Sahar Sadat Seyed Mazloom Email: sseyedma@gmu.edu http://mason.gmu.edu/~sseyedma/index.html RESEARCH INTEREST Current Research: Secure Computation, Differential Privacy, Applied Cryptography, Application/Protocol Security Analysis, Reverse Engineering and Penetration Testing (Software & Hardware). Past Topics: Vehicle Security, Embedded Systems Security, Malware Analysis and Reverse Engineering, Cloud Computing, Network Security (primarily for Wireless Networks), Broadcast Encryption and Traitor Tracing, Machine Learning, Soft Computing Techniques, Chaotic Systems, Content-based Image Retrieval, Image Processing and Coding. EDUCATION Ph.D. Candidate Computer Science Security Lab at Computer Science Department, George Mason University, Fairfax, VA, USA, Aug 2013-Current. Ph.D. Computer Science (Transferred) Internet Laboratory at Computer Science Department, New Jersey Institute of Technology, Newark, NJ, USA, Jan-July 2013. Master of Science (Honors) Artificial Intelligence Faculty of Electrical, Computer and IT Engineering, Azad University, Qazvin, Iran, Sep 2009. Bachelor of Science (Honors) Computer Engineering Faculty of Computer Engineering, Azad University, Tehran, Iran, Jun 2006. RESEARCH OVERVIEW • Secure Multi-Party Computation • Differential Privacy • Application/Protocol Security Analysis • Reverse Engineering and Penetration Testing (Software Hardware) • Security analysis on In-Vehicle Infotainment System (IVI) • Malware Analysis and Reverse Engineering • Smart Placement and Migration of Virtual Machines on Cloud • Broadcast Encryption and Traitor Tracing • Key Managment Framework for Homogenous Mobile and Static Wireless Sensor Networks • Three-dimensional Face Recognition System • Chaos-based Image Encryption PUBLICATION Journal: Color image encryption algorithm based on Coupled Nonlinear Chaotic Map, Sahar Mazloom, Amir-Masud Eftekhari-Moghadam. Journal of Chaos, Solitons & Fractals, Elsevier, vol. 42, Issue. 3, pp. 1745-1754, Nov 2009 Conference: A Security Analysis of an In Vehicle Infotainment and App Platform, Sahar Mazloom, Mohammad Rezaeirad, Aaron Hunter, Damon McCoy, 10th USENIX Workshop on Offensive Technologies (WOOT). 2016 Conference: A cluster-based key management framework for resource constraint networks, Mohammad Rezaeirad, Sahar Mazloom, Mahdi Orooji, Dmitri D. Perkins, Magdy A. Bayoumi, IRI 2014: 413-419, Aug 2014 Conference: Investigating the feasibility of LEAP+ in ZigBee specification, Mohammad Rezaeirad, Sahar Mazloom, Muhammad Aamir Iqbal, Dmitri D. Perkins, Magdy A. Bayoumi, IRI 2014: 406-412, Aug 2014 Conference: A novel clustering paradigm for key pre-distribution: Toward a better security in homogenous WSNs, Mohammad Rezaeirad, Mahdi Orooji, Sahar Mazloom, Dmitri Perkins and Magdy Bayoumi. CCNC13, Jan 2013 Conference: Color Image Cryptosystem using Chaotic Maps, Sahar Mazloom, AmirMasud Eftekhari-Moghadam. SSCI, Apr 2011 SKILL AND TOOLS • Bytecode and raw Binary Analysis Tools: IDA-Pro, PE Explorer’s disassembler, OllyDbg • Software Static and Dynamic Debugging and Analysis Tools: Visual Studio Remote Tools, DDMS, WifiADB, IDA-Pro, Bytecode/Sourcecode Visualizer, Dependency Walker, Heap Walker • Malware and APT Analysis Tools: Immunity Debugger, ChopShop, Calamine, Cuckoo Sandbox • Security Analysis and Penetration Testing Tools: Scapy (Packet Injection), Metasploit, Nessus, Wireshark, Nmap, Kismet • Decompilation (Android) and Disassembly (Android, x86, MIPS) Tools: JEB, APKtool, Smali/baksmali, APKManager, androguard, JReversePro, Dex2jar • Retargeting Android Applications Tools: Dare, Soot toolkit, FlowDroid, ded • Cloud Computing Tools: Amazon AWS, Hadoop, Cloudera, OpenStack, GreenPlum • Programming Languages & Libraries: Python , C/C++, x86 Assembly, MIPS Assembly, JAVA, Android Development, Map-Reduce, HIPI, OpenSSL, OpenCV, OpenGL, Half Edge • Operating Systems Linux, OSX, Windows SELECTED COURSES Secure Software Design and Programming, Cryptography Engineering, Strategic Thinking for Cyber Security, Theory of Computation, Analysis of Algorithms, Cloud Computing, Network