Publications
M. Hataba, A. Sherif, M. Mahmoud, M. Abdallah and W. Alasmary, "Security and Privacy Issues in Autonomous Vehicles: A Layer-Based Survey," in IEEE Open Journal of the Communications Society, vol. 3, pp. 811-829, 2022, doi: 10.1109/OJCOMS.2022.3169500.
M. Hataba, A. Sherif and R. Elkhouly, "Enhanced Obfuscation for Software Protection in Autonomous Vehicular Cloud Computing Platforms," in IEEE Access, vol. 10, pp. 33943-33953, 2022, doi: 10.1109/ACCESS.2022.3159249.
M. Hataba, A. Sherif, M. Elsersy, M. Nabil, M. Mahmoud and K. H. Almotairi, "Privacy-Preserving Biometric-based Authentication Scheme for Electric Vehicles Charging System," 2021 3rd IEEE Middle East and North Africa COMMunications Conference (MENACOMM), Agadir, Morocco, 2021, pp. 86-91, doi: 10.1109/MENACOMM50742.2021.9678231.
M. Hataba, A. Sherif and R. Elkhouly, "A Proposed Software Protection Mechanism for Autonomous Vehicular Cloud Computing," 2021 IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), Lansing, MI, USA, 2021, pp. 878-881, doi: 10.1109/MWSCAS47672.2021.9531682.
M. Hataba, A. El-Mahdy, K. Ueda and A. Shoukry, Ph.D Dissertation: "iOJIT:Automatic Generation of Efficient Obfuscated Code Through Just-In-Time Compilation", E–JUST, Alexandria, Egypt 2019.
M. Hataba, A. El-Mahdy and K. Ueda, "Generation of Efficient Obfuscated Code Through Just-In-Time Compilation" , IEICE Transactions on Information and Systems, Vol.E102-D,No.3, Mar. 2019.
M. Hataba, R. Elkhouly and A. El-Mahdy, "Diversified Remote Code Execution Using Dynamic Obfuscation of Conditional Branches," 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops, Columbus, OH, 2015, pp. 120-127.
M. Hataba, A. El-Mahdy and E. Rohou and "OJIT: A Novel Obfuscation Approach Using Standard Just-In-Time Compiler Transformations", 4th International Workshop on Dynamic Compilation Everywhere, held in conjunction with 10th International Conference on High Performance and Embedded Architecture and Compilers (HiPEAC), Amsterdam, Netherlands, 2015
M. Hataba, A. El-Mahdy "POSTER: iOJIT: Automatic Generation of Efficient Obfuscated Code Through Just-In- Time Compilation", 10th International Conference on High Performance and Embedded Architecture and Compilers (HiPEAC), Amsterdam, Netherlands, 2015
M. Hataba, A. El-Mahdy, E. Rohou and A. Shoukry, "OJIT: Secure Remote Execution Technology by Obfuscated Just-In-Time Compilation", European LLVM Conference, Paris, France, 2013.
M. Hataba, A. El-Mahdy, E. Rohou and A. Shoukry, Master Thesis: "OJIT: A Novel Secure Remote Execution Technology by Obfuscated Just-In-Time Compilation", E–JUST, Alexandria, Egypt 2013.
M. Hataba and A. El-Mahdy, "Cloud Protection by Obfuscation: Techniques and Metrics," 2012 Seventh International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Victoria, BC, 2012, pp. 369-372.
M. Alzantot, M. Hataba and M. Youssef, "DEMO: Classroom7: Please, Make Sure Your Phones Are Switched On!", 8th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), Copenhagen, Denmark, 2011, (pp. 243-247). Springer, Berlin, Heidelberg.
M. Khamis, M. Hataba, S. Samra, A. Shalaby and A. El-Mahdy, Technical Report: "Perfomance Analysis of Eucalyptus Vs. EC2 Cloud for HPC Scientific Computing", 2011