Dr Rahat Masood

Dr Rahat Masood

Lecturer
  • PhD. in Information Security and Privacy (UNSW, Data61-CSIRO - Australia)
  • MS in Computer and Communication Security (NUST - Pakistan)
  • B.Sc. in Software Engineering (University of Engineering & Technology - Pakistan)
     

 

Engineering
Computer Science and Engineering

Dr. Rahat Masood is currently working as an Associate Lecturer at the School of Computer Science & Engineering (CSE), UNSW. Her research area focuses on the security and privacy of mobile, web, and IoT platforms, network security, and critical infrastructure protection.  More recently, her research has involved privacy risks identification and quantification, and privacy-preserving technologies, particularly from human behaviour perspective. She received her PhD from the UNSW, in collaboration with the information security and privacy group at Data61-CSIRO.  Before joining UNSW, she worked as a postdoctoral fellow at Data61-CSIRO, where she designed and evaluated privacy-preserving algorithms as required by diverse application scenarios.

Rahat is currently associated with Data61-CSIRO as a visiting scholar and also collaborating with Cyber Security Cooperative Research Centre (CSCRC) on multiple cyber security projects. She was also a visiting scholar at the Sandia National Laboratories (SNL), New Mexico, and Cyber Security Policy and Research Institute (CSPRI) at The George Washington University. Her Master's degree is in Computer & Communication Security from NUST School of Electrical Engineering and Computer Science (SEECS), Pakistan, and Bachelor's degree is in Software Engineering (Honours). 

