Recent Publications
Book Chapters
[1] P. Faruki, V. Laxmi, M. S. Gaur, and M. Conti, "DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis," Recent Advances in Computational Intelligence in Defense and Security, vol. 608, E. Tsolis, Ed. Cham, Switzerland: Springer, 2015, pp. 583–612
Refereed Journal Articles
[2] R. Bhan, R. Pamula, P. Faruki, and J. Gajrani, "Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network," The Journal of Supercomputing, vol. 79, no. 14, pp. 16233–16274, Sep. 2023
[3] *R. Bhan, *P. Faruki, and R. Pamula, "Detection of Sensitive Malicious Android Functionalities Using Inter-Component Control-Flow Analysis," IEEE Access, vol. 11, pp. 69622–69640, 2023.
[4] T. Gera, J. Singh, P. Faruki, and D. Thakur, "Efficacy of Android security mechanisms on ransomware analysis and detection," PeerJ Computer Science, vol. 8, p. e1044, Aug. 2022.
[5] P. Faruki, R. Bhan, V. Jain, S. Bhatia, N. El Madhoun, and R. Pamula, "A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks," Information, vol. 14, no. 7, p. 374, Jun. 2023.
[6] M. A. El-Zawawy, P. Faruki, and M. Conti, "Formal model for inter-component communication and its security in android," Computing, vol. 104, no. 8, pp. 1839–1865, Aug. 2022.
[7] *B. Buddhdev, *P. Faruki, M. S. Gaur, and A. Zemmari, "FloVasion: Towards detection of non-sensitive variable based evasive information-flow detection in android apps," IETE Journal of Research, vol. 68, no. 6, pp. 4536–4550, 2022.
[8] M. Singh, V. Laxmi, and P. Faruki, "Visibility enhancement and dehazing: Research contribution challenges and directions," Computer Science Review, vol. 44, p. 100456, May 2022.
[9] M. Singh, V. Laxmi, and P. Faruki, "Dense spatially-weighted attentive residual-haze network for image dehazing," Applied Intelligence, vol. 52, no. 12, pp. 14330–14346, Oct. 2022.
[10] V. Jain, A. Mazumdar, P. Faruki, and M. C. Govil, "Congestion control in Internet of Things: Classification, challenges, and future directions," Sustainable Computing: Informatics and Systems, vol. 36, p. 100777, Dec. 2022.
[11] J. Dave, P. Faruki, V. Laxmi, A. Zemmari, M. S. Gaur, and M. Conti, "SPARK: Secure pseudorandom key-based encryption for deduplicated storage," Computer Communications, vol. 156, pp. 113–128, Apr. 2020.
[12] N. Chaabouni, M. Mosbah, A. Zemmari, P. Faruki, and C. Sauvignac, "Network intrusion detection for IoT security based on learning techniques," IEEE Communications Surveys & Tutorials, vol. 21, no. 3, pp. 2671–2701, 3rd Quart. 2019.
[13] P. Faruki, A. Bharmal, V. Laxmi, V. Ganmoor, M. S. Gaur, and M. Conti, "Android security: A survey of issues, malware penetration, and defenses," IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp. 998–1022, 2nd Quart. 2015.
[14] P. Faruki, V. Laxmi, A. Bharmal, M. S. Gaur, and V. Ganmoor, "AndroSimilar: Robust signature for detecting variants of Android malware," Journal of Information Security and Applications, vol. 22, pp. 66–80, Jun. 2015.
Refereed Conference Papers
[15] M. Singh, V. Laxmi, and P. Faruki, "Visibility enhancement in surveillance images using deep multi-scale feature fusion," Proceedings of the International Conference on ISEA Security and Privacy (ISEA-ISAP), 2021, pp. 1–6.
[16] T. Gera, J. Singh, D. Thakur, and P. Faruki, "A semi-automated approach for identification of trends in android ransomware," Machine Learning for Networking, vol. 12081, É. Renault, Ed. Cham, Switzerland: Springer, 2020, pp. 268–278.
[17] P. Faruki, A. Zemmari, B. Shah, V. Laxmi, and M. S. Gaur, "DroidDivesDeep: Android malware classification via low level monitorable features with deep neural networks," Proceedings of the International Conference on ISEA Security and Privacy (ISEA-ISAP), 2019, pp. 69–75.
[18] J. Dave, P. Faruki, V. Laxmi, and M. S. Gaur, "Bloom filter-based privacy preserving deduplication system," Proceedings of the International Conference on ISEA Security and Privacy (ISEA-ISAP), 2019, pp. 111–117.
[19] J. Dave, S. Saharan, P. Faruki, and V. Laxmi, "Secure random encryption for deduplicated cloud storage," Information Systems Security, vol. 10717, C. Mazumdar and S. D. Majumdar, Eds. Cham, Switzerland: Springer, 2017, pp. 317–328.
[20] J. Dave, P. Faruki, V. Laxmi, M. S. Gaur, and B. Bezawada, "Secure and efficient proof of ownership for deduplication cloud storage," Proceedings of the. 10th International Conference on Security of Information and Networks (SIN), 2017, pp. 287–290.
[21] B. Buddhadev, P. Faruki, M. S. Gaur, and V. Laxmi, "Android component vulnerabilities: Proof of concepts and mitigation," Proceedings of the 30th International Conference on Information Networking (ICOIN), Kota Kinabalu, Malaysia, Jan. 2016, pp. 116–121.
[22] P. Faruki, A. Zemmari, M. S. Gaur, V. Laxmi, and M. Conti, "mimeoDroid: Large scale dynamic app analysis on cloned devices via machine learning classifiers," Proceedings of the IEEE International Workshop Reliability Security Data Analytics (RSDA), 2016, pp. 24–29.
[23] L. Sinha, S. Bhandari, P. Faruki, V. Laxmi, and M. Conti, "FlowMine: Android app analysis via data flow," Proceedings of the IEEE Consumer Communication Networking Conference (CCNC), 2016, pp. 267–272.
[24] P. Faruki, A. Bharmal, V. Laxmi, M. S. Gaur, M. Conti, and M. Rajarajan, "Evaluation of Android anti-malware techniques against Dalvik bytecode obfuscation," Proceedings of the. IEEE 13th International Conference Trust, Security Privacy Computer Communcation (TrustCom), 2014, pp. 414–421.
[25] P. Faruki, V. Ganmoor, V. Laxmi, M. S. Gaur, and M. Conti, "Android platform invariant sandbox for analyzing malware and resource hogger apps," Secure Computing and Communications, vol. 143, J. Cao, V. C. M. Leung, C. Xu, and T. Jiang, Eds. Cham, Switzerland: Springer, 2014, pp. 117–129.
[26] P. Faruki, V. Ganmoor, V. Laxmi, M. Gaur, and A. Bharmal. ”Androsimilar: Robust statistical feature signature for android malware detection”, International Conference on Security of Information and Networks, (SINCONF), 2013
[27] P. Faruki, M. S. Gaur, V. Ganmoor, and V. Laxmi, "Machine learning approach based on code similarity to detect unknown malicious samples," IETE Journal of Research, vol. 59, no. 3, pp. 209–217, May–Jun. 2013. Received Best Paper Award
[28] V. Laxmi, D. Mehta, M. S. Gaur, P. Faruki, and C. Lal, "Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks," Proceedings of the 6th International Conference Security of Information and Networks (SIN), Aksaray, Turkey, Nov. 2013, pp. 189–195.
[29] P. Faruki, V. Laxmi, V. Ganmoor, and A. Bharmal, "DroidOLytics: Robust feature signature for repackaged Android apps on official and third-party Android markets," Advanced Computing, Networking and Security, vol. 7135, P. S. Thilagam, A. Amuthan, and I. Deepthi, Eds. Cham, Switzerland: Springer, 2013, pp. 247–258.
[30] P. Faruki, V. Laxmi, M. S. Gaur, and P. Vinod, "Behavioural detection with API call-grams to identify malicious PE files," Proceedings of the. 1st International Conference Security of Internet of Things (SECURIT), 2012, pp. 85–91.
Conference Demos & Posters
[31] B. Buddhadev, A. Pulkit, V. Laxmi, and P. Faruki, "A covert channel attack using sound beeps in Android," Proceedings of the International Conference on ISEA Security and Privacy (ISEA-ISAP), Jaipur, India, Jan. 2019, pp. 116–121.
[32] P. Faruki, V. Laxmi, M. S. Gaur, and P. Vinod, "Control flow graph as signature to detect portable executable malware," Proceedings of the IEEE Security Symposium, Indian Institute of Technology Kanpur (IITK), India, 2013, pp. 1–6. Received Best Poster Award
[33] T. Gera, P. Faruki, and J. Singh, "A hybrid solution for Android ransomware detection," Smart IoT Systems: Innovations in Computing, vol. 1066, A. K. Somani, S. C. Satapathy, V. K. Katiyar, and S. Srivastava, Eds. Cham, Switzerland: Springer, 2019, pp. 117–127. Received Best Poster Award
Tutorials and Invited Talks
[1] P. Faruki, "Mobile Malware Analysis and Detection Techniques," Tutorial delivered at the International Conference on Smart IoT Systems and Innovations in Computing (SSIC), Jaipur, India, Jan. 2019.
[2] P. Faruki, "DroidAnalyst: Synergic Framework for Static and Dynamic Analysis," Tutorial delivered at the 10th International Conference on Security of Information and Networks (SIN), Jaipur, India, Oct. 2017.
[3] P. Faruki, "Application of Deep Learning in Mobile Forensics", National Thematic Workshop on Mobile Device and Application Security, Indian Institute of Technology Jammu, Jan 2025
[4] P. Faruki, "Mobile Security and Deep Learning", Technical Education Quality Improvement Program sponsored Course on Deep Learning: An Emerging Technology, Engineering College Ajmer, Rajasthan, Dec 2020.
— Organizer of the Information Security Education Awareness (ISEA) seminars (Jan 2020 - Present)
— Organizing Committee member of International Conference on Security of Information & Networks (2014 – Present)
— Organizing Co-Chair 10th International Conference on Security of Information & Networks (SIN) 2017
— Program Chair for International Conference ASCIS 2022
— Associate editor for Springer Nature Computer Science (SNCS) Journal
— Reviewer for IEEE Transactions on Information Forensics and Security (05 reviews)
— Reviewer for ACM Computing Surveys (2 reviews)
— Reviewer for Springer Computer Virology and Hacking Techniques (4 reviews)
— Reviewer for IEEE Access (3 review)
— Reviewer for Conferences (SIN 2014, SIN 2015, SIN 2017, SIN 2021, IC3 2017)