|
 |
Research
Dr.
Hanna's current research interest focuses on different areas of
Computer Science including networking and telecommunications, video
conferencing, software engineering, Internet and E-Commerce application
developments. However, during the past few years the major focus was on Software Security in particular.
|
 |
Publications & Seminars
- October 2019 Book: Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang,
Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb,
He Huang, and Aiman Hanna. “Binary Code Fingerprinting for
Cybersecurity” , Springer, 2019.
- February 2024 A. Lounis, A. Andreoli,, M Debbabi and A. Hanna. “Seum Spread: Discerning Security Flaws in IoT Firmware via Call Sequence Semantics” , 21 st Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '24), Lausanne, Switzerland.
- July 2023 M. Karanfil, E.S. Youssef, M. Kassouf, M Debbabi, M Ghafouri, A. Hanna “ Real-time Protection Against Microgrid False Data Injection Attacks Using Passive Monitoring ” , 2023 IEEE Power & Energy Society General Meeting (PES-GM) .
- June 2023 A. Andreoli, A. Lounis, M Debbabi and A. Hanna. “On the Prevalence of Software Supply Chain Attacks: Empirical Study and Investigative Framework” , Digital Forensic Research, DFRWS EU 2023, Bonn, Germany.
- May 2023 M. Karanfil, E. Youssef, M. Kassouf, M. Debbabi, M. Ghafouri, A. Hanna. “Detection of Microgrid Cyberattacks using Network and System Management” , 2023 IEEE Power & Energy Society General Meeting (PESGM), Institute of Electrical and Electronics Engineers (IEEE).
- April 2022 M. Karanfil, D.E. Rebbah, M. Ghafouri, M. Kassouf, M. Debbabi, and A. Hanna . “ Security Monitoring of the Microgrid using IEC 62351-7 Network and System Management. ” , IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT ), 2022.
- June 2021 Kaur B, Dugré M, Hanna A, Glatard T. “An analysis of security vulnerabilities in container images for scientific data analysis” . Gigascience 2021.
- September 2019 Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi, and
Aiman Hanna. “On Leveraging Coding Habits for Effective Binary Authorship Attribution” , Journal of Computer Security (JCS).
- September 2018 S. Alrabaee, P. Shirani, L. Wang, M. Debbabi and A. Hanna
“ On Leveraging Coding Habits for Effective Binary Authorship Attribution ”. European Symposium on Research in Computer Security (ESORICS) 2018.
- May 2018 P. Shirani, L. Collard, B. Agba, B. Lebel, M. Debbabi, L. Wang, A. Hanna “ BinArm: Scalable and Efficient Detection of Vulnerabilities
in Firmware Images of Intelligent Electronic Devices”. Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2018).
- May 2017 Lina Nouh, Ashkan Rahimian, Djedjiga Mouheb, Mourad Debbabi and Aiman Hanna. “ BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables”. 32 nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2017).
- September 2010 R. Charpentier, M. Debbabi, D. Alhadidi, A. Mourad, N.
Belblidia, A. Boukhtouta, A. Hanna, R. Hadjidj, H.
Kaitouni, M-A Laverdière, H. Z. Ling, S. Tlili, X. Yang
and Z. Yang. “Security Evaluation and Hardening of
Free and Open Source”. The 4th International Workshop
on Foundations and Techniques for Open Source
Software Certification, OpenCert-2010, Pisa, Italy,
September 2010.
- November 2009 A. Hanna, H. Z. Ling, and M. Debbabi. “A Synergy between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities” . The 4th International Symposium on Information Security (IS'09), published by Springer LNCS, Vilamoura, Algarve-Portugal, November, 2009.
- August 2008 A. Hanna, H.Z. Ling, J. Furlong, Z. Yang, and M. Debbabi. “Dynamic Detection of Security Vulnerabilities Through Team Edit Automata & the Security Chaining Approach” . The 8 th International Conference on Quality Software Oxford, UK, 12–13 August 2008, published by IEEE Computer Society Press.
- July 2008 A. Hanna, H. Z. Ling, J. Furlong, and M. Debbabi. “Towards Automation of Testing High-Level Security Properties”. 22 nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security. London, U.K., July 13-16, 2008, published by Springer Lecture Notes in Computer Science.
- August 2007 Z. Yang, A. Hanna, and M. Debbabi. “Team Edit Automata for Testing Security Property.” In proceedings of The Third International Symposium on Information Assurance and Security, IAS 2007. August 29-31, 2007 Manchester, United Kingdom. \
- May 2006 M-A Laverdière, A. Mourad, A. Hanna, and M. Debbabi. “Security Design Patterns: Survey, Evaluation and New Directions”. IEEE Canadian Conference on Electrical and
Computer Engineering, Ottawa, 2006.
- May 2006 N. Belblidia, M. Debbabi, A. Hanna, and Z. Yang. “AOP
Extension for Security Testing of Programs” . IEEE
Canadian Conference on Electrical and Computer
Engineering, Pages 647-650, Ottawa, 2006.
- June 2001 A, Hanna and J.W. Atwood. “A Proposal for a General Multicast Architecture”. IEEE International Conference on Telecommunications (ICT), Bucharest, Romania 2001.
- March 2000 A. Hanna. “Towards a Better Architecture for Reliable Multicast Protocols” , Faculty of Engineering and Computer Science, Concordia University, Montreal, Canada, 2000.
|
 |
Technical Links
|
 |
|
|

|