Phone
+61-2-9065 9916
Location
Barker St, Kensington NSW 2052
  • Book Chapters | 2022
    Masood R; Berkovsky S; Kaafar MA, 2022, 'Tracking and Personalization', in Modern Socio-Technical Perspectives on Privacy, Springer International Publishing, pp. 171 - 202, http://dx.doi.org/10.1007/978-3-030-82786-1_9
    Book Chapters | 2014
    Mehak F; Masood R; Ghazi Y; Shibli MA; Khan S, 2014, 'Security Aspects of Database-as-a-Service (DBaaS) in Cloud Computing', in Computer Communications and Networks, Springer International Publishing, pp. 297 - 324, http://dx.doi.org/10.1007/978-3-319-10530-7_13
    Book Chapters | 2014
    Shibli MA; Masood R; Habiba U; Kanwal A; Ghazi Y; Mumtaz R, 2014, 'Access Control As a Service in Cloud: Challenges, Impact and Strategies', in Computer Communications and Networks, Springer London, pp. 55 - 99, http://dx.doi.org/10.1007/978-1-4471-6452-4_3
  • Journal articles | 2023
    Sharma B; Karunanayake I; Masood R; Ikram M, 2023, 'Don't Be a Victim during a Pandemic! Analysing Security and Privacy Threats in Twitter during COVID-19', IEEE Access, 11, pp. 29769 - 29789, http://dx.doi.org/10.1109/ACCESS.2023.3260643
    Journal articles | 2021
    Zhao J; Masood R; Seneviratne S, 2021, 'A review of computer vision methods in network security', IEEE Communications Surveys and Tutorials, 23, pp. 1838 - 1878, http://dx.doi.org/10.1109/COMST.2021.3086475
    Journal articles | 2020
    Ikram M; Masood R; Tyson G; Kaafar MA; Loizon N; Ensafi R, 2020, 'Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading', ACM Transactions on Privacy and Security, 23, http://dx.doi.org/10.1145/3380466
    Journal articles | 2018
    Elgedawy I; Khurshid S; Masood R; Shibli MA, 2018, 'CRESCENT+: a self-protecting framework for reliable composite web service delivery', Iran Journal of Computer Science, 1, pp. 65 - 87, http://dx.doi.org/10.1007/s42044-018-0008-3
    Journal articles | 2018
    Masood R; Zhao BZH; Asghar HJ; Kaafar MA, 2018, 'Touch and You’re Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking', Proceedings on Privacy Enhancing Technologies, 2018, pp. 122 - 142, http://dx.doi.org/10.1515/popets-2018-0016
    Journal articles | 2017
    Mehak F; Masood R; Shibli MA; Elgedway I, 2017, 'EACF: extensible access control framework for cloud environments', Annales des Telecommunications/Annals of Telecommunications, 72, pp. 307 - 323, http://dx.doi.org/10.1007/s12243-016-0548-1
    Journal articles | 2016
    Ghazi Y; Masood R; Rauf A; Shibli MA; Hassan O, 2016, 'DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases', Eurasip Journal on Information Security, 2016, http://dx.doi.org/10.1186/s13635-016-0040-5
    Journal articles | 2015
    Kanwal A; Masood R; Shibli MA; Mumtaz R, 2015, 'Taxonomy for trust models in cloud computing', Computer Journal, 58, pp. 601 - 626, http://dx.doi.org/10.1093/comjnl/bxu138
    Journal articles | 2015
    Masood R; Shibli MA; Ghazi Y; Kanwal A; Ali A, 2015, 'Cloud authorization: exploring techniques and approach towards effective access control framework', Frontiers of Computer Science, 9, pp. 297 - 321, http://dx.doi.org/10.1007/s11704-014-3160-4
    Journal articles | 2015
    Shibli MA; Masood R; Ghazi Y; Muftic S, 2015, 'MagicNET: Mobile agents data protection system', Transactions on Emerging Telecommunications Technologies, 26, pp. 813 - 835, http://dx.doi.org/10.1002/ett.2742
    Journal articles | 2014
    Habiba U; Masood R; Shibli MA; Niazi MA, 2014, 'Cloud identity management security issues & solutions: a taxonomy', Complex Adaptive Systems Modeling, 2, http://dx.doi.org/10.1186/s40294-014-0005-9
  • Preprints | 2024
    Akhtar MM; Bhuiyan NS; Masood R; Ikram M; Kanhere SS, 2024, BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning, , http://dx.doi.org/10.48550/arxiv.2402.03740
    Conference Papers | 2023
    Akhtar MM; Karunanayake I; Sharma B; Masood R; Ikram M; Kanhere SS, 2023, 'Towards Automatic Annotation and Detection of Fake News', in Proceedings - Conference on Local Computer Networks, LCN, http://dx.doi.org/10.1109/LCN58197.2023.10223359
    Preprints | 2023
    Akhtar MM; Masood R; Ikram M; Kanhere SS, 2023, False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations, , http://dx.doi.org/10.48550/arxiv.2308.12497
    Preprints | 2022
    Akhtar MM; Sharma B; Karunanayake I; Masood R; Ikram M; Kanhere SS, 2022, Machine Learning-based Automatic Annotation and Detection of COVID-19 Fake News, , http://arxiv.org/abs/2209.03162v1
    Preprints | 2022
    Ikram M; Masood R; Tyson G; Kaafar MA; Ensafi R, 2022, A Study of Third-party Resources Loading on Web, , http://dx.doi.org/10.48550/arxiv.2203.03077
    Preprints | 2022
    Masood R; Cheng WY; Vatsalan D; Mishra D; Asghar HJ; Kaafar MA, 2022, Privacy Preserving Release of Mobile Sensor Data, , http://dx.doi.org/10.48550/arxiv.2205.06641
    Preprints | 2022
    Sharma B; Karunanayake I; Masood R; Ikram M, 2022, Don't be a Victim During a Pandemic! Analysing Security and Privacy Threats in Twitter During COVID-19, , http://dx.doi.org/10.48550/arxiv.2202.10543
    Preprints | 2022
    xue W; Ahmed N; Masood R; Hu W; Seneviratne A; Jha SK, 2022, FLAP: Federated Learning with Attack and Privacy Awareness, , http://dx.doi.org/10.36227/techrxiv.19766023
    Conference Papers | 2020
    Yao W; Li Y; Lin W; Hu T; Chowdhury I; Masood R; Seneviratne S, 2020, 'Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps', in Proceedings - Conference on Local Computer Networks, LCN, pp. 381 - 384, http://dx.doi.org/10.1109/LCN48667.2020.9314784
