Dr Rahat   Masood
Associate Lecturer

Dr Rahat Masood

  • PhD. in Information Security and Privacy (UNSW, Data61-CSIRO - Australia)
  • MS in Computer and Communication Security (NUST - Pakistan)
  • B.Sc. in Software Engineering (University of Engineering & Technology - Pakistan)


Sch: Computer Science & Eng

Dr. Rahat Masood is currently working as an Associate Lecturer at the School of Computer Science & Engineering (CSE), UNSW. Her research area focuses on the security and privacy of mobile, web, and IoT platforms, network security, and critical infrastructure protection.  More recently, her research has involved privacy risks identification and quantification, and privacy-preserving technologies, particularly from human behaviour perspective. She received her PhD from the UNSW, in collaboration with the information security and privacy group at Data61-CSIRO.  Before joining UNSW, she worked as a postdoctoral fellow at Data61-CSIRO, where she designed and evaluated privacy-preserving algorithms as required by diverse application scenarios.

Rahat is currently associated with Data61-CSIRO as a visiting scholar and also collaborating with Cyber Security Cooperative Research Centre (CSCRC) on multiple cyber security projects. She was also a visiting scholar at the Sandia National Laboratories (SNL), New Mexico, and Cyber Security Policy and Research Institute (CSPRI) at The George Washington University. Her Master's degree is in Computer & Communication Security from NUST School of Electrical Engineering and Computer Science (SEECS), Pakistan, and Bachelor's degree is in Software Engineering (Honours). 

