Portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 2 
Published in AsiaCSS, 2018
This paper is about the number 1. The number 2 is left for future work.
Recommended citation: B Zhou, A Gupta, R Jahanshahi, M Egele, and A Joshi. Hardware performance counters can detect malware: myth or fact?. Proceedings of Asia conference on computer and communications security (Asia CCS). 2018 https://dl.acm.org/doi/pdf/10.1145/3196494.3196515
Published in AsiaCSS, 2020
This paper is about the number 2. The number 3 is left for future work.
Recommended citation: R Jahanshahi, A Doupe, and M Egele. You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications. Proceedings of Asia conference on computer and communications security (Asia CCS). 2020 https://dl.acm.org/doi/pdf/10.1145/3320269.3384760
Published in USENIX Security Symposium, 2021
This paper is about the number 3. The number 4 is left for future work.
Recommended citation: A Bulekov, R Jahanshahi, and M Egele. Saphire: Sandboxing PHP Applications with Tailored System Calls Allowlists. USENIX Security Symposium. 2021 https://www.usenix.org/system/files/sec21-bulekov.pdf
Published in USENIX Security Symposium, 2023
This paper is about the number 3. The number 4 is left for future work.
Recommended citation: R Jahanshahi, Babak Amin Azad, Nick Nikiforakis, and M Egele. Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis. USENIX Security Symposium. 2023 https://www.usenix.org/
Published:
By: Rasoul Jahanshahi
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.