Publications by Dr. Hassen Saïdi

  • Rubin Xu, Hassen Saïdi, Ross Anderson Aurasium: Practical Policy Enforcement for Android Applications . In the 21st USENIX Security Symposium, 2012.

  • Matt Fredrikson, Richard Joiner, Somesh Jha, Thomas Reps, Phillip Porras, Hassen Saïdi, and Vinod Yegneswaran Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement . In Computer Aided Verification (CAV) 2012.

  • Robert N.M. Watson, Peter G. Neumann Jonathan Woodruff, Jonathan Anderson, Ross Anderson, Nirav Dave, Ben Laurie, Simon W. Moore, Steven J. Murdoch, Philip Paeps, Michael Roe, and Hassen Saïdi CHERI: a research platform deconflating hardware virtualization and protection . In Runtime Environments, Systems, Layering and Virtualized Environments (RESoLVE'12), 2012 .

  • Nathaniel Husted, Hassen Saïdi, Ashish Gehani Smartphone security limitations: conflicting tradititions. In Proceedings of the 2011 Workshop on Governance of Technology, Information, and Policies, GTIP'11, 2011

  • Hassen Saïdi, Phillip Porras, Vinod Yegneswaran Experiences in malware binary deobfuscation . In the 20th Virus Bulletin International Conference , 2010.

  • Phillip Porras, Hassen Saïdi, Vinod Yegneswaran An Analysis of the iKee.B iPhone Botnet . In The Second International ICST Conference on Security and Privacy in Mobile Information and Communication Systems, 2010.

  • Phillip Porras, Hassen Saïdi, Vinod Yegneswaran A foray into Conficker's logic and rendezvous points . In Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more (LEET'09), 2009.

  • Phillip Porras, Hassen Saïdi, Vinod Yegneswaran Conficker C P2P Protocol and Implementation . SRI Online Technical Report, 2009.

  • Phillip Porras, Hassen Saïdi, Vinod Yegneswaran Conficker C Analysis . SRI Online Technical Report, 2009.

  • Phillip Porras, Hassen Saïdi, Vinod Yegneswaran An Analysis of Conficker's Logic and Rendezvous Points. SRI Online Technical Report, 2009.

  • Monirul Sharif, Vinod Yegneswaran, Hassen Saïdi,Phillip Porras, Wenke Lee Eureka: A Framework for Enabling Static Malware Analysis . In the 13th European Symposium on Research in Computer Security, ESORICS 2008.

  • Hassen Saïdi Logical Foundation for Static Analysis: Application to Binary Static Analysis for Security. In Static Analysis Summit II . Fairfax, Virginia, November 2007.

  • Phillip Porras, Hassen Saïdi, and Vinod Yegneswaran A Multi-perspective Analysis of the Storm (Peacomm) Worm . SRI International Technical Report, October 2007.

  • Hassen Saïdi Guarded models for intrusion detection . In Proceedings of the 2007 workshop on Programming languages and analysis for security. San Diego, 2007.

  • Hassen Saïdi Discovering Symmetries . In 11th International Workshop on Formal Methods for Industrial Critical Systems. Bonn, Germany 2006.

  • Robert Riemenschneider, Hassen Saïdi, and Bruno Duterte Using Model Checking to Assess the Dependability of Agent-Based Systems . In IEEE Intelligent Systems magazine. 2004.

  • Hassen Saïdi, Bruno Duterte, Joshua Levy, and Alfonso Valdes Self-Regenerative Software Components . In Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems. Washington, DC 2003.

  • Hassen Saïdi, Victoria Stavridou, and Bruno Duterte Protocol Codesign . In Proceedings of the Security Protocols Workshop. Cambridge, UK 2003.

  • Steve Dawson, Joshua Levy, Robert Riemenschneider, Hassen Saïdi, Victoria Stavridou, Alfonso Valdes Design assurance arguments for intrusion tolerance . In Workshop on Intrusion Tolerant Systems. DSN 2002, DC 2002.

  • Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, and Tomas E. Uribe. An adaptive intrusion-tolerant server architecture . In the Proceedings of the Security Protocols Workshop. Cambridge, UK 2002.

  • J. Levy, H.Saïdi, and T. Uribe. Combining monitors for run-time system verification. To appear in the Proceedings of the Second Workshop on Runtime Verification. Copenhagen, Denmark, July 26th, 2002

  • H.Saïdi Toward Automatic Synthesis of Security Protocols . Proceedings of the Logic-Based Program Synthesis: State-of-the-Art & Future Trends. AAAI 2002 Spring Symposium. Stanford University, CA. March 2002.

  • A.Tiwari, H.Ruess, H.Saïdi, N.Shankar. A Technique for Invariant Generation. To appear in the Proceedings of the Seventh International Conference Tools and Algorithms for the Construction and Analysis of Systems. Genova, Italy. April 2001.

  • B.Dutertre,H.Saïdi, V.Stavridou. Intrusion-Tolerant Group Management in Enclaves. To appear in the Proceedings of the The International Conference on Dependable Systems and Networks. Göteborg, Sweden. July 2001.

  • H.Saïdi. Model Checking Guided Abstraction and Analysis . In Proceedings of the 7th International Static Analysis Symposium (SAS2000). Santa Barbara, CA. July 2000.

  • B.Dutertre,R.A.Riemenschneider,H.Saïdi, and V. Stavridou. Dependable Dynamic Agent Architectures. To appear in the Proceedings of the NASA Goddard Workshop on Formal Approches to Agent-Based Systems. Goddard Space Flight Center, MD. April 2000.

  • H.Saïdi. Modular and Incremental Analysis of Concurrent Sof tware Systems . To appear in the Proceedings of the 14th IEEE International Conference on Automated Software Engineering (ASE'99) Cocoa Beach, Florid a.

  • H.Saïdi, N.Shankar. Abstract and Model Check while you Prove . In Proceedings of the 11th Conference on Computer-Aided Verification (CAV'99) Trento, Italy.

  • D.Lesens, H.Saïdi. Automatic Verification of Parameterized Networks of Processes by Abstraction . In Electronic Notes of Theoritical Computer Science (ENTCS). Volume 9, 1997. Revisited version of INFINITY'97.

  • H.Saïdi. Automated Deductive Verification of parallel Systems. In Proceedings of the Fourth NASA Langley Formal Methods Workshop (Lfm'97), Hampton, Virginia, September 1997.

  • D.Lesens, H.Saïdi. Automatic Verification of Parameterized Networks of Processes by Abstraction . In Proceedings of the 2nd International Workshop on the Verification of Infinite State Systems (INFINITY'97), Bologna, Italy, July 1997.

  • S.Graf, H.Saïdi. Construction of abstract state graphs with PVS. In Proceedings of the 9th Conference on Computer-Aided Verification (CAV'97), Haifa, Israel, June 1997.

  • H.Saïdi. The Invariant-Checker : Automated Deductive Verification of Reactive Systems (Tool Presentation). In Proceedings of the 9th Conference on Computer-Aided Verification (CAV'97) , Haifa, Israel, June 1997.

  • S.Graf, H.Saïdi. Verifying Invariants Using Theorem Proving. In Proceedings of the 8th Conference on Computer-Aided Verification (CAV'96) , Rutgers University, New Jersey, July 1996.

  • S.Bensalem, Y.Lakhnech, H.Saïdi. Powerful Techniques for the Automatic Generation of Invariants . In Proceedings of the 8th Conference on Computer-Aided Verification (CAV'96), Rutgers University, New Jersey, July 1996.

  • H.Saïdi A Tool for Proving Invariance Properties of Concurrent Systems Automatically (Tool Presentation). In Proceedings of the 2nd International Workshop, Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96), Passau, Germany, March 1996. Lecture Notes in Computer Science 1055, pages 412--416, Springer-Verlag.

  • H.Saïdi Unification dans le systeme T de Goedel. Masters Thesis(In French), Universite de Paris 7, September 1994