+61-2-9065 9916
Barker St, Kensington NSW 2052


  • Book Chapters | 2014
    Mehak F; Masood R; Ghazi Y; Shibli MA; Khan S, 2014, 'Security Aspects of Database-as-a-Service (DBaaS) in Cloud Computing', in Computer Communications and Networks, Springer International Publishing, pp. 297 - 324, http://dx.doi.org/10.1007/978-3-319-10530-7_13
    Book Chapters | 2014
    Shibli MA; Masood R; Habiba U; Kanwal A; Ghazi Y; Mumtaz R, 2014, 'Access Control As a Service in Cloud: Challenges, Impact and Strategies', in Computer Communications and Networks, Springer London, pp. 55 - 99, http://dx.doi.org/10.1007/978-1-4471-6452-4_3
  • Journal articles | 2021
    Zhao J; Masood R; Seneviratne S, 2021, 'A Review of Computer Vision Methods in Network Security', IEEE Communications Surveys and Tutorials, pp. 1 - 1, http://dx.doi.org/10.1109/COMST.2021.3086475
    Journal articles | 2020
    Ikram M; Masood R; Tyson G; Kaafar MA; Loizon N; Ensafi R, 2020, 'Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading', ACM Transactions on Privacy and Security, vol. 23, http://dx.doi.org/10.1145/3380466
    Journal articles | 2018
    Masood R; Zhao BZH; Asghar HJ; Kaafar MA, 2018, 'Touch and You’re Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking', Proceedings on Privacy Enhancing Technologies, vol. 2018, pp. 122 - 142, http://dx.doi.org/10.1515/popets-2018-0016
    Journal articles | 2018
    Elgedawy I; Khurshid S; Masood R; Shibli MA, 2018, 'CRESCENT+: a self-protecting framework for reliable composite web service delivery', Iran Journal of Computer Science, vol. 1, pp. 65 - 87, http://dx.doi.org/10.1007/s42044-018-0008-3
    Journal articles | 2017
    Mehak F; Masood R; Shibli MA; Elgedway I, 2017, 'EACF: extensible access control framework for cloud environments', Annales des Telecommunications/Annals of Telecommunications, vol. 72, pp. 307 - 323, http://dx.doi.org/10.1007/s12243-016-0548-1
    Journal articles | 2016
    Ghazi Y; Masood R; Rauf A; Shibli MA; Hassan O, 2016, 'DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases', Eurasip Journal on Information Security, vol. 2016, http://dx.doi.org/10.1186/s13635-016-0040-5
    Journal articles | 2015
    Masood R; Shibli MA; Ghazi Y; Kanwal A; Ali A, 2015, 'Cloud authorization: exploring techniques and approach towards effective access control framework', Frontiers of Computer Science, vol. 9, pp. 297 - 321, http://dx.doi.org/10.1007/s11704-014-3160-4
    Journal articles | 2015
    Shibli MA; Masood R; Ghazi Y; Muftic S, 2015, 'MagicNET: Mobile agents data protection system', Transactions on Emerging Telecommunications Technologies, vol. 26, pp. 813 - 835, http://dx.doi.org/10.1002/ett.2742
    Journal articles | 2015
    Kanwal A; Masood R; Shibli MA; Mumtaz R, 2015, 'Taxonomy for trust models in cloud computing', Computer Journal, vol. 58, pp. 601 - 626, http://dx.doi.org/10.1093/comjnl/bxu138
    Journal articles | 2014
    Habiba U; Masood R; Shibli MA; Niazi MA, 2014, 'Cloud identity management security issues & solutions: a taxonomy', Complex Adaptive Systems Modeling, vol. 2, http://dx.doi.org/10.1186/s40294-014-0005-9
  • Conference Papers | 2020
    Yao W; Li Y; Lin W; Hu T; Chowdhury I; Masood R; Seneviratne S, 2020, 'Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps', in Proceedings - Conference on Local Computer Networks, LCN, pp. 381 - 384, http://dx.doi.org/10.1109/LCN48667.2020.9314784
    Conference Papers | 2019
    Ikram M; Masood R; Gareth T; Noha Loizon ; Kaafar ; Ensafi R, 2019, 'The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading', in Proceeding WWW '19 The World Wide Web Conference, ACM, San Francisco, USA, pp. 2851 - 2857, presented at WWW 2019, San Francisco, USA, 13 May 2019 - 17 May 2018, http://dx.doi.org/10.1145/3308558.3313521
    Conference Papers | 2018
    Masood R; Vatsalan D; Ikram M; Kaafar D, 2018, 'Incognito: A Method for Obfuscating Web Data', in Incognito: A Method for Obfuscating Web Data, WWW TheWebConf 2018, Lyon, France, presented at WWW TheWebConf 2018, Lyon, France, 23 April 2018 - 27 April 2018, http://dx.doi.org/10.1145/3178876.3186093
    Conference Papers | 2017
    Masood R; Zhao BZH; Asghar HJ; Kaafar MA, 2017, 'Poster: Touchtrack: How unique are your touch gestures?', in Proceedings of the ACM Conference on Computer and Communications Security, Dallas, Texas, USA, pp. 2555 - 2557, presented at 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, Texas, USA, 30 October 2017 - 03 November 2017, http://dx.doi.org/10.1145/3133956.3138850
    Conference Papers | 2016
