Umeå University's logo

umu.sePublications
Change search
Link to record
Permanent link

Direct link
Elahi, Haroon
Publications (6 of 6) Show all publications
Elahi, H., Wang, G., Jiang, W., Bartel, A. & Traon, Y. L. (2024). A qualitative study of app acquisition and management. IEEE Transactions on Computational Social Systems, 11(2), 1907-1925
Open this publication in new window or tab >>A qualitative study of app acquisition and management
Show others...
2024 (English)In: IEEE Transactions on Computational Social Systems, E-ISSN 2329-924X, Vol. 11, no 2, p. 1907-1925Article in journal (Refereed) Published
Abstract [en]

Smartphone users rely on Apps for their daily lives but simultaneously struggle to protect their privacy and device security from potentially harmful and malicious Apps. However, scientific literature lacks in-depth studies mapping user struggles, factors undermining their efforts, and implications. We cover this gap by engaging 24 smartphone users in 44 interview sessions. We observe them performing different App acquisition and management tasks, seek explanations, and analyze collected data to make the following contributions. First, we develop a theoretical App acquisition and management model describing different phenomena involved in App acquisition and management in Android smartphones. Causal conditions of these phenomena and contexts, and intervening conditions influencing user strategies are discovered grounded in the data acquired through the interview sessions. It shows the challenges they face, the strategies they develop and use to deal with the faced challenges, and their consequences. Second, we systematically discover and relate different App acquisition and management concepts in 34 subcategories related to user struggles. None of the existing studies discovers, explains, and relates actual user behaviors involving this many factors in one place. Third, this research discovers six problems unaddressed by the literature: the usage of untrusted App repositories, mandatory and forced installations, the installation process changes, the Settings App complexities, the void contracts problem, and the psychological consequences of failure to protect privacy in Android phones. Finally, we provide general guidelines for users, App stores, developers, and regulators to assist them in enhancing privacy and security protection in the Android ecosystem.

Place, publisher, year, edition, pages
IEEE, 2024
Keywords
Android operating system (OS), App acquisition, App management, Data privacy, grounded theory, Interviews, Operating systems, privacy, Privacy, Runtime, Security, security, Smart phones, user behavior
National Category
Computer Systems Human Computer Interaction
Identifiers
urn:nbn:se:umu:diva-212248 (URN)10.1109/TCSS.2023.3288562 (DOI)001025530100001 ()2-s2.0-85164423679 (Scopus ID)
Available from: 2023-07-20 Created: 2023-07-20 Last updated: 2024-08-15Bibliographically approved
Elahi, H. & Wang, G. (2024). Forward-porting and its limitations in fuzzer evaluation. Information Sciences, 662, Article ID 120142.
Open this publication in new window or tab >>Forward-porting and its limitations in fuzzer evaluation
2024 (English)In: Information Sciences, ISSN 0020-0255, E-ISSN 1872-6291, Vol. 662, article id 120142Article in journal (Refereed) Published
Abstract [en]

Forward-porting reintroduces previously detected and patched software bugs from older versions into later ones to create benchmarking workloads for fuzzing. These benchmarks gauge a fuzzer's performance by testing its ability to detect or trigger these bugs during a fuzzing campaign. In this study, we evaluate the reliability of forward porting in establishing dependable fuzzing benchmarks and their suitability for fair and accurate fuzzer evaluation. We utilize online resources, forward porting, fuzzing experiments, and triaging to scrutinize the workloads of a state-of-the-art fuzzing benchmark. We uncover seven factors, including software architecture changes, misconfigurations, supply chain issues, and developer errors, all of which compromise the success of forward porting. We determine that the ‘ground truth’ established through forward porting is only occasionally ‘true’ due to unaccounted-for underlying bugs in all examined software applications undergoing this process. These findings question the reliability of forward porting in generating dependable fuzzing benchmarks. Furthermore, our experimental results suggest that relying on forward porting-based ground truth and verification metrics could lead to misleading evaluations of fuzzer performance. Ultimately, we propose insights into the development of fuzzing benchmarks to ensure more dependable assessments of fuzzers.