    Preprints | 2020
    Yao W; Li Y; Lin W; Hu T; Chowdhury I; Masood R; Seneviratne S, 2020, Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps, , http://dx.doi.org/10.48550/arxiv.2007.03905
    Preprints | 2020
    Zhao J; Masood R; Seneviratne S, 2020, A Review of Computer Vision Methods in Network Security, , http://dx.doi.org/10.48550/arxiv.2005.03318
    Conference Papers | 2019
    Ikram M; Masood R; Gareth T; Noha Loizon ; Kaafar ; Ensafi R, 2019, 'The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading', in Proceeding WWW '19 The World Wide Web Conference, ACM, San Francisco, USA, pp. 2851 - 2857, presented at WWW 2019, San Francisco, USA, 13 May 2019 - 17 May 2018, http://dx.doi.org/10.1145/3308558.3313521
    Preprints | 2019
    Ikram M; Masood R; Tyson G; Kaafar MA; Loizon N; Ensafi R, 2019, The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading, , http://dx.doi.org/10.48550/arxiv.1901.07699
    Conference Papers | 2018
    Masood R; Vatsalan D; Ikram M; Kaafar D, 2018, 'Incognito: A Method for Obfuscating Web Data', in Incognito: A Method for Obfuscating Web Data, Association for Computing Machinery (ACM), Lyon, France, presented at WWW TheWebConf 2018, Lyon, France, 23 April 2018 - 27 April 2018, http://dx.doi.org/10.1145/3178876.3186093
    Conference Papers | 2017
    Masood R; Zhao BZH; Asghar HJ; Kaafar MA, 2017, 'Poster: Touchtrack: How unique are your touch gestures?', in Proceedings of the ACM Conference on Computer and Communications Security, Dallas, Texas, USA, pp. 2555 - 2557, presented at 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, Texas, USA, 30 October 2017 - 03 November 2017, http://dx.doi.org/10.1145/3133956.3138850
    Conference Papers | 2016
    Mehmood Y; Shibli MA; Kanwal A; Masood R, 2016, 'Distributed intrusion detection system using mobile agents in cloud computing environment', in Proceedings - 2015 Conference on Information Assurance and Cyber Security, CIACS 2015, pp. 1 - 8, http://dx.doi.org/10.1109/CIACS.2015.7395559
    Conference Papers | 2015
    Habiba U; Masood R; Shibli MA, 2015, 'Secure identity management system for federated Cloud environment', in Studies in Computational Intelligence, pp. 17 - 33, http://dx.doi.org/10.1007/978-3-319-10389-1_2
    Conference Papers | 2015
    Shibli MA; Masood R; Habiba U, 2015, 'Realization of FGAC model using XACML policy specification', in 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2015 - Proceedings, http://dx.doi.org/10.1109/SNPD.2015.7176199
    Conference Papers | 2014
    Kanwal A; Masood R; Shibli MA, 2014, 'Evaluation and establishment of trust in cloud federation', in Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2014, http://dx.doi.org/10.1145/2557977.2558023
    Conference Papers | 2014
    Masood R; Shibli MA; Ghafoor A, 2014, 'Fine-grained access control in object-oriented databases', in Lecture Notes in Electrical Engineering, pp. 133 - 138, http://dx.doi.org/10.1007/978-3-642-40861-8_20
    Conference Papers | 2014
    Zahid A; Masood R; Shibli MA, 2014, 'Security of sharded NoSQL databases: A comparative analysis', in Conference Proceedings - 2014 Conference on Information Assurance and Cyber Security, CIACS 2014, pp. 1 - 8, http://dx.doi.org/10.1109/CIACS.2014.6861323
    Conference Papers | 2013
    Habiba U; Abassi AG; Masood R; Shibli MA, 2013, 'Assessment criteria for cloud identity management systems', in Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC, pp. 188 - 195, http://dx.doi.org/10.1109/PRDC.2013.39
    Conference Papers | 2013
    Kanwal A; Masood R; Ghazia UE; Shibli MA; Abbasi AG, 2013, 'Assessment criteria for trust models in cloud computing', in Proceedings - 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, GreenCom-iThings-CPSCom 2013, pp. 254 - 261, http://dx.doi.org/10.1109/GreenCom-iThings-CPSCom.2013.61
    Conference Papers | 2013
    Kazim M; Masood R; Shibli MA; Abbasi AG, 2013, 'Security aspects of virtualization in cloud computing', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 229 - 240, http://dx.doi.org/10.1007/978-3-642-40925-7_22
    Conference Papers | 2013
    Kazim M; Masood R; Shibli MA, 2013, 'Securing the virtual machine images in Cloud computing', in SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks, pp. 425 - 428, http://dx.doi.org/10.1145/2523514.2523576
    Conference Papers | 2013
    Mehmood Y; Shibli MA; Habiba U; Masood R, 2013, 'Intrusion detection system in cloud computing: Challenges and opportunities', in Conference Proceedings - 2013 2nd National Conference on Information Assurance, NCIA 2013, pp. 59 - 66, http://dx.doi.org/10.1109/NCIA.2013.6725325
    Conference Papers | 2012
    Um-E-Ghazia ; Masood R; Shibli MA; Bilal M, 2012, 'Usage control model specification in XACML policy language XACML policy engine of UCON', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 68 - 79, http://dx.doi.org/10.1007/978-3-642-33260-9_5
    Conference Papers | 2012
    Um-e-Ghazia ; Masood R; Shibli MA, 2012, 'Comparative analysis of access control systems on cloud', in Proceedings - 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2012, pp. 41 - 46, http://dx.doi.org/10.1109/SNPD.2012.33
    Conference Papers | 2011
    Masood R; Ghazia UE; Anwar Z, 2011, 'SWAM: Stuxnet worm analysis in Metasploit', in Proceedings - 2011 9th International Conference on Frontiers of Information Technology, FIT 2011, pp. 142 - 147, http://dx.doi.org/10.1109/FIT.2011.34

User-Oriented Privacy for Mobile and Web Platforms, CSE School Funding for Early Career Researchers, 2020.

  • 2019, Recipient of Commonwealth Scientific and Industrial Research Organization (CSIRO) – Data61 Writing Fellowship
  • 2017, Recipient of Student Travel Grant from the conference ACM SIGSAC Conference on Computer and Communications Security (CCS)
  • 2016-2019, Awarded NICTA Research Project Award (NRPA) from National ICT Australia (NICTA – now Data61)
  • 2016-2019, Awarded International Postgraduate Research Scholarship (IPRS) from the Australian government
  • 2015, Recipient of Nonproliferation Studies Scholarship from CRDF Global, with a grant from the U. S. State Department
  • 2010, Recipient of Merit Certificate for “Excellent performance in Bachelor of Computer Software Engineering”
  • 2010, Received “Gold Medal” for obtaining first position in Undergraduate Degree
  • 2006-2010, Recipient of merit scholarship throughout eight semesters during Undergraduate Degree

Rahat is currently involved in multiple research projects with internal and external collaborators. She is currently supervising Taste of Research (ToR) summer student on the project titled "Impact of Social Media Networks on COVID-19 Expansion and Containment". This project is a joint collaboration with Macquarie University to understand the pandemic situation through the lens of social media platforms (e.g. Twiiter). In addition, the project involves misinformation/rumors analysis related to COVID-19 along with  indepth analysis of privacy and security leakages.

Rahat is also collaborating with Cyber Security Cooperative Research Centre (CSCSRC) on multiple grant proposals and projects. She is also working as a Visiting Scientist at Information Security and Privacy (ISP) Group at Data61-CSIRO and is co-supervising a summer student.

My Research Supervision

Rahat is currently supervising two summer scholarship students:

1. Haesun Shim - Taste of Research (ToR) scholarship student on the project "Impact of Social Media Networks on COVID-19 Containment and Expansion".

2. Ming Lo - Data61 Summer Scholar student on the project "user Touch Gesture-based Mobile Bot Detection for Crowd-Sourcing Applications".

My Teaching

Rahat's teaching interests combine the areas of cybersecurity and software engineering. More particularly, she is interested in teaching courses related to privacy, information security, network security, web and application security, and software engineering.