online Graphical Signature-Based User Identification System. The Sixth International Conference on Digital Information & Communication Technology & its Applications (DICTAP2016), July, 2016. Konya, Turkey, IEEE [ pdf © IEEE ].
    • Shahid Alam, Ibrahim Sogukpinar, Issa Traore and Yvonne Coady. In-Cloud Malware Anlaysis and Detection: State of the Art. The Seventh ACM International Conference on Security of Information and Networks (SIN 2014), September, 2014. Glasgow, UK [ pdf ].
    • Shahid Alam, Issa Traore and Ibrahim Sogukpinar. Current Trends and the Future of Metamorphic Malware Detection. The Seventh ACM International Conference on Security of Information and Networks (SIN 2014), September, 2014. Glasgow, UK [ pdf ].
    • Shahid Alam, R. Nigel Horspool and Issa Traore. MARD: A Framework for Metamorphic Malware Analysis and Real-Time Detection. In Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, Research Track - Security and Privacy (AINA 2014 - 26% acceptance rate), May, 2014. Washington DC, USA, IEEE Computer Society [ pdf © IEEE ].
    • Shahid Alam, R. Nigel Horspool and Issa Traore. MAIL: Malware Analysis Intermediate Language - A Step Towards Automating and Optimizing Malware Detection. In Proceedings of the Sixth ACM International Conference on Security of Information and Networks (SIN 2013 - 27% acceptance rate), November, 2013. New York, USA, ACM SIGSAC [ pdf ].
    • Shahid Alam and LillAnne Jackson. A Case Study: Are Traditional Face-To-Face Lectures Still Relevant When Teaching Engineering Courses. In Proceedings of the IEEE International Conference on Teaching, Assessment and Learning for Engineering (TALE 2013), Bali, Indonesia, August, 2013 [ pdf ].
    • Samuel A. Ajila and Shahid Alam. E-CAL: A formal language for software model evolution. In Proceedings of the 12th IEEE International Conference on Information Reuse and Integration (IRI 2011), NV, USA, pages 212-217, 3-5 August 2011 [ doi ].
    • Shahid Alam and R. Nigel Horspool. Current trends and the future of software-managed on-chip memories in modern processors. In Proceedings of the 2010 International Conference on High Performance Computing Systems (HPCS 2010), Orlando, FL, USA, pages 63-70, 12-14 July 2010 [ pdf ].
    • Samuel A. Ajila and Shahid Alam. Using a formal language constructs for software model evolution. In Proceedings of the 3rd IEEE International Conference on Semantic Computing (ICSC 2009), Berkeley, CA, USA, pages 390-395, 14-16 September 2009 [ pdf ].
    • Shahid Alam and Samuel A. Ajila. Using constraints with action language for model evolution. In Proceedings of the 2007 International Conference on Software Engineering Research & Practice (SERP 2007), Volume II, NV, USA, pages 553-559, June 25-28, 2007 [ pdf ].

  • PhD Thesis
    • A Framework for Metamorphic Malware Analysis and Real-Time Detection, PhD Thesis, Department of Computer Science, College of Engineering, University of Victoria, Victoria, BC, Canada, 2014 [ @ UVicSpace ] [ pdf ].
  • MASc Thesis
    • Automating software evolution: towards using constraints with action for model evolution, MASc Thesis, Department of Systems and Computer Engineering, Carleton University, Ottawa, ON, Canada, 2007 [ pdf ].

  • Non-refereed
    • Shahid Alam. SUIS: An Online Graphical Signature-Based User Identification System, June 2016. [ arXiv:1605.09034 ] [ pdf ].
    • Shahid Alam. MAIL: Malware Analysis Intermediate Language. Technical Report, College of Engineering, University of Victoria, BC, Canada, December, 2013 [ pdf ].
    • Shahid Alam. Design of a Basic Ray Tracer for a Comparative Study of Fortran, C++ and Java. Department of Computer Science, University of Victoria, BC, Canada, May 2011 [ pdf ].
    • Shahid Alam and Misbah Islam. genVHDL: Automatic HDL Code Generation from high-level XML based Hardware Specifications, Technical Report OCIECE-07-01, Ottawa-Carleton Institute of Electrical and Computer Engineering, Ottawa, ON, Canada, January 2007 [ pdf ].
    • Shahid Alam. A language to model animation out of behavior-embedded graphical components, Paper review for the course "Computer Animation", University of Ottawa, ON, Canada, April 2006 [ pdf ].

Other Professional Services
  • Technical Program Committee Member: WMA 2017 - The 2nd International Workshop on Malware Analysis to be held in conjunction with the 12th International Conference on Availability, Reliability and Security (ARES 2017 http://www.ares-conference.eu).
  • Reviewer: Turkish Journal of Electrical Engineering and Computer Sciences.
  • Reviewer: International Journal of Network Security.
  • Reviewer: IEEE Transactions on Information Forensics and Security
  • Reviewer: Journal of Computing and Informatics.
  • Reviewer: Journal of Computational Methods in Sciences and Engineering (JCMSE) of IOS Press.
  • Reviewer: Computer Networks, Elsevier
  • Reviewer: International Journal of Information Security Science.
  • Technical Program Committee Member: WMA 2016 - The 1st International Workshop on Malware Analysis to be held in conjunction with the 11th International Conference on Availability, Reliability and Security (ARES 2016 http://www.ares-conference.eu).
  • Reviewer: 21st IEEE Symposium on Computers and Communication (ISCC), Messina, Italy, 2016.
  • Reviewer: The Computer Science Journal, 2014.
  • Reviewer: Wiley Journal of Security and Communication Networks, 2014.
  • Reviewer: ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2014.
  • Reviewer: International Journal of Software Engineering and Knowledge Engineering, 2012.
  • TAC (Teaching assistant consultant) University of Victoria, Canada [ TAs Corner ] - What international TAs should expect that first day, a 2 hours workshop [ slides ], Fall 2012.
  • Reviewer: Lecture Notes in Computer Science / Programming and Software Engineering: Software Composition © Springer-Verlag Berlin Heidelberg Germany, 2008.
Projects
  • DroidNative (Android Native Code Malware Analysis and Detection) (2015)
  • MARD (Metamorphic Malware Analysis and Real-Time Detection) (2014)
  • MAIL (Malware Analysis Intermediate Language) (2013)
  • A Basic Ray Tracer (2011)
  • Flying Blimp (2008)
  • Games (2008)
  • CAL (Constraints with Action Language) (2007)
  • genVHDL Automatic HDL code generation from high-level XML based hardware specifications (2006)
  • FPU (Floating point unit) core in VHDL (2005)
  • Simulator Real-Time Multitasking Kernel Simulation (2001)
  • Others
Awards, Grants and Assistantships
  • Graduate Student Travel Grant for SIN 2013, University of Victoria.
  • Graduate Research Grant, 2011-2012, University of Victoria.
  • Graduate Research Grant, 2008-2009, University of Victoria.
  • Graduate Research Grant, 2007-2008, University of Victoria.
  • Graduate Research Grant, 1998-1999, Wayne State University.
  • Graduate Professional Scholarship, 1998-1999, Wayne State University.
Links

Sufi Comics
Baba Farid
Bulleh Shah
Rumi of Kashmir


C Library Reference Guide
Learn C/C++
Assembly Language Resources
Java Technology
Java Tutorial
embedded.com
eg3.com
Dr. Dobb's Journal
Real-time CORBA with TAO
Code Generation Network
Model Driven Architecture
UML
Mathematical Symbols


Last updated April 27, 2016
My Schedule