Below, you’ll find my publications organized by publication type and year. Feel free to reach out to me via email for questions on any specific pubications.

Research Papers and Abstracts

2023

[2023] Nicholas Phillips and Aisha Ali-GombeSPVExec and SPVLUExec - A Novel Realtime Defensive Tool for Stealthy Malware Infection.” International Journal On Advances in Security, Volume 16, Number 1 and 2, pages 72-85, 

[2023] Ramyapandian Vijayakanthan, Irfan Ahmed and Aisha Ali-Gombe, “SWMAT: Mel-frequency Cepstral Coefficients-based Memory Fingerprinting for IoT Devices.” Computers & Security, Volume 132, 2023, 103298, ISSN 0167-4048, ISSN: 1942-2636

[2023] Aisha Ali-Gombe, Sneha Sudhakaran, Ramyapandian Vijayakanthan, Golden G. Richard, RGB_Mem: At the intersection of memory forensics and machine learning." Forensic Science International: Digital Investigation, Volume 45, Supplement, 2023, 301564, ISSN 2666-2817

[2023] Aisha Ali-Gombe, Sneha Sudhakaran, and Golden G. Richard III, “Leveraging Memory Forensics Artifacts for Android Malware Classification.” (AAFS 2023) (Extended Abstract)

2022

[2022] Nicholas Phillips and Aisha Ali-GombeSterilized Persistence Vectors (SPVs): Defense Through Deception on Windows Systems.” In the proceedings of the Seventh International Conference on Cyber-Technologies and Cyber-Systems (CYBER 2022): ThinkMind Digital Library

[2022] Mona M Alnahari, Joyram Chakraborty, Mona Mohamed, and Aisha Ali- Gombe, “ Arabic web accessibility analysis: findings from a usability study of Arabian web developers.” Human-Intelligent Systems Integration, 4, 81-96 (2022)

[2022] Nicholas Phillips and Aisha Ali-Gombe “Longitudinal Study of Persistence Vectors (PVs) in Windows Malware: Evolution, Complexity, and Stealthiness.” In the proceedings of the Sixteenth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2022): ThinkMind Digital Library

[2022] Modhuparna Manna, Andrew Case, Aisha Ali-Gombe, and Golden G. Richard III, “Memory Analysis of .NET and .Net Core Applications.” (DFRWS 2022: 301404) (Best Paper)

[2022] Ramyapandian Vijayakanthan, Irfan Ahmed, Aisha Ali-Gombe, “Transforming Memory Image to Sound Wave Signals for an Effective IoT Fingerprinting.”ACM Conference on Data and Application Security and Privacy (CODASPY 2022)

[2022] Elizabeth Miller, Md Rashedur Rahman, Moinul Hossain, Aisha Ali-Gombe, “I Don’t Know Why You Need My Data: A Case Study of Popular Social Media Privacy Policies.”ACM Conference on Data and Application Security and Privacy (CODASPY 2022)

[2022] Sneha Sudhakaran, Aisha Ali-Gombe, Andrew Case, and Golden G. Richard III. “Evaluating the Reliability of Android Userland Memory Forensics.” In Proceedings of the 17th International Conference on Cyber Warfare and Security (ICCWS 2022)

[2022] Rahman, Md Rashedur, Elizabeth Miller, Moinul Hossain, and Aisha Ali- Gombe. “Intent-Aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps.” In Proceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP 2022)

[2022] Sneha Sudhakaran, Aisha Ali-Gombe, Golden G. Richard III, “Examining the correlation of Garbage Collection and Object Recovery in Userland Memory Forensics.” In the 74th American Academy for Forensic Sciences Forum (AAFS 2022) (Extended Abstract)

2021

[2021] Modhuparna Manna, Andrew Case, Aisha Ali-Gombe, and Golden G. Richard III, “Modern macOS userland runtime analysis.”Forensic Science International: Digital Investigation 38 (2021): 301221

[2021] Golden G. Richard III, Andrew Case, Modhuparna Manna, Elsa A. M. Hahne, and Aisha Ali-Gombe, “Digital Investigation and the Trojan Defense, Revisited.” Crime Science and Digital Forensics: A Holistic View, (Book Chapter)

[2021] Nicholson, Stacy, Joyram Chakraborty, Aisha Ali-Gombe, and Robert J. Hammell II. “Data Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook.” In Proceedings of the Conference on Information Systems Applied Research ISSN, vol. 2167, p. 1508. 2021.

