2024

Conference
[C15]

NordSec'24 M. Hamad, A. Finkenzeller, M. Hasan, M. Pahl, and S. Steinhorst, A gamified learning approach for IoT security education using capture-the-flag competitions: Architecture and insights, in Proc. of Nordic Conference on Secure IT Systems (NordSec), Nov. 2024.  [PDF]
Conference
[C14]

ECRTS'24 M. Babar and M. Hasan, DeepTrustRT: Confidential deep neural inference meets real-time!, in Proc. of Euromicro Conference on Real-Time Systems (ECRTS), Leibniz International Proceedings in Informatics (LIPIcs), vol. 298, pp. 13:1-13:24, Jul. 2024.  [PDF]
Conference
[C13]

ISORC'24 M. Babar and M. Hasan, A New covert channel in fixed-priority real-time multiframe tasks, in Proc. of International Symposium on Real-Time Distributed Computing (ISORC), pp 1–6, May 2024.  [PDF]
Conference
[C12]

ISORC'24 Z. Hammadeh, M. Hasan, and M. Hamad, Securing real-time systems using schedule reconfiguration, in Proc. of International Symposium on Real-Time Distributed Computing (ISORC), pp 1–10, May 2024.  [PDF]
Journal
[J11]

CSUR'24 M. Hasan, A. Kashinath, C. Chen, and S. Mohan, SoK: Security in real-time systems, ACM Computing Surveys, vol. 56, no. 9, pp 1–31, Apr. 2024.  [PDF]
Conference
[C11]

ICPE'24 S. Sarkar, M. Babar, M. Hassan, M. Hasan, and S. Kanti, Processing natural language on embedded devices: How well do Transformer models perform?, in Proc. of ACM/SPEC International Conference on Performance Engineering (ICPE), pp. 211-222, May 2024.  [PDF]

2023

Journal
[J10]

TOPS'23 A. Bansal, A. Kandikuppa, M. Hasan, C. Chen, A. Bates, and S. Mohan, System auditing for real-time systems, ACM Transactions on Privacy and Security, vol. 26, no. 4, pp 1–37, Nov. 2023.  [PDF]
Journal
[J9]

Access'23 M. Babar and M. Hasan, Trusted deep neural execution — A survey, IEEE Access, vol. 11, pp. 45736-45748, May 2023.  [PDF]
Conference
[C10]

ISORC'23 M. Hasan and S. Mohan, You can't always check what you wanted: selective checking and trusted execution to prevent false actuations in real-time Internet-of-things, in Proc. of International Symposium on Real-Time Distributed Computing (ISORC), pp. 42–53, May 2023.  [PDF] [Extended Version]

2022

Workshop
[W11]

CPSIoTSec'22 M. Babar and M. Hasan, Real-time scheduling of TrustZone-enabled DNN workloads, in Proc. of ACM Joint Workshop on CPS & IoT Security and Privacy (CPSIoTSec), pp. 63–69, Nov. 2022.  [PDF]
Workshop
[W10]

CPSIoTSec'22 V. Banerjee, S. Hounsinou, H. Olufowobi, M. Hasan, and G. Bloom, Secure reboots for real-time cyber-physical systems, in Proc. of ACM Joint Workshop on CPS & IoT Security and Privacy (CPSIoTSec), pp. 27–33, Nov. 2022.  [PDF]
Conference
[C9]

ESORICS'22 A. Bansal, A. Kandikuppa, C. Chen, M. Hasan, A. Bates, and S. Mohan, Towards efficient auditing for real-time systems, in Proc. of European Symposium on Research in Computer Security (ESORICS), pp. 614–634, Sep. 2022.  [PDF]
Journal
[J8]

TCPS'22 M. Hasan, S. Mohan, R. Bobba, and R. Pellizzoni, Beyond just safety: Delay-aware security monitoring for real-time control systems, ACM Transactions on Cyber-Physical Systems, vol. 6, no. 3, pp 1–25, Jul. 2022.  [PDF]
Workshop
[W9]

RTAS/BP'22 M. Aguida and M. Hasan, Work-in-Progress: Exploring schedule-based side-channels in TrustZone-enabled real-time systems, in Proc. of IEEE Real-Time and Embedded Technology and Applications Symposium, (RTAS), Brief Presentations (BP) track, pp. 301-304, May 2022.  [PDF]

2021

Workshop
[W8]

RTSS/BP'21 S. Hounsinou, V. Banerjee, C. Peng, M. Hasan, and G. Bloom, Work-in-Progress: Enabling secure boot for real-time restart-based cyber-physical systems, in Proc. of IEEE Real-Time Systems Symposium (RTSS), Brief Presentations (BP) track, pp. 524-527, Dec. 2021.  [PDF]
Conference
[C8]

INFOCOM'21 A. Kashinath, M. Hasan, R. Kumar, S. Mohan, R. Bobba, and S. Padhy, Safety critical networks using commodity SDNs, in Proc. of IEEE International Conference on Computer Communications (INFOCOM), pp. 1-10, May 2021.  [PDF]

2020

Workshop
[W7]

SecSDN'20 A. Kashinath, M. Hasan, S. Mohan, R. Bobba, and R. Mittal, Improving dependability via deadline guarantees in commodity real-time networks, in Proc. of IEEE GLOBECOM Workshop on Secure and Dependable Software-defined Networking for Sustainable Smart Communities (SecSDN), pp. 1-6, Dec. 2020.  [PDF]
US Patent
[P1]

G. Ciocarlie, I. Agadakos, C. Chen, M. Campanelli, P. Anantharaman, M. Hasan, U. Lindqvist, M. Locasto, B. Copos, T. Lepoint, and M. Filippone, Modeling cyber-physical attack paths in the Internet-of-things, U.S. Patent Application No. 16/634,591, May 2020.  [PDF]
Journal
[J7]

TIV'20 M. Hasan, S. Mohan, T. Shimizu, and H. Lu, Securing vehicle-to-everything (V2X) communication platforms, IEEE Transactions on Intelligent Vehicles, vol. 5, no. 4, pp. 693-713, Dec. 2020.  [PDF]
Conference
[C7]

DATE'20 M. Hasan, S. Mohan, R. Pellizzoni, and R. B. Bobba, Period adaptation for continuous security monitoring in multicore systems, in Proc. of Design, Automation and Test in Europe (DATE), pp. 430-435, Mar. 2020.  [PDF] [Extended Version]

2019

Workshop
[W6]

IoTS&P'19 M. Hasan and S. Mohan, Protecting actuators in safety-critical IoT systems from control spoofing attacks, in Proc. of ACM Workshop on the Internet of Things Security and Privacy (IoT S&P), pp. 8-14, Nov. 2019.  [PDF]
Journal
[J6]

IoT'19 F. Abdi, C. Chen, M. Hasan, S. Liu, S. Mohan, and M. Caccamo, Preserving physical safety under cyber attacks, IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6285-6300, Aug. 2019.  [PDF]

2018

Journal
[J5]

Sensors'18 C. Chen, M. Hasan, and S. Mohan, Securing real-time Internet-of-things, Sensors, vol. 18, no. 12, Dec. 2018.  [PDF]
Conference
[C6]

ICCPS'18 F. Abdi, C. Chen, M. Hasan, S. Liu, S. Mohan, and M. Caccamo, Guaranteed physical security with restart-based design for cyber-physical systems, in Proc. of ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), pp. 10-21, Apr. 2018.  [PDF]
Conference
[C5]

DATE'18 M. Hasan, S. Mohan, R. Pellizzoni, and R. B. Bobba, A design-space exploration for allocating security tasks in multicore real-time systems, in Proc. of Design, Automation and Test in Europe (DATE), pp. 225-230, Mar. 2018.  [PDF]

2017

Conference
[C4]

RTSS'17 R. Kumar, M. Hasan, S. Padhy, K. Evchenko, L. Piramanayagam, S. Mohan, and R. Bobba, End-to-end network delay guarantees for real-time systems using SDN, in Proc. of IEEE Real-Time Systems Symposium (RTSS), pp. 231-242, Dec. 2017.  [PDF]
Workshop
[W5]

CPS-SPC'17 I. Agadakos, C. Chen, M. Campanelli, P. Anantharaman, M. Hasan, B. Copos, T. Lepoint, M. Locasto, G. Ciocarlie, and U. Lindqvist, Jumping the air gap: Modeling cyber-physical attack paths in the Internet-of-Things, in Proc. of ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC), pp. 37-48, Nov. 2017.  [PDF]
Workshop
[W4]

RTN'17 R. Kumar, M. Hasan, S. Padhy, K. Evchenko, L. Piramanayagam, S. Mohan, and R. Bobba, Dependable end-to-end delay constraints for real-time systems using SDN, in Proc. of International Workshop on Real-Time Networks (RTN), Jun. 2017.  [PDF]
Conference
[C3]

ECRTS'17 M. Hasan, S. Mohan, R. Pellizzoni, R. B. Bobba, Contego: An adaptive framework for integrating security tasks in real-time systems, in Proc. of Euromicro Conference on Real-Time Systems (ECRTS), vol. 76, pp. 23:1-23:22, Jun. 2017.  [PDF]

2016

Workshop
[W3]

CERTS'16 M. Hasan, S. Mohan, R. B. Bobba, and R. Pellizzoni, A server model to integrate security tasks into fixed-priority real-time systems, in Proc. of Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS), pp. 61-68, Nov. 2016.  [PDF]
Workshop
[W2]

CERTS'16 F. Abdi, M. Hasan, S. Mohan, D. Agarwal, and M. Caccamo, ReSecure: A restart-based security protocol for tightly actuated hard real-time systems, in Proc. of Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS), pp. 47-53, Nov. 2016.  [PDF]
Conference
[C2]

RTSS'16 M. Hasan, S. Mohan, R. B. Bobba, and R. Pellizzoni, Exploring Opportunistic Execution for Integrating Security into Legacy Hard Real-Time Systems, IEEE Real-Time Systems Symposium (RTSS), pp. 123-134, Dec. 2016. (received Outstanding Paper and Best Student Paper award)  [PDF]
Book Ch.
[BC1]

M. Hasan and E. Hossain, Distributed resource allocation in 5G cellular networks, book chapter in Towards 5G: Applications, Requirements & Candidate Technologies, Wiley, 2016.  [PDF]

2015

Journal
[J4]

TCOM'15 M. Hasan and E. Hossain, Distributed resource allocation for relay-aided device-to-device communication under channel uncertainties: A stable matching approach, IEEE Transactions on Communications, vol. 63, no. 10, pp. 3882-3897, Oct. 2015.  [PDF]
Conference
[C1]

ICC'15 M. Hasan and E. Hossain, Distributed resource allocation in D2D-enabled multi-tier cellular networks: An auction approach, in Proc. of IEEE International Conference on Communications (ICC), pp. 4552-4557, Jun. 2015.  [PDF]
Magazine
[M3]

IMM'15 E. Hossain and M. Hasan, 5G cellular: Key enabling technologies and research challenges, IEEE Instrumentation & Measurement Magazine, vol. 18, no. 3, pp. 11-21, Jun. 2015.  [PDF]
Journal
[J3]

TCOM'15 M. Rasti, M. Hasan, L. B. Le, and E. Hossain, Distributed uplink power control for multi-cell cognitive radio networks, IEEE Transactions on Communications, vol. 63, no. 3, pp. 628-642, Mar. 2015.  [PDF]
Magazine
[M2]

Network'15 M. Hasan, E. Hossain, S. Balasubramaniam, and Y. Koucheryavy, Social behavior in bacterial nanonetworks: Challenges and opportunities, IEEE Network, vol. 29, no. 1, pp. 26-34, Jan. 2015.  [PDF]

2014

Journal
[J2]

TWC'14 M. Hasan and E. Hossain, Distributed resource allocation for relay-aided device-to-device communication: A message passing approach, IEEE Transactions on Wireless Communications, vol. 13, no. 11, pp. 6326-6341, Nov. 2014.  [PDF]
Journal
[J1]

TWC'14 M. Hasan, E. Hossain, and D. I. Kim, Resource allocation under channel uncertainties for relay-aided device-to-device communications underlaying LTE-A cellular networks, IEEE Transactions on Wireless Communications, vol. 13, no. 4, pp. 2322-2338, Apr. 2014.  [PDF]

2013

Workshop
[W1]

GC-Wkshps'13 M. Hasan and E. Hossain, Resource allocation for network-integrated device-to-device communications using smart relays, in Proc. of IEEE Globecom Workshop on Device-to-Device (D2D) Communication With and Without Infrastructure, pp. 597-602, Dec. 2013.  [PDF]
Magazine
[M1]

ComMag'13 M. Hasan, E. Hossain, and D. Niyato, Random access for machine-to-machine communication in LTE-Advanced networks: Issues and approaches, IEEE Communications Magazine, vol. 51, no. 6, pp. 86-93, Jun. 2013.  [PDF]

Thesis and Dissertation

  • M. Hasan, Integrating Security into Real-Time Cyber-Physical Systems, Ph.D. Dissertation, University of Illinois at Urbana-Champaign, Dec. 2020. [PDF]  [URI]
  • M. Hasan, Radio resource management for relay-aided device-to-device communication, M.Sc. Thesis, University of Manitoba, May 2015.  [PDF]  [URI]

Return to home page.