    Mehmood Y; Shibli MA; Kanwal A; Masood R, 2016, 'Distributed intrusion detection system using mobile agents in cloud computing environment', in Proceedings - 2015 Conference on Information Assurance and Cyber Security, CIACS 2015, pp. 1 - 8, http://dx.doi.org/10.1109/CIACS.2015.7395559
    Conference Papers | 2015
    Shibli MA; Masood R; Habiba U, 2015, 'Realization of FGAC model using XACML policy specification', in 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2015 - Proceedings, http://dx.doi.org/10.1109/SNPD.2015.7176199
    Conference Papers | 2015
    Habiba U; Masood R; Shibli MA, 2015, 'Secure identity management system for federated Cloud environment', in Studies in Computational Intelligence, pp. 17 - 33, http://dx.doi.org/10.1007/978-3-319-10389-1_2
    Conference Papers | 2014
    Zahid A; Masood R; Shibli MA, 2014, 'Security of sharded NoSQL databases: A comparative analysis', in Conference Proceedings - 2014 Conference on Information Assurance and Cyber Security, CIACS 2014, pp. 1 - 8, http://dx.doi.org/10.1109/CIACS.2014.6861323
    Conference Papers | 2014
    Kanwal A; Masood R; Shibli MA, 2014, 'Evaluation and establishment of trust in cloud federation', in Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2014, http://dx.doi.org/10.1145/2557977.2558023
    Conference Papers | 2014
    Masood R; Shibli MA; Ghafoor A, 2014, 'Fine-grained access control in object-oriented databases', in Lecture Notes in Electrical Engineering, pp. 133 - 138, http://dx.doi.org/10.1007/978-3-642-40861-8_20
    Conference Papers | 2013
    Kazim M; Masood R; Shibli MA, 2013, 'Securing the virtual machine images in Cloud computing', in SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks, pp. 425 - 428, http://dx.doi.org/10.1145/2523514.2523576
    Conference Papers | 2013
    Kazim M; Masood R; Shibli MA; Abbasi AG, 2013, 'Security aspects of virtualization in cloud computing', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 229 - 240, http://dx.doi.org/10.1007/978-3-642-40925-7_22
    Conference Papers | 2013
    Mehmood Y; Shibli MA; Habiba U; Masood R, 2013, 'Intrusion detection system in cloud computing: Challenges and opportunities', in Conference Proceedings - 2013 2nd National Conference on Information Assurance, NCIA 2013, pp. 59 - 66, http://dx.doi.org/10.1109/NCIA.2013.6725325
    Conference Papers | 2013
    Kanwal A; Masood R; Ghazia UE; Shibli MA; Abbasi AG, 2013, 'Assessment criteria for trust models in cloud computing', in Proceedings - 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, GreenCom-iThings-CPSCom 2013, pp. 254 - 261, http://dx.doi.org/10.1109/GreenCom-iThings-CPSCom.2013.61
    Conference Papers | 2013
    Habiba U; Abassi AG; Masood R; Shibli MA, 2013, 'Assessment criteria for cloud identity management systems', in Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC, pp. 188 - 195, http://dx.doi.org/10.1109/PRDC.2013.39
    Conference Papers | 2012
    Um-E-Ghazia ; Masood R; Shibli MA; Bilal M, 2012, 'Usage control model specification in XACML policy language XACML policy engine of UCON', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 68 - 79, http://dx.doi.org/10.1007/978-3-642-33260-9_5
    Conference Papers | 2012
    Um-e-Ghazia ; Masood R; Shibli MA, 2012, 'Comparative analysis of access control systems on cloud', in Proceedings - 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2012, pp. 41 - 46, http://dx.doi.org/10.1109/SNPD.2012.33
    Conference Papers | 2011
    Masood R; Ghazia UE; Anwar Z, 2011, 'SWAM: Stuxnet worm analysis in Metasploit', in Proceedings - 2011 9th International Conference on Frontiers of Information Technology, FIT 2011, pp. 142 - 147, http://dx.doi.org/10.1109/FIT.2011.34


  • 2019, Recipient of Commonwealth Scientific and Industrial Research Organization (CSIRO) – Data61 Writing Fellowship
  • 2017, Recipient of Student Travel Grant from the conference ACM SIGSAC Conference on Computer and Communications Security (CCS)
  • 2016-2019, Awarded NICTA Research Project Award (NRPA) from National ICT Australia (NICTA – now Data61)
  • 2016-2019, Awarded International Postgraduate Research Scholarship (IPRS) from the Australian government
  • 2015, Recipient of Nonproliferation Studies Scholarship from CRDF Global, with a grant from the U. S. State Department
  • 2010, Recipient of Merit Certificate for “Excellent performance in Bachelor of Computer Software Engineering”
  • 2010, Received “Gold Medal” for obtaining first position in Undergraduate Degree
  • 2006-2010, Recipient of merit scholarship throughout eight semesters during Undergraduate Degree


User-Oriented Privacy for Mobile and Web Platforms, CSE School Funding for Early Career Researchers, 2020.