[2021] Bassam Zahran, Adamu Hussaini, Aisha Ali-Gombe, “Security of IT/OT Convergence: Design and Implementation Challenges.”In Proceedings of the 22nd International Conference on Internet Computing & IoT ICOMP co-located with The 2021 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE’21)

[2021] Ryan D. Maggio, Andrew Case, Aisha Ali-Gombe, and Golden G. Richard III, “Seance: Divination of tool-breaking changes in forensically important binaries.”Forensic Science International: Digital Investigation 37 (DFRWS 2021: 301189) (Best Student Paper)

[2021] Adamu Hussaini, Bassam Zahran, Aisha Ali-Gombe, “Object Allocation Pattern as an Indicator for Maliciousness-An Exploratory Analysis.” In Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy (CODASPY 2021)

[2021] Bassam Zahran, Adamu Hussaini, Aisha Ali-Gombe, “IoT-ARAS: IIoT/ICS Automated Risk Assessment System for Prediction and Prevention.” In Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy (CODASPY 2021)

[2021] Aisha Ali-Gombe, Golden G. Richard III, “The Recreation and Visualization of Runtime Objects Relationship From Process Memory Images”, In the 73rd Annual Meeting of the American Academy of Forensic Sciences Forum (AAFS 2021) (Extended Abstract)

[2021] Sneha Sudhakaran, Aisha Ali-Gombe, Golden G. Richard III, “Examining the Impact of Garbage Collection and Process States in Userland Memory Forensics”, In the 73rd Annual Meeting of the American Academy of Forensic Sciences Forum (AAFS 2021) (Extended Abstract)

2020

[2020] Andrew Case, Ryan D. Maggio, Md Firoz-Ul-Amin, Mohammad M. Jalalzai, Aisha Ali-Gombe, Mingxuan Sun, and Golden G. Richard III. ”Hooktracer: Automatic Detection and Analysis of Keystroke Loggers Using Memory Forensics.” Computers & Security (2020): 101872

[2020] Sneha Sudhakaran, Aisha Ali-Gombe, Andrew Case, Augustine Orgah and Golden G. Richard III. “AmpleDroid Recovering Large Object Files from Android

Application Memory.” In IEEE International Workshop on Information Forensics and Security (WIFS 2020)

[2020] Aisha Ali-Gombe, Alexandra Tambaoan, Angela Gurfolino and Golden G. Richard III. “App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts.” In Annual Computer Security Applications Conference (ACSAC 2020) (Acceptance rate (23%): 70 full-papers / 302 full-paper submissions)

2019

[2019] Aisha Ali-Gombe, Sneha Sudhakaran, Andrew Case, and Golden G. Richard III. “DroidScraper: A Tool for Android In-Memory Object Recovery and Reconstruction.” In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), September 2019, Beijing, China. (Acceptance rate (22.2%): 37 full-papers / 166 full-paper submissions)

[2019] Bassam Zahran, Stacy Nicholson, and Aisha Ali-Gombe. ”Cross-Platform Malware: Study of the Forthcoming Hazard Adaptation and Behavior.” In Proceedings of the International Conference on Security and Management (SAM 2019), July 2019, Las Vegas, NV .

[2019] Aisha Ali-Gombe, Sneha Kalliat, Andrew Case, Golden G. Richard III, “Proving Database Tampering Through In-Memory Object Reconstruction”, In the 71st Annual Meeting of the American Academy of Forensic Sciences Forum (AAFS’19), February 2019, Baltimore, MD. (Extended Abstract).

[2019] Arian Shahmirza, Aisha Ali-Gombe, Andrew Case,Golden G. Richard III, ’Fuzzing Memory Forensics Frameworks”, In the 71st Annual Meeting of the American Academy of Forensic Sciences Forum (AAFS’19), February 2019, Baltimore, MD. (Extended Abstract).

[2019] Andrew Case, Mohammad M. Jalalzai, Md Firoz-Ul-Amin, Ryan D. Maggio, Aisha Ali-Gombe, Mingxuan Sun, and Golden G. Richard III. ”HookTracer: A System for Automated and Accessible API Hooks Analysis.” (DFRWS 2019) July 2019, Portland, OR: S104-S112.

2018

[2018] Aisha Ali-Gombe, Brendan Saltaformaggio, Ram J. Ramanujam, Dongyan Xu, and Golden G. Richard III. “Towards a more dependable hybrid analysis of android malware using aspect-oriented programming.” Computers & Security, v. 73, (p. 235- 248).

[2018] Nathan Lewis, Andrew Case, Aisha Ali-Gombe, Golden G. Richard III, ”Memory Forensics and the Windows Subsystem for Linux,“(DFRWS 2018) July 2018, Providence, RI: S3-S11 (Best Student Paper).

[2018] Rohit Bhatia, Brendan Saltaformaggio, Seung Jei Yang, Aisha Ali-Gombe, Xiangyu Zhang, Dongyan Xu, Golden G. Richard III, ”Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images,” Proceedings of the 2018 Network and Distributed System Security Symposium (NDSS 2018), February 2018, San Diego, CA. (Acceptance rate (16.1%): 68 full-papers / 420 full-paper submissions).

2017

[2017] Aisha Ali-Gombe, Golden G. Richard III, “Detecting Causality through Fine-Grain Logging in Digital Investigations”, In the 69th Annual Meeting of the American Academy of Forensic Sciences Forum (AAFS), February 2017, (p. 585), New Orleans, LA. - (Extended Abstract).

2016

[2016] Aisha Ali-Gombe, Golden G. Richard III, Irfan Ahmed, Vassil Roussev, “Don’t Touch that Column: Portable, Fine-Grained Access Control for Android’s Native Content Providers”, In the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec‘16), July 2016, Darmstadt, Germany. (Acceptance rate (26%): 13 full-papers / 51 full-paper submissions)

[2016] Aisha Ali-Gombe, Irfan Ahmed, Golden G. Richard III, Vassil Roussev, “AspectDroid: Android App Analysis System”, In 6th ACM Conference on Data and Application Security and Privacy (CODASPY‘16), (pp. 145-147), New Orleans, LA. (Short Paper).

2015

[2015] Aisha Ali-Gombe, Irfan Ahmed, Golden G. Richard III, Vassil Roussev, “OpSeq: Android Malware Fingerprinting”, In the 5th Program Protection and Reverse Engineering Workshop (PPREW ‘15), In conjunction with 31st Annual Computer Security Applications Conference (ACSAC’15), December 2015, Los Angeles, CA, USA.

[2015] Irfan Ahmed, Vassil Roussev, Aisha Ali-Gombe, “Robust Fingerprinting for Relocatable Code”, In the 5th ACM Conference on Data and Application Security and Privacy (CODASPY‘15), March 2015, (pp. 219-229), San Antonio, TX, USA. (Acceptance rate (21%): 19 full papers / 91 submissions)

[2015] Irfan Ahmed, Vassil Roussev, Aisha Ali-Gombe, “Memory Forensics: Reliable In-Memory Code Identification Using Relocatable Pointers”, In the 67th Annual Meeting of the American Academy of Forensic Sciences (AAFS), February 2015, (p. 504), Orlando, FL, USA. (Extended Abstract).

Posters

2013-2023

[2021] Sneha Sudhakaran, Aisha Ali-Gombe, Golden G. Richard III, “On Reliability of Userland Memory Forensics”, In the Women in Cybersecurity Conference (WICYS 2021).

[2021] Adamu Hussaini, Bassam Zahran, Aisha Ali-Gombe, “Object Allocation Pattern as an Indicator for Maliciousness-An Exploratory Analysis.”In Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy (CODASPY 2021), Virtual.

[2021] Bassam Zahran, Adamu Hussaini, Aisha Ali-Gombe, “IoT-ARAS: IIoT/ICS Automated Risk Assessment System for Prediction and Prevention.”In Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy (CODASPY, 2021), Virtual.

[2019] Aisha Ali-Gombe, Golden G. Richard III, “Introducing Active Learning to Malware Analysis Curriculum - Mod 4-6’, Cybersecurity Education Workshop (CyberEd ‘19), Santa Fe, NM.

[2018] Aisha Ali-Gombe, Golden G. Richard III, “Advanced Malware Analysis using Software Instrumentation’, National Cybersecurity Curriculum Program (NCCP) End of Grant Expo in Conjunction with CAE Symposium 2018, Miami, FL.

[2018] Aisha Ali-Gombe, Golden G. Richard III, “Introducing Active Learning to Malware Analysis Curriculum - Mod 1-3’, Cybersecurity Education Workshop (CyberEd ‘18), Lake Tahoe, CA.

[2016] Aisha Ali-Gombe, Chitra Saini, Golden G. Richard III, “Enforcing Privacy on Android Apps Via On-Demand App Instrumentation”, In 25th Usenix Security Symposium (USENIX Security‘16), Austin, TX.

[2016] Aisha Ali-Gombe, Irfan Ahmed, Golden G. Richard III, Vassil Roussev, “AspectDroid: Android App Analysis System”, In 6th ACM Conference on Data and Application Security and Privacy (CODASPY‘16), New Orleans, LA.

[2013] Aisha Ali-Gombe, Irfan Ahmed, Golden G. Richard III, “DROIDHOOK: Android MalApp Detection Through Context”, In 29th Annual Computer Security Applications Conference (ACSAC’13), December 2013, New Orleans, LA.


Thesis and Dissertation

2012-2023

[2017] Aisha Ali-Gombe, “Malware Analysis and Privacy Policy Enforcement Techniques for Android Applications”, May 2017 (Ph.D. Dissertation).

[2012] Aisha Ali-Gombe, “Volatile Memory Message Carving: A Per-Process Basis Approach”, December 2012 (Masters Thesis).