


default search action
Muhammad Saad 0001
Person information
- affiliation: PayPal, USA
- affiliation (former): University of Central Florida, Department of Computer Science, Orlando, FL, USA
Other persons with the same name
- Muhammad Saad — disambiguation page
- Muhammad Saad 0002
— Sungkyunkwan University, Department of Electrical and Computer Engineering, Suwon, Korea (and 1 more)
- Muhammad Saad 0003
— Federal Urdu University Islamabad, Department of Computer Science, Pakistan
- Muhammad Saad 0004
— Chang'an University, School of Electronics and Control Engineering, Xi'an, China (and 1 more)
- Muhammad Saad 0005 — University of Waterloo, Department of Electrical and Computer Engineering, Ontario, Canada
- Muhammad Saad 0006 — University of Zurich, Department of Informatics, Switzerland
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c21]Marzieh Bitaab, Alireza Karimi, Zhuoer Lyu, Adam Oest, Dhruv Kuchhal, Muhammad Saad, Gail-Joon Ahn, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé:
SCAMMAGNIFIER: Piercing the Veil of Fraudulent Shopping Website Campaigns. NDSS 2025 - 2024
- [j14]Muhammad Saad
, David Mohaisen
:
Analyzing In-Browser Cryptojacking. IEEE Trans. Dependable Secur. Comput. 21(6): 5448-5460 (2024) - [j13]Muhammad Saad
, Afsah Anwar, Srivatsan Ravi
, David Mohaisen
:
Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality. IEEE/ACM Trans. Netw. 32(1): 844-858 (2024) - [c20]Bhupendra Acharya, Muhammad Saad, Antonio Emanuele Cinà
, Lea Schönherr, Hoang Dai Nguyen, Adam Oest, Phani Vadrevu
, Thorsten Holz:
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams. SP 2024: 17-35 - [c19]Bhupendra Acharya, Dario Lazzaro, Efrén López-Morales, Adam Oest, Muhammad Saad, Antonio Emanuele Cinà, Lea Schönherr, Thorsten Holz:
The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms. USENIX Security Symposium 2024 - [c18]Ahmed Abusnaina, Afsah Anwar, Muhammad Saad, Abdulrahman Alabduljabbar, Rhongho Jang, Saeed Salem, David Mohaisen:
Exposing the Limitations of Machine Learning for Malware Detection Under Concept Drift. WISE (2) 2024: 273-289 - [i12]Bhupendra Acharya, Muhammad Saad, Antonio Emanuele Cinà
, Lea Schönherr, Hoang Dai Nguyen, Adam Oest, Phani Vadrevu, Thorsten Holz:
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams. CoRR abs/2401.09824 (2024) - [i11]Bhupendra Acharya, Dominik Sautter, Muhammad Saad, Thorsten Holz:
ScamChatBot: An End-to-End Analysis of Fake Account Recovery on Social Media via Chatbots. CoRR abs/2412.15072 (2024) - 2023
- [j12]Yixiao Gao, Muhammad Saad, Adam Oest, Jean Zhang, Bo Han, Songqing Chen:
Can I Own Your NFTs? Understanding the New Attack Surface to NFTs. IEEE Commun. Mag. 61(9): 64-70 (2023) - [c17]Dhruv Kuchhal
, Muhammad Saad
, Adam Oest
, Frank Li
:
Evaluating the Security Posture of Real-World FIDO2 Deployments. CCS 2023: 2381-2395 - [c16]Muhammad Saad, David Mohaisen
:
Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks. SP 2023: 111-125 - [i10]Muhammad Saad, David Mohaisen
:
Analyzing In-browser Cryptojacking. CoRR abs/2304.13253 (2023) - 2022
- [j11]Muhammad Saad, Afsah Anwar, Ashar Ahmad, Hisham Alasmary
, Murat Yuksel, David Mohaisen
:
RouteChain: Towards Blockchain-based secure and efficient BGP routing. Comput. Networks 217: 109362 (2022) - [j10]Ashar Ahmad, Muhammad Saad
, Mohammed A. AlGhamdi
, DaeHun Nyang
, David Mohaisen
:
BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails. IEEE Syst. J. 16(1): 1367-1378 (2022) - [j9]Muhammad Saad
, Victor Cook
, Lan N. Nguyen
, My T. Thai
, David Mohaisen
:
Exploring Partitioning Attacks on the Bitcoin Network. IEEE/ACM Trans. Netw. 30(1): 202-214 (2022) - [c15]Samin Yaseer Mahmud
, K. Virgil English
, Seaver Thorn
, William Enck
, Adam Oest
, Muhammad Saad
:
Analysis of Payment Service Provider SDKs in Android. ACSAC 2022: 576-590 - 2021
- [j8]Aminollah Khormali, Jeman Park
, Hisham Alasmary
, Afsah Anwar, Muhammad Saad, David Mohaisen:
Domain name system security and privacy: A contemporary survey. Comput. Networks 185: 107699 (2021) - [j7]Aminollah Khormali, Jeman Park
, Hisham Alasmary
, Afsah Anwar, Muhammad Saad, David Mohaisen:
Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699. Comput. Networks 188: 107814 (2021) - [j6]Ashar Ahmad, Abdulrahman Alabduljabbar
, Muhammad Saad, Daehun Nyang, Joongheon Kim, David Mohaisen
:
Empirically comparing the performance of blockchain's consensus algorithms. IET Blockchain 1(1): 56-64 (2021) - [j5]Muhammad Saad, Joongheon Kim, DaeHun Nyang
, David Mohaisen:
Contra-∗: Mechanisms for countering spam attacks on blockchain's memory pools. J. Netw. Comput. Appl. 179: 102971 (2021) - [j4]Muhammad Saad
, Zhan Qin
, Kui Ren, DaeHun Nyang
, David Mohaisen
:
e-PoS: Making Proof-of-Stake Decentralized and Fair. IEEE Trans. Parallel Distributed Syst. 32(8): 1961-1973 (2021) - [c14]Muhammad Saad, Afsah Anwar, Srivatsan Ravi
, David Mohaisen
:
Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality. CCS 2021: 988-1005 - [c13]Muhammad Saad, Songqing Chen, David Mohaisen
:
SyncAttack: Double-spending in Bitcoin Without Mining Power. CCS 2021: 1668-1685 - [c12]Muhammad Saad, Songqing Chen, David Mohaisen
:
Root Cause Analyses for the Deteriorating Bitcoin Network Synchronization. ICDCS 2021: 239-249 - [c11]Ashar Ahmad, Muhammad Saad, Joongheon Kim, DaeHun Nyang, David Mohaisen
:
Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems. ICOIN 2021: 654-656 - [i9]Muhammad Saad, Zhan Qin, Kui Ren, DaeHun Nyang, David Mohaisen:
e-PoS: Making Proof-of-Stake Decentralized and Fair. CoRR abs/2101.00330 (2021) - [i8]Muhammad Saad, Afsah Anwar, Srivatsan Ravi
, David Mohaisen:
HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality. IACR Cryptol. ePrint Arch. 2021: 299 (2021) - 2020
- [j3]Muhammad Saad
, Jeffrey Spaulding, Laurent Njilla, Charles A. Kamhoua, Sachin Shetty
, DaeHun Nyang
, David Mohaisen
:
Exploring the Attack Surface of Blockchain: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 22(3): 1977-2008 (2020) - [j2]Muhammad Saad
, Jinchun Choi, DaeHun Nyang
, Joongheon Kim
, Aziz Mohaisen
:
Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions. IEEE Syst. J. 14(1): 321-332 (2020) - [i7]Muhammad Saad, Joongheon Kim, DaeHun Nyang, David Mohaisen:
Contra-*: Mechanisms for Countering Spam Attacks on Blockchain Memory Pools. CoRR abs/2005.04842 (2020)
2010 – 2019
- 2019
- [j1]Ashar Ahmad, Muhammad Saad, Aziz Mohaisen:
Secure and transparent audit logs with BlockAudit. J. Netw. Comput. Appl. 145 (2019) - [c10]Muhammad Saad, Ashar Ahmad, Aziz Mohaisen:
Fighting Fake News Propagation with Blockchains. CNS 2019: 1-4 - [c9]Muhammad Saad, Aminollah Khormali, Aziz Mohaisen
:
Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking. eCrime 2019: 1-12 - [c8]Muhammad Saad, Afsah Anwar, Ashar Ahmad, Hisham Alasmary
, Murat Yuksel, Aziz Mohaisen:
RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing. IEEE ICBC 2019: 210-218 - [c7]Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Joongheon Kim, DaeHun Nyang, Aziz Mohaisen:
Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems. IEEE ICBC 2019: 285-292 - [c6]Ashar Ahmad, Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Mostafa A. Bassiouni, Aziz Mohaisen:
BlockTrail: A Scalable Multichain Solution for Blockchain-Based Audit Trails. ICC 2019: 1-6 - [c5]Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Aziz Mohaisen
:
Countering Selfish Mining in Blockchains. ICNC 2019: 360-364 - [c4]Muhammad Saad, Victor Cook, Lan N. Nguyen, My T. Thai, Aziz Mohaisen:
Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic. ICDCS 2019: 1175-1187 - [i6]Muhammad Saad, Victor Cook, Lan N. Nguyen, My T. Thai, Aziz Mohaisen:
Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network. CoRR abs/1902.03636 (2019) - [i5]Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles A. Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen:
Exploring the Attack Surface of Blockchain: A Systematic Overview. CoRR abs/1904.03487 (2019) - [i4]Ashar Ahmad, Muhammad Saad, Aziz Mohaisen:
Secure and Transparent Audit Logs with BlockAudit. CoRR abs/1907.10484 (2019) - 2018
- [c3]Muhammad Saad, My T. Thai, Aziz Mohaisen:
POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization. AsiaCCS 2018: 809-811 - [c2]Muhammad Saad, Aziz Mohaisen
:
Towards characterizing blockchain-based cryptocurrencies for highly-accurate predictions. INFOCOM Workshops 2018: 704-709 - [c1]Ashar Ahmad, Muhammad Saad, Mostafa A. Bassiouni, Aziz Mohaisen:
Towards Blockchain-Driven, Secure and Transparent Audit Logs. MobiQuitous 2018: 443-448 - [i3]Muhammad Saad, Aminollah Khormali, Aziz Mohaisen:
End-to-End Analysis of In-Browser Cryptojacking. CoRR abs/1809.02152 (2018) - [i2]Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Aziz Mohaisen:
Countering Selfish Mining in Blockchains. CoRR abs/1811.09943 (2018) - [i1]Ashar Ahmad, Muhammad Saad, Mostafa A. Bassiouni, Aziz Mohaisen:
Towards Blockchain-Driven, Secure and Transparent Audit Logs. CoRR abs/1811.09944 (2018)
Coauthor Index
aka: Aziz Mohaisen

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-03 00:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint