Hossein Fereidooni

Postdoctoral Researcher

Mornewegstraße 30
D-64293 Darmstadt
GERMANY

Building: S4|14
Room:4.1.15
Office:+49 (0)6151 / 16 - 25325
Mobile:+49 (0)1590 58 78 177
Email:

hossein.fereidooni(a-t)trust.tu-darmstadt.de

Website:https://www.trust.informatik.tu-darmstadt.de/people/Hossein-Fereidooni/

 

Vita

Since 2017

Postdoctoral Researcher

at CYSEC and Technische Universität DarmstadtGermany

2014-2017

Ph.D. Computer Science

at University of Padua, Italy

2016-2017

Visiting Ph.D. Student

at CYSEC and Technische Universität DarmstadtGermany

2007-2009

M.Sc. Electrical Engineering

at The Amirkabir University of Technology, Tehran, Iran

2002-2006

B.Sc. Biomedical Engineering

at The Amirkabir University of Technology, Tehran, Iran

 

Awards

  • Research Grants for Doctoral Candidates and Young Academics and Scientists, funded by the German Academic Exchange Service (DAAD) from October 2016 to June 2017.

 

 

Publications

Fitness Trackers: Fit for Health but Unfit for Security and Privacy

Author Hossein Fereidooni, Tommaso Frassetto, Markus Miettinen, Ahmad-Reza Sadeghi, Mauro Conti
Date July 2017
Kind Inproceedings
Book titleThe Second IEEE International Workshop on Safe, Energy-Aware, & Reliable Connected Health (CHASE-SEARCH)
LocationPhiladelphia, Pennsylvania, USA
KeyTUD-CS-2017-0188
Research Areas System Security Lab
Abstract Wearable devices for fitness tracking and health monitoring have gained considerable popularity and become one of the fastest growing smart devices market. More and more companies are offering integrated health and activity monitoring solutions for fitness trackers. Recently insurances are offering their customers better conditions for health and condition monitoring. However, the extensive sensitive information collected by tracking products and accessibility by third party service providers poses vital security and privacy challenges on the employed solutions. In this paper, we present our security analysis of a representative sample of current fitness tracking products on the market. In particular, we focus on malicious user setting that aims at injecting false data into the cloud-based services leading to erroneous data analytics. We show that none of these products can provide data integrity, authenticity and confidentiality.
[Export this entry to BibTeX]
[Back to List-View]

Important Copyright Notice:

The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

Previous Publications

ANASTASIA: ANdroid mAlware detection using STAtic analySIs of Applications
Hossein Fereidooni, Mauro Conti, Alessandro Sperduti, Danfeng Yao
In: Proceedings of 8th IFIP International Conference on New Technologies, Mobility & Security (NTMS), Cyprus, 21-23th November 2016

Efficient Classification of Android Malware in the wild using Robust Static Features
Hossein Fereidooni, Veelasha Moonsamy, Mauro Conti, Lejla Batina
Book Chapter: In Protecting Mobile Networks and Devices: Challenges and Solutions, CRC Press - Taylor & Francis, 2016 (Editors: Weizhi Meng, Xiapu Luo, Jianying Zhou, Steven Furnell)

Technical Report: Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions
Parvez Faruki, Hossein Fereidooni, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti
2016

Secure Message Delivery Games for Device-to-Device Communications
Emmanouil Panaousis, Tansu Alpcan, Hossein Fereidooni, Mauro Conti
In Proceedings of 5th International Conference, on Decision and Game Theory for Security (GameSec 2014), Los Angeles, CA, USA, November 6-7th, 2014

E2E KEEP: End To End Key Exchange and Encryption Protocol for accelerated satellite networks
H. Fereidooni, H. Taheri, M. Mahramian
IJCNS International Journal of Communications, Network and System Sciences, Vol.5, No.4, April 2012

ML-IPSec+: An End to End Accelerated VPN for Satellite Links
H. Fereidooni, A. Parichehreh, H. Taheri, M. Mahramian, B. Eliasi
IJCSNS International Journal of Computer Science and Network Security, Vol.9, No.1, January 2009

A new Authentication and Key Exchange Protocol for Insecure Networks
H. Fereidooni, H. Taheri, M. Mahramian
The 5th International IEEE Conference on Wireless Communications, Networking and Mobile Computing (WICOM), China, 24-26th September, 2009

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang