Note: The papers listed here ensure timely dissemination of scholarly and technical work. Personal and educational uses of these documents are permitted. However, explicit permission must be obtained for any other usage. Copyright and all rights therein are retained by authors and/or by other copyright holders, and these works may not be reposted without the explicit permission of the authors/copyright holders.
2024
Conference
[C15]
[C15]
NordSec'24
M. Hamad, A. Finkenzeller, M. Hasan, M. Pahl, and S. Steinhorst,
A gamified learning approach for IoT security education using capture-the-flag competitions: Architecture and insights,in Proc. of Nordic Conference on Secure IT Systems (NordSec), Nov. 2024. [PDF]
Conference
[C14]
[C14]
ECRTS'24
M. Babar and M. Hasan,
DeepTrustRT: Confidential deep neural inference meets real-time!,in Proc. of Euromicro Conference on Real-Time Systems (ECRTS), Leibniz International Proceedings in Informatics (LIPIcs), vol. 298, pp. 13:1-13:24, Jul. 2024. [PDF]
Conference
[C13]
[C13]
ISORC'24
M. Babar and M. Hasan,
A New covert channel in fixed-priority real-time multiframe tasks,in Proc. of International Symposium on Real-Time Distributed Computing (ISORC), pp 1–6, May 2024. [PDF]
Conference
[C12]
[C12]
ISORC'24
Z. Hammadeh, M. Hasan, and M. Hamad,
Securing real-time systems using schedule reconfiguration,in Proc. of International Symposium on Real-Time Distributed Computing (ISORC), pp 1–10, May 2024. [PDF]
Journal
[J11]
[J11]
CSUR'24
M. Hasan, A. Kashinath, C. Chen, and S. Mohan,
SoK: Security in real-time systems,ACM Computing Surveys, vol. 56, no. 9, pp 1–31, Apr. 2024. [PDF]
Conference
[C11]
[C11]
ICPE'24
S. Sarkar, M. Babar, M. Hassan, M. Hasan, and S. Kanti,
Processing natural language on embedded devices: How well do Transformer models perform?,in Proc. of ACM/SPEC International Conference on Performance Engineering (ICPE), pp. 211-222, May 2024. [PDF]
2023
Journal
[J10]
[J10]
TOPS'23
A. Bansal, A. Kandikuppa, M. Hasan, C. Chen, A. Bates, and S. Mohan,
System auditing for real-time systems,ACM Transactions on Privacy and Security, vol. 26, no. 4, pp 1–37, Nov. 2023. [PDF]
Journal
[J9]
[J9]
Access'23
M. Babar and M. Hasan,
Trusted deep neural execution — A survey,IEEE Access, vol. 11, pp. 45736-45748, May 2023. [PDF]
Conference
[C10]
[C10]
ISORC'23
M. Hasan and S. Mohan,
You can't always check what you wanted: selective checking and trusted execution to prevent false actuations in real-time Internet-of-things,in Proc. of International Symposium on Real-Time Distributed Computing (ISORC), pp. 42–53, May 2023. [PDF] [Extended Version]
2022
Workshop
[W11]
[W11]
CPSIoTSec'22
M. Babar and M. Hasan,
Real-time scheduling of TrustZone-enabled DNN workloads,in Proc. of ACM Joint Workshop on CPS & IoT Security and Privacy (CPSIoTSec), pp. 63–69, Nov. 2022. [PDF]
Workshop
[W10]
[W10]
CPSIoTSec'22
V. Banerjee, S. Hounsinou, H. Olufowobi, M. Hasan, and G. Bloom,
Secure reboots for real-time cyber-physical systems,in Proc. of ACM Joint Workshop on CPS & IoT Security and Privacy (CPSIoTSec), pp. 27–33, Nov. 2022. [PDF]
Conference
[C9]
[C9]
ESORICS'22
A. Bansal, A. Kandikuppa, C. Chen, M. Hasan, A. Bates, and S. Mohan,
Towards efficient auditing for real-time systems,in Proc. of European Symposium on Research in Computer Security (ESORICS), pp. 614–634, Sep. 2022. [PDF]
Journal
[J8]
[J8]
TCPS'22
M. Hasan, S. Mohan, R. Bobba, and R. Pellizzoni,
Beyond just safety: Delay-aware security monitoring for real-time control systems,ACM Transactions on Cyber-Physical Systems, vol. 6, no. 3, pp 1–25, Jul. 2022. [PDF]
Workshop
[W9]
[W9]
RTAS/BP'22
M. Aguida and M. Hasan,
Work-in-Progress: Exploring schedule-based side-channels in TrustZone-enabled real-time systems,in Proc. of IEEE Real-Time and Embedded Technology and Applications Symposium, (RTAS), Brief Presentations (BP) track, pp. 301-304, May 2022. [PDF]
2021
Workshop
[W8]
[W8]
RTSS/BP'21
S. Hounsinou, V. Banerjee, C. Peng, M. Hasan, and G. Bloom,
Work-in-Progress: Enabling secure boot for real-time restart-based cyber-physical systems,in Proc. of IEEE Real-Time Systems Symposium (RTSS), Brief Presentations (BP) track, pp. 524-527, Dec. 2021. [PDF]
Conference
[C8]
[C8]
INFOCOM'21
A. Kashinath, M. Hasan, R. Kumar, S. Mohan, R. Bobba, and S. Padhy,
Safety critical networks using commodity SDNs,in Proc. of IEEE International Conference on Computer Communications (INFOCOM), pp. 1-10, May 2021. [PDF]
2020
Workshop
[W7]
[W7]
SecSDN'20
A. Kashinath, M. Hasan, S. Mohan, R. Bobba, and R. Mittal,
Improving dependability via deadline guarantees in commodity real-time networks,in Proc. of IEEE GLOBECOM Workshop on Secure and Dependable Software-defined Networking for Sustainable Smart Communities (SecSDN), pp. 1-6, Dec. 2020. [PDF]
US Patent
[P1]
[P1]
G. Ciocarlie, I. Agadakos, C. Chen, M. Campanelli, P. Anantharaman, M. Hasan, U. Lindqvist, M. Locasto, B. Copos, T. Lepoint, and M. Filippone,
Modeling cyber-physical attack paths in the Internet-of-things,U.S. Patent Application No. 16/634,591, May 2020. [PDF]
Journal
[J7]
[J7]
TIV'20
M. Hasan, S. Mohan, T. Shimizu, and H. Lu,
Securing vehicle-to-everything (V2X) communication platforms,IEEE Transactions on Intelligent Vehicles, vol. 5, no. 4, pp. 693-713, Dec. 2020. [PDF]
Conference
[C7]
[C7]
DATE'20
M. Hasan, S. Mohan, R. Pellizzoni, and R. B. Bobba,
Period adaptation for continuous security monitoring in multicore systems,in Proc. of Design, Automation and Test in Europe (DATE), pp. 430-435, Mar. 2020. [PDF] [Extended Version]
2019
Workshop
[W6]
[W6]
IoTS&P'19
M. Hasan and S. Mohan,
Protecting actuators in safety-critical IoT systems from control spoofing attacks,in Proc. of ACM Workshop on the Internet of Things Security and Privacy (IoT S&P), pp. 8-14, Nov. 2019. [PDF]
Journal
[J6]
[J6]
IoT'19
F. Abdi, C. Chen, M. Hasan, S. Liu, S. Mohan, and M. Caccamo,
Preserving physical safety under cyber attacks,IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6285-6300, Aug. 2019. [PDF]
2018
Journal
[J5]
[J5]
Sensors'18
C. Chen, M. Hasan, and S. Mohan,
Securing real-time Internet-of-things,Sensors, vol. 18, no. 12, Dec. 2018. [PDF]
Conference
[C6]
[C6]
ICCPS'18
F. Abdi, C. Chen, M. Hasan, S. Liu, S. Mohan, and M. Caccamo,
Guaranteed physical security with restart-based design for cyber-physical systems,in Proc. of ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), pp. 10-21, Apr. 2018. [PDF]
Conference
[C5]
[C5]
DATE'18
M. Hasan, S. Mohan, R. Pellizzoni, and R. B. Bobba,
A design-space exploration for allocating security tasks in multicore real-time systems,in Proc. of Design, Automation and Test in Europe (DATE), pp. 225-230, Mar. 2018. [PDF]
2017
Conference
[C4]
[C4]
RTSS'17
R. Kumar, M. Hasan, S. Padhy, K. Evchenko, L. Piramanayagam, S. Mohan, and R. Bobba,
End-to-end network delay guarantees for real-time systems using SDN,in Proc. of IEEE Real-Time Systems Symposium (RTSS), pp. 231-242, Dec. 2017. [PDF]
Workshop
[W5]
[W5]
CPS-SPC'17
I. Agadakos, C. Chen, M. Campanelli, P. Anantharaman, M. Hasan, B. Copos, T. Lepoint, M. Locasto, G. Ciocarlie, and U. Lindqvist,
Jumping the air gap: Modeling cyber-physical attack paths in the Internet-of-Things,in Proc. of ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC), pp. 37-48, Nov. 2017. [PDF]
Workshop
[W4]
[W4]
RTN'17
R. Kumar, M. Hasan, S. Padhy, K. Evchenko, L. Piramanayagam, S. Mohan, and R. Bobba,
Dependable end-to-end delay constraints for real-time systems using SDN,in Proc. of International Workshop on Real-Time Networks (RTN), Jun. 2017. [PDF]
Conference
[C3]
[C3]
ECRTS'17
M. Hasan, S. Mohan, R. Pellizzoni, R. B. Bobba,
Contego: An adaptive framework for integrating security tasks in real-time systems,in Proc. of Euromicro Conference on Real-Time Systems (ECRTS), vol. 76, pp. 23:1-23:22, Jun. 2017. [PDF]
2016
Workshop
[W3]
[W3]
CERTS'16
M. Hasan, S. Mohan, R. B. Bobba, and R. Pellizzoni,
A server model to integrate security tasks into fixed-priority real-time systems,in Proc. of Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS), pp. 61-68, Nov. 2016. [PDF]
Workshop
[W2]
[W2]
CERTS'16
F. Abdi, M. Hasan, S. Mohan, D. Agarwal, and M. Caccamo,
ReSecure: A restart-based security protocol for tightly actuated hard real-time systems,in Proc. of Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS), pp. 47-53, Nov. 2016. [PDF]
Conference
[C2]
[C2]
RTSS'16
M. Hasan, S. Mohan, R. B. Bobba, and R. Pellizzoni,
Exploring Opportunistic Execution for Integrating Security into Legacy Hard Real-Time Systems,IEEE Real-Time Systems Symposium (RTSS), pp. 123-134, Dec. 2016. (received Outstanding Paper and Best Student Paper award) [PDF]
Book Ch.
[BC1]
[BC1]
M. Hasan and E. Hossain,
Distributed resource allocation in 5G cellular networks,book chapter in Towards 5G: Applications, Requirements & Candidate Technologies, Wiley, 2016. [PDF]
2015
Journal
[J4]
[J4]
TCOM'15
M. Hasan and E. Hossain,
Distributed resource allocation for relay-aided device-to-device communication under channel uncertainties: A stable matching approach,IEEE Transactions on Communications, vol. 63, no. 10, pp. 3882-3897, Oct. 2015. [PDF]
Conference
[C1]
[C1]
ICC'15
M. Hasan and E. Hossain,
Distributed resource allocation in D2D-enabled multi-tier cellular networks: An auction approach,in Proc. of IEEE International Conference on Communications (ICC), pp. 4552-4557, Jun. 2015. [PDF]
Magazine
[M3]
[M3]
IMM'15
E. Hossain and M. Hasan,
5G cellular: Key enabling technologies and research challenges,IEEE Instrumentation & Measurement Magazine, vol. 18, no. 3, pp. 11-21, Jun. 2015. [PDF]
Journal
[J3]
[J3]
TCOM'15
M. Rasti, M. Hasan, L. B. Le, and E. Hossain,
Distributed uplink power control for multi-cell cognitive radio networks,IEEE Transactions on Communications, vol. 63, no. 3, pp. 628-642, Mar. 2015. [PDF]
Magazine
[M2]
[M2]
Network'15
M. Hasan, E. Hossain, S. Balasubramaniam, and Y. Koucheryavy,
Social behavior in bacterial nanonetworks: Challenges and opportunities,IEEE Network, vol. 29, no. 1, pp. 26-34, Jan. 2015. [PDF]
2014
Journal
[J2]
[J2]
TWC'14
M. Hasan and E. Hossain,
Distributed resource allocation for relay-aided device-to-device communication: A message passing approach,IEEE Transactions on Wireless Communications, vol. 13, no. 11, pp. 6326-6341, Nov. 2014. [PDF]
Journal
[J1]
[J1]
TWC'14
M. Hasan, E. Hossain, and D. I. Kim,
Resource allocation under channel uncertainties for relay-aided device-to-device communications underlaying LTE-A cellular networks,IEEE Transactions on Wireless Communications, vol. 13, no. 4, pp. 2322-2338, Apr. 2014. [PDF]
2013
Workshop
[W1]
[W1]
GC-Wkshps'13
M. Hasan and E. Hossain,
Resource allocation for network-integrated device-to-device communications using smart relays,in Proc. of IEEE Globecom Workshop on Device-to-Device (D2D) Communication With and Without Infrastructure, pp. 597-602, Dec. 2013. [PDF]
Magazine
[M1]
[M1]
ComMag'13
M. Hasan, E. Hossain, and D. Niyato,
Random access for machine-to-machine communication in LTE-Advanced networks: Issues and approaches,IEEE Communications Magazine, vol. 51, no. 6, pp. 86-93, Jun. 2013. [PDF]
Thesis and Dissertation
- M. Hasan,
Integrating Security into Real-Time Cyber-Physical Systems,
Ph.D. Dissertation, University of Illinois at Urbana-Champaign, Dec. 2020. [PDF] [URI] - M. Hasan,
Radio resource management for relay-aided device-to-device communication,
M.Sc. Thesis, University of Manitoba, May 2015. [PDF] [URI]