About me:
Hello! I am Ali Ahad, a Ph.D. Student in the Electrical and Computer Engineering Department at the University of Maryland (UMD). I am currently being advised by Prof. Yonghwi Kwon. My primary research focus lies in the broad spectrum of Software Systems Security and System Forensics.
Research interests:
My current research interests include Systems and Software security, Program analysis, Reverse Engineering, and Forensics.
I am currently exploring the security flaws of reverse engineering tools to make forensic analysis more robust and efficient.
News:
- May ‘24: Joined Nvidia as “System Software Intern, Data Center System Security” for Summer’24 👨💼
- Jan ‘24: Enrolled at UMD to continue my PhD at their ECE Department! 📚
- Nov ‘23: I will be following my lab and join UMD in Spring’24 to continue my Ph.D there! 🏃♂️➡️
- Sep ‘23: Joined Nvidia as “Software Intern, Security” for Fall’23 👨💼
- July ‘23: Completed my MS at UVA! 🎓
- May ‘23: Passed my Ph.D. Qualifying Exam! ✅⏳
- April ‘23: “FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation” accepted in ASPLOS’24 🥳
- Nov ‘22: “PyFET: Forensically Equivalent Transformation for Python Binary Decompilation” accepted in S&P’23 🥳
- Nov ‘21: “SwarmFlawFinder: Discovering and Exploiting Logic Flaws of Swarm Algorithms” accepted in S&P’22 🥳
- Sep ‘21: “Forensic Analysis of Configuration-based Attacks” accepted in NDSS’22 🥳
- May ‘21: “Swarmbug: Debugging Configuration Bugs in Swarm Robotics” accepted in FSE’21 🥳
- March ‘21: “Spinner: Automated Dynamic Command Subsystem Perturbation” accepted in CCS’21 🥳
Publications:
“FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation”: Ali Ahad, Gang Wang, Chung Hwan Kim, Suman Jana, Zhiqiang Lin, and Yonghwi Kwon, In Proc. of the 29th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS ‘24)
“PyFET: Forensically Equivalent Transformation for Python Binary Decompilation”: Ali Ahad, Chijung Jung, Ammar Askar, Doowon Kim, Taesoo Kim, and Yonghwi Kwon, In Proc. of the 44th IEEE Symposium on Security and Privacy (S&P ‘23)
“SwarmFlawFinder: Discovering and Exploiting Logic Flaws of Swarm Algorithms”: Chijung Jung, Ali Ahad, Yuseok Jeon, and Yonghwi Kwon, In Proc. of the 43rd IEEE Symposium on Security and Privacy (S&P ‘22)
“Forensic Analysis of Configuration-based Attacks”: Muhammad Adil Inam, Wajih Ul Hassan, Ali Ahad, Adam Bates, Rashid Tahir, Tianyin Xu, and Fareed Zaffar, In Proc. of the 29th Network and Distributed System Security Symposium (NDSS ‘22)
“Swarmbug: Debugging Configuration Bugs in Swarm Robotics”: Chijung Jung, Ali Ahad, Jinho Jung, Sebastian Elbaum, and Yonghwi Kwon, In Proc. of 29th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE ‘21)
“Spinner: Automated Dynamic Command Subsystem Perturbation”: Meng Wang, Chijung Jung, Ali Ahad, and Yonghwi Kwon, In Proc. of 28th ACM Conference on Computer and Communications Security (CCS ‘21)