Place, publisher, year, edition, pages
Elsevier, 2024
Keywords
Benchmark, Fuzzer evaluation, Ground truth, Software bugs, Vulnerability detection
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-220847 (URN)10.1016/j.ins.2024.120142 (DOI)001182200300001 ()2-s2.0-85183942212 (Scopus ID)
Funder
The Kempe Foundations, 570092151
Available from: 2024-02-20 Created: 2024-02-20 Last updated: 2025-04-24Bibliographically approved
Zhang, C., Xu, Y., Elahi, H., Zhang, D., Tan, Y., Chen, J. & Zhang, Y. (2023). A Blockchain-based Model Migration Approach for Secure and Sustainable Federated Learning in IoT Systems. IEEE Internet of Things Journal, 10(8), 6574-6585
Open this publication in new window or tab >>A Blockchain-based Model Migration Approach for Secure and Sustainable Federated Learning in IoT Systems
Show others...
2023 (English)In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 10, no 8, p. 6574-6585Article in journal (Refereed) Published
Abstract [en]

Model migration can accelerate model convergence during federated learning on the Internet of Things (IoT) devices and reduce training costs by transferring feature extractors from fast to slow devices, which, in turn, enables sustainable computing. However, malicious or lazy devices may migrate the fake models or resist sharing models for their benefit, reducing the desired efficiency and reliability of a federated learning system. To this end, this work presents a blockchain-based model migration approach for resource-constrained IoT systems. The proposed approach aims to achieve secure model migration and speed up model training while minimizing computation cost. We first develop an incentive mechanism considering the economic benefits of fast devices, which breaks the Nash equilibrium established by lazy devices and encourages capable devices to train and share models. Second, we design a clustering-based algorithm for identifying malicious devices and preventing them from defrauding incentives. Third, we use blockchain to ensure trustworthiness in model migration and incentive processes. Blockchain records the interaction between the central server and IoT devices and runs the incentive algorithm without exposing the devices’ private data. Theoretical analysis and experimental results show that the proposed approach can accelerate federated learning rates, reduce model training computation costs to increase sustainability, and resist malicious attacks.

Place, publisher, year, edition, pages
IEEE, 2023
Keywords
Blockchain, Blockchains, Collaborative work, Computational modeling, Costs, Data models, federated learning, IoT, security., Servers, sustainable computing, Training, training acceleration
National Category
Computer Sciences Computer Engineering Information Systems
Identifiers
urn:nbn:se:umu:diva-194857 (URN)10.1109/JIOT.2022.3171926 (DOI)000968830500005 ()2-s2.0-85129583318 (Scopus ID)
Available from: 2022-06-07 Created: 2022-06-07 Last updated: 2023-09-05Bibliographically approved
Ali, I., Shehzad, M. N., Bashir, Q., Elahi, H., Awais, M. N., Geman, O. & Liu, P. (2023). A thermal-aware scheduling algorithm for reducing thermal risks in DAG-based applications in cyber-physical systems. In: Guojun Wang; Kim-Kwang Raymond Choo; Jie Wu; Ernesto Damiani (Ed.), Ubiquitous security: second international conference, Ubisec 2022, Zhangjiajie, China, December 28–31, 2022, revised selected papers. Paper presented at 2nd International Conference on Ubiquitous Security, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022. (pp. 497-508). Singapore: Springer
Open this publication in new window or tab >>A thermal-aware scheduling algorithm for reducing thermal risks in DAG-based applications in cyber-physical systems
Show others...
2023 (English)In: Ubiquitous security: second international conference, Ubisec 2022, Zhangjiajie, China, December 28–31, 2022, revised selected papers / [ed] Guojun Wang; Kim-Kwang Raymond Choo; Jie Wu; Ernesto Damiani, Singapore: Springer, 2023, p. 497-508Conference paper, Published paper (Refereed)
Abstract [en]

Directed Acyclic Graph (DAG)-based scheduling applications are critical to resource allocation in the Cloud, Edge, and Fog layers of cyber-physical systems (CPS). However, thermal anomalies in DVFS-enabled homogeneous multiprocessor systems (HMSS) may be exploited by malicious applications posing risks to the availability of the underlying CPS. This can negatively affect the trustworthiness of CPS. This paper proposes an algorithm to address the thermal risks in DVFS-enabled HMSS for periodic DAG-based applications. It also improves the current list scheduling-based Depth-First and Breadth-First techniques without violating the timing constraints of the system. We test the algorithm using standard benchmarks and synthetic applications in a simulation setup. The results show a reduction in the temperature peaks by up to 30%, average temperature by up to 22%, temperature variations up to 3 times, and temperature spatial gradients by up to 4 times as compared to the conventional Depth-First Scheduling algorithms.

Place, publisher, year, edition, pages
Singapore: Springer, 2023
Series
Communications in Computer and Information Science, ISSN 1865-0929, E-ISSN 1865-0937 ; 1768
Keywords
Cloud computing, Cyber-physical systems, Edge computing, Thermal-risks, Trust
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:umu:diva-206446 (URN)10.1007/978-981-99-0272-9_34 (DOI)2-s2.0-85151049711 (Scopus ID)978-981-99-0271-2 (ISBN)978-981-99-0272-9 (ISBN)
Conference
2nd International Conference on Ubiquitous Security, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022.
Available from: 2023-04-06 Created: 2023-04-06 Last updated: 2023-04-06Bibliographically approved
Liu, Z., Xu, Y., Zhang, C., Elahi, H. & Zhou, X. (2022). A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles. Digital Communications and Networks, 8(6), 976-983
Open this publication in new window or tab >>A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles
Show others...
2022 (English)In: Digital Communications and Networks, ISSN 2468-5925, E-ISSN 2352-8648, Vol. 8, no 6, p. 976-983Article in journal (Refereed) Published
Abstract [en]

Social Internet of Vehicles (SIoV) falls under the umbrella of social Internet of Things (IoT), where vehicles are socially connected to other vehicles and roadside units that can reliably share information and services with other social entities by leveraging the capabilities of 5G technology, which brings new opportunities and challenges, e.g., collaborative power trading can address the mileage anxiety of electric vehicles. However, it relies on a trusted central party for scheduling, which introduces performance bottlenecks and cannot be set up in a distributed network, in addition, the lack of transparency in state-of-the-art Vehicle-to-Vehicle (V2V) power trading schemes can introduce further trust issues. In this paper, we propose a blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social vehicular networks that uses a distributed market mechanism to introduce trusted power trading and avoids the dependence on a centralized dispatch center. Based on the game theory, we design the pricing and trading matching mechanism for V2V power trading to obtain maximum social welfare. We use blockchain to record power trading data for trusted pricing and use smart contracts for transaction matching. The simulation results verify the effectiveness of the proposed scheme in improving social welfare and reducing the load on the grid.

Place, publisher, year, edition, pages
Elsevier, 2022
Keywords
5G, Blockchain, Collaborative power trading, Social internet of vehicles, Vehicle-to-vehicle charging
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-201640 (URN)10.1016/j.dcan.2022.10.014 (DOI)000920186000001 ()2-s2.0-85143124132 (Scopus ID)
Available from: 2022-12-13 Created: 2022-12-13 Last updated: 2023-09-05Bibliographically approved
Izdrui, D. R., Geman, O., Vicoveanu, D., Curea, S., Postolache, O.-A. & Elahi, H. (2022). Smart sensing and actuators for people with hand motion impairment. In: Valentina Emilia Balas; Oana Geman (Ed.), Biomedical engineering applications for people with disabilities and the elderly in the COVID-19 pandemic and beyond: (pp. 241-259). London: Academic Press
Open this publication in new window or tab >>Smart sensing and actuators for people with hand motion impairment
Show others...
2022 (English)In: Biomedical engineering applications for people with disabilities and the elderly in the COVID-19 pandemic and beyond / [ed] Valentina Emilia Balas; Oana Geman, London: Academic Press, 2022, p. 241-259Chapter in book (Refereed)
Abstract [en]

Assistive technology (AT) supports individuals who experience difficulties in carrying out daily life physical activities, for example, people with disabilities, the elderly, and people with chronic diseases, such as diabetes, bone and joint disorders, heart disease, or stroke. Thanks to assistive technologies, these patients can regain their independence by using permissive devices to carry out physical activities without human assistance, and in ways that mirror healthy individuals. Hence, ATs support the autonomy of people who have been physically limited or have cognitive dysfunction. AT is also known as access technology, including mechanical, optical, electronic, and computer solutions to benefit people with sensory or motor impairments, thus allowing them to perform routine tasks that were previously impossible to execute. This chapter presents a prosthesis that has been designed for people with locomotor disabilities and deficiencies. The device is low cost, has low energy consumption, and is easy to use by a person with a hand disability. The subsequent developing stage will consist of transitioning from a traditional prosthesis to a neuroprosthesis, by using sensor networks and controlling the device (bionic prosthesis) through smart sensors and actuators, with control systems having microcontroller unit (MCU), brain-computer interface, and NextMind interfaces.

Place, publisher, year, edition, pages
London: Academic Press, 2022
Keywords
Actuators, Assessment, BCI, Hand motion impairment, Neuroprosthesis, Smart sensing
National Category
Occupational Therapy Information Systems
Identifiers
urn:nbn:se:umu:diva-200246 (URN)10.1016/B978-0-323-85174-9.00002-9 (DOI)2-s2.0-85138848459 (Scopus ID)978-0-323-85174-9 (ISBN)978-0-323-85190-9 (ISBN)
Available from: 2022-10-17 Created: 2022-10-17 Last updated: 2022-10-17Bibliographically approved
Organisations

Search in DiVA

Show all publications