Protocols Security, Information Theory, Data Security & Privacy, Data Communications & Networking, System Analysis & Design, Internet & Higher Layer Protocols, Machine Learning, Machine Vision, Pattern Recognition, Fuzzy Logic Systems, Evolutionary Algorithm, Digital Image Processing, Advanced Artificial Intelligence, Digital Watermarking, Operating systems. AWARD & MEMBERSHIP • Awarded with Graduate Teaching Assistantship from George Mason University, (Spring 2016). • Awarded with Graduate Research Assistantship from George Mason University, (Fall 2015). • Awarded with Research Assistantship from General Motors, (Fall 2014-Summer 2015). • Awarded with Graduate Research Assistantship from George Mason University, (Fall 2013-Summer 2014). • Awarded with Graduate Assistantship from New Jersey Institute of Technology, (Spring 2013). • Awarded with Research Assistantship at University of Louisiana at Lafayette, (Spring 2012-Fall 2012). • Member of IEEE-CS at University of Louisiana at Lafayette Student Chapter, (Spring 2012-Fall 2012). • Qualified to continue graduate studies to Ph.D. program, exempted to take the nationwide entrance examination of Iranian Universities, (2010). • Master thesis is qualified as the Premier Research Project in Faculty of Electrical, Computer and IT Engineering, Qazvin University, (2010). • Grant offered by the IRIB(Iran Broadcasting Organization) for research, (2009 2010). • Ranked 1st among all Computer Engineering students, Faculty of Electrical, Computer and IT Engineering, Qazvin University, (2006 - 2009). • Qualified to continue graduate studies to Master’s program, exempted to take the nationwide entrance examination of Iranian Universities, (2006). • Ranked 2nd among all Computer Engineering students, Faculty of Computer Engineering, Tehran North Branch University, (2002 - 2006). RESEARCH EXPERIENCE Research Assistant and Member of Security Lab, George Mason University. Supervisor: Dr. Dov Gordon, Spring 2016-Present Research Assistant and Member of Security Lab, George Mason University. Supervisor: Dr. Angelos Stavrou and Dr. Damon McCoy, Summer 2015-Fall 2016 Research Assistant and Member of Security Lab, George Mason University. Supervisor: Dr. Damon McCoy. Working on Car Hacking and Infotainment System Reverse Engineering, Fall 2013-Spring 2015. Research Assistant and Member of Internet Lab, New Jersey Institute of Technology. Supervisor: Dr. Christian Borcea. Working on Smart Virtual Machine Placement and Migration in Cloud, Spring 2013. Research Assistant and Member of iWIN Lab, University of Louisiana at Lafayette. Supervisor: Dr. Miao Jin. Working on Wireless Sensor Network Security. Spring 2012-Fall 2012. Research Associate and Member of Image Processing Lab, University of Tehran. Supervisor: Prof. H. Soltanian-Zadeh. Working on Soccer Video Analysis Systems for IRIB (Iran Broadcasting Organization), 2009-2010. TEACHING EXPERIENCE Computer Systems Architecture, George Mason University, Fairfax, VA, Spring 2016. Computer Programming for Engineers, George Mason University, Fairfax, VA, Spring 2016. Image Processing, New Jersey Institute of Technology, Newark, USA 2013. JAVA Programming Language, New Jersey Institute of Technology, Newark, USA 2013. Assembly and Machine Language, Azad University, Qazvin, Iran 2009-2010. Advanced Computer Programming, Azad University, Qazvin, Iran 2009-2010. Artificial Intelligence, Payam-Noor University, Tehran, Iran 2009. Advanced Computer Programming, Payam-Noor University, Tehran, Iran 2009. Programming with C++ and MATLAB, A private Computer Programming Institute, Tehran, Iran 2009. REVIEWER Elsevier Information Sciences Elsevier Optics and Lasers in Engineering Optics Laser Technology Optik - International Journal for Light and Electron Optics Circuits, Systems, and Signal Processing (CSSP) EURASIP Journal on Advances in Signal Processing. Journal of Computer Science and Technology Annual Conference of the IEEE Industrial Electronics Society (IECON) IEEE International Symposium on Industrial Electronics (ISIE) IET Image Processing journal