Extended Bio

Mohannad Alhanahnah is a software security researcher and entrepreneur. He’s a Co-founder and CTO at FitStack. FitStack is funded by Wisconsin Alumni Research Foundation (WARF). Mohannad was a postdoctoral researcher at the University of Wisconsin-Madison working with Prof. Somesh Jha and Prof. Thomas Reps on software debloating. Mohannad’s research interests revolve around leveraging program analysis techniques for assessing and boosting application security. Mohannad completed his PhD in Computer Engineering at the University of Nebraska-Lincoln under the supervision of Dr. Hamid Bagheri and Dr. Qiben Yan and obtained MSc in Computer Security from the University of Kent. Mohannad worked as a researcher at iTrust lab at the Singapore University of Technology and Design and contributed to the development of Internet of Things Automatic Security Testbed. Mohannad worked also at Eindhoven University of Technology where he contributed to AU2EU. Mohannad received ACM SIGSOFT distinguished paper award and (ISC)2 graduate scholarship.

Research Areas:

Publications:

  1. Alhanahnah, M., Jain, R., Rastogi, V., Jha, S., & Reps, T. (2022). Lightweight, Multi-Stage, Compiler-Assisted Application Specialization. 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 251–269. https://doi.org/10.1109/EuroSP53844.2022.00024
  2. Stevens, C., Alhanahnah, M., Yan, Q., & Bagheri, H. (2020). Comparing formal models of IoT app coordination analysis. Proceedings of the 3rd ACM SIGSOFT International Workshop on Software Security from Design to Deployment, 3–10.
  3. Alhanahnah, M., Stevens, C., & Bagheri, H. (2020). Scalable Analysis of Interaction Threats in IoT Systems. Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 272–285. https://doi.org/10.1145/3395363.3397347
  4. Alhanahnah, M., Yan, Q., Bagheri, H., Zhou, H., Tsutano, Y., Srisa-An, W., & Luo, X. (2020). DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code. IEEE Transactions on Information Forensics and Security, 15, 2782–2797. https://doi.org/10.1109/TIFS.2020.2976556
  5. Alhanahnah, M., Yan, Q., Bagheri, H., Zhou, H., Tsutano, Y., Srisa-an, W., & Luo, X. (2019). Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code. IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, 550–558. https://doi.org/10.1109/INFOCOM.2019.8737637
  6. Alhanahnah, M., Lin, Q., Yan, Q., Zhang, N., & Chen, Z. (2018). Efficient Signature Generation for Classifying Cross-Architecture IoT Malware. 2018 IEEE Conference on Communications and Network Security (CNS), 1–9. https://doi.org/10.1109/CNS.2018.8433203
  7. Alhanahnah, M., & Yan, Q. (2018). Towards best secure coding practice for implementing SSL/TLS. IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 1–6. https://doi.org/10.1109/INFCOMW.2018.8407011
  8. Alhanahnah, M., Bertok, P., Tari, Z., & Alouneh, S. (2018). Context-Aware Multifaceted Trust Framework For Evaluating Trustworthiness of Cloud Providers. Future Generation Computer Systems, 79, 488–499. https://doi.org/https://doi.org/10.1016/j.future.2017.09.071
  9. Alhanahnah, M., Bertok, P., & Tari, Z. (2017). Trusting Cloud Service Providers: Trust Phases and a Taxonomy of Trust Factors. IEEE Cloud Computing, 4(1), 44–54. https://doi.org/10.1109/MCC.2017.20
  10. Al-Hadidi, M. R., Alarabeyyat, A., & Alhanahnah, M. (2016). Breast Cancer Detection Using K-Nearest Neighbor Machine Learning Algorithm. 2016 9th International Conference on Developments in ESystems Engineering (DeSE), 35–39. https://doi.org/10.1109/DeSE.2016.8
  11. Alhanahnah, M., & Chadwick, D. (2016). Boosting Usability for Protecting Online Banking Applications Against APTs. 2016 Cybersecurity and Cyberforensics Conference (CCC), 70–76. https://doi.org/10.1109/CCC.2016.13
  12. Alhanahnah, M. J., Jhumka, A., & Alouneh, S. (2016). A Multidimension Taxonomy of Insider Threats in Cloud Computing. The Computer Journal, 59(11), 1612–1622. https://doi.org/10.1093/comjnl/bxw020
  13. Wang, Y., Alhanahnah, M., Meng, X., Wang, K., Christodorescu, M., & Jha, S. (2022). Robust Learning against Relational Adversaries. In A. H. Oh, A. Agarwal, D. Belgrave, & K. Cho (Eds.), Advances in Neural Information Processing Systems. https://openreview.net/forum?id=WBp4dli3No6
  14. Chen, Y., Alhanahnah, M., Sabelfeld, A., Chatterjee, R., & Fernandes, E. (2022). Practical Data Access Minimization in Trigger-Action Platforms. 31st USENIX Security Symposium (USENIX Security 22), 2929–2945. https://www.usenix.org/conference/usenixsecurity22/presentation/chen-yunang-practical
  15. Alhanahnah, M., Ma, S., Gehani, A., Ciocarlie, G. F., Yegneswaran, V., Jha, S., & Zhang, X. (2022). autoMPI: Automated Multiple Perspective Attack Investigation with Semantics Aware Execution Partitioning. IEEE Transactions on Software Engineering, 1–14. https://doi.org/10.1109/TSE.2022.3231242
  16. Alhanahnah, M., Stevens, C., Chen, B., Yan, Q., & Bagheri, H. (2022). IoTCOM: Dissecting Interaction Threats in IoT Systems. IEEE Transactions on Software Engineering, 1–1. https://doi.org/10.1109/TSE.2022.3179294

Updates

  • [Dec 2022] Our paper "autoMPI: Automated Multiple Perspective Attack Investigation with Semantics Aware Execution Partitioning" has been accepted to (TSE).
  • [Sept 2022] Our paper "Robust Learning against Relational Adversaries" has been accepted to (NeurIPS'22)
  • [June 2022] Our paper "IoTCOM: Dissecting Interaction Threats in IoT Systems" has been accepted to (TSE)
  • [Feb 2022] Our paper "Lightweight, Multi-Stage, Compiler-Assisted Application Specialization" has been accepted to (Euro S&P'22)
  • [July 2021] Our tool "Lightweight, Multi-Stage, Compiler-Assisted Application Specialization" has been accepted for Tech Transfer by ONR.
  • [July 2021] Our paper "Practical Data Access Minimization in Trigger-Action Platforms" has been accepted to (USENIX'22)
  • [May 2021] Patent filed ["COMPUTER IMPLEMENTED PROGRAM SIMPLIFICATION"](https://www.warf.org/technologies/summary/P210211US02/)
  • [Feb 2021] Patent filed ["A METHOD AND APPARATUS FOR IMPROVED SECURITY IN TRIGGER ACTION PLATFORMS"](https://www.warf.org/technologies/summary/P210227US01/)
  • [Aug 2020] Our paper "Comparing formal models of IoT app coordination analysis" has been accepted to (SEAD'20).
  • [June 2020] Our (ISSTA'20) paper received ACM SIGSOFT Distinguished Paper Award
  • [April 2020] Our paper "Scalable Analysis of Interaction Threats in IoT Systems" (ISSTA'20) paper received ACM SIGSOFT Distinguished Paper Award
  • [Dec 2018] Our paper Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code" has been accepted to (INFOCOM'19)
  • [Mar 2018] Our paper "Efficient Signature Generation for Classifying Cross-Architecture IoT Malware" accepted to IEEE Conference on Communications and Network Security 2018.
  • [Feb 2018] Our paper "Towards Best Secure Coding Practice for Implementing SSL/TLS" has been accepted to MobiSec 2018 (INFOCOM)