Conference Papers

  • Siadati, H. and Nguyen, T. and Memon, N., Verification Code Forwarding Attack, PasswordsCon2015.download
  • Siadati, H. and Gupta, P. and Smith, S. and Memon, N. and Ahamad, M. , Fortifying Android Patterns using Persuasive Security Framework,, Ubicomm 2015.download
  • Jakobsson, M. and Siadati, H. and Dhiman, M., Liar buyer fraud, and how to curb it,, USEC 2015.download
  • Koven, J., and Siadati, H., and Lin, CY., Finding Valuable Yelp Comments by Personality, Content, Geo, and Anomaly Analysis, IEEE International Conference on Data Mining (ICDM), 2014.download|Video|Poster
  • Dong, X. and Chen, Zh. and Siadati, H. and Tople, Sh. and Saxena, P. and Liang, Zh., Protecting sensitive web content from client-side vulnerabilities with CRYPTONS,Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, ACM ,pages(1311--1324), 2013.download
  • Jakobsson, M. and Siadati, H., SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention, 2012 Workshop on Socio-Technical Aspects in Security and Trust (STAST), IEEE, pages(3--10), 2012.download
  • Jakobsson, M. and Siadati, H., Improved Visual Preference Authentication, 2012 Workshop on Socio-Technical Aspects in Security and Trust (STAST), IEEE, pages(27--34), 2012. download
  • Sharifi, M. and Siadati,H., A phishing sites blacklist generator, Proceedings of AICCSA 2008, IEEE, pages(840--843).

Book Chapters

  • Jakobsson, M. and Siadati, H., How to Kill Spoofing, Mobile Authentication, Springer New York, pages(73--90), 2013.
  • Jakobsson, M. and Siadati, H., Improved Visual Preference Authentication, Mobile Authentication, Springer New York, pages(57--67), 2013.

Presentations

  • Helping People Walk the Narrow Path, Real World Cryptography Workshop, NY, Jan 2014. download