{"id":2249,"date":"2014-01-21T14:10:11","date_gmt":"2014-01-21T13:10:11","guid":{"rendered":"http:\/\/people.unica.it\/researchersinmotion\/?page_id=2249"},"modified":"2017-02-09T11:37:21","modified_gmt":"2017-02-09T10:37:21","slug":"cv-mansour-ahmadi","status":"publish","type":"page","link":"https:\/\/people.unica.it\/researchersinmotion\/alumni-profiles\/mansour-ahmadi\/cv-mansour-ahmadi\/","title":{"rendered":"CV Mansour Ahmadi"},"content":{"rendered":"<p style=\"text-align: justify\"><span style=\"color: #ff0000\"><strong>EDUCATION:<\/strong>&nbsp;<\/span><strong><span style=\"color: #ff0000\">&nbsp;<\/span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/strong><\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">01\/2014 \u2013 01\/2017 <\/span><strong>University of Cagliari, Cagliari, Italy<\/strong><\/p>\n<p style=\"text-align: justify\">PhD, Research-based &#8211; Computer Security<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">09\/2007 \u2013 02\/2011<\/span> <strong>Azad University of Arak, Arak, Iran<\/strong><\/p>\n<p style=\"text-align: justify\">Master of science, GPA \u2013 17.57\/20 &#8211; Computer Software Engineering<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">02\/2003 \u2013 09\/2007<\/span> <strong>University of Sistan &amp; Baloochestan, Zahedan, Iran<\/strong><\/p>\n<p style=\"text-align: justify\">Bachelor &#8211; Applied Mathematics in Computer Science<\/p>\n<p style=\"text-align: justify\"><strong><br \/>\n<span style=\"color: #ff0000\">THESIS<\/span><\/strong><span style=\"color: #ff0000\">:<\/span><strong>&nbsp; &nbsp; &nbsp; &nbsp;<\/strong><\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">PhD <span style=\"color: #333333\">&#8220;<\/span><\/span>Modeling Neglected Functions of Android Applications to Effectively Detect Malware&#8221;<\/p>\n<p style=\"text-align: justify\"><strong>Supervisor<\/strong>: Prof.&nbsp; Giorgio Giacinto (University of Cagliari)<\/p>\n<p style=\"text-align: justify\"><strong>Description<\/strong>: &nbsp;I proposed different machine learning techniques for Android malware classification.<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">Master<\/span>&nbsp; &#8220;Software Classification based on Execution Pattern: a Data Mining Approach&#8221;<\/p>\n<p style=\"text-align: justify\"><strong>Supervisor<\/strong>: Prof.&nbsp; Ashkan Sami (Shiraz University)<\/p>\n<p style=\"text-align: justify\"><strong>Description<\/strong>: I proposed a data mining technique for Windows malware detection by dynamic analysis. My thesis score is 20\/20.<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #ff0000\"><strong><br \/>\nA<\/strong><strong>WARDS &amp;<\/strong>&nbsp;<\/span><strong><span style=\"color: #ff0000\">ACHIEVEMENTS<\/span>&nbsp;&nbsp; <\/strong><\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">2016:<\/span> Student Travel Grant for CCS 2016<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">2015:<\/span> Rank 49th among 377 teams (Top 13%) &#8211; Microsoft Malware challenge (The cup committee accepted our solution for presentation in WWW\/BIG conference)<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">2014:<\/span> Achieved 100\/100 score during Ph.D. admission + Received Ph.D. Scholarship<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">2012:<\/span> 3rd Paper Award \u2013 IT Security for Next Generation Cup, Kaspersky, Hong Kong, 2012<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">2011:<\/span> 1st Paper Award &#8211; IT Security for Next Generation Cup, Kaspersky, Malaysia, 2011<\/p>\n<p style=\"text-align: justify\"><strong><br \/>\n<span style=\"color: #ff0000\">COMPUTER LANGUAGES:<\/span><\/strong> <strong>&nbsp; &nbsp; &nbsp;&nbsp;<\/strong><\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">Current:<\/span> Python, Java, Android, LATEX<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">Past:<\/span> &nbsp;C#, SQL, UML, C\/C++, HTML, CSS, Asp.Net, R<\/p>\n<p style=\"text-align: justify\"><strong><br \/>\n<span style=\"color: #ff0000\">LANGUAGES: <\/span><\/strong><span style=\"color: #ff0000\">&nbsp;<\/span><strong><span style=\"color: #ff0000\">&nbsp;<\/span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/strong><\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">English:<\/span> Advanced &#8211; C1 level<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">Italian: <\/span>Elementary &#8211; A2 level<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">Persian\/Farsi<\/span>: Mother tongue<\/p>\n<p style=\"text-align: justify\"><strong><br \/>\n<\/strong><span style=\"color: #ff0000\"><strong>PUBLICATIONS &amp;<\/strong> <strong>&nbsp;<\/strong><strong>PRESENTATIONS:<\/strong>&nbsp;<\/span><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/strong><\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">2017:<\/span><\/p>\n<ol style=\"text-align: justify\" start=\"14\">\n<li><strong>(Conference) <\/strong>Guillermo Suarez-Tangil, Santanu &nbsp;Kumar Dash, <strong>Mansour Ahmadi<\/strong>, Giorgio Giacinto, Johannes &nbsp;Kinder, Lorenzo Cavallaro, &#8220;DroidSieve: Fast&nbsp; and Accurate Classification of Obfuscated &nbsp;Android Malware&#8221;, 7th&nbsp; Conference on Data &nbsp;and Applications Security and Privacy (CODASPY), ACM, Arizona, USA, Mar, 2017.<\/li>\n<\/ol>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">2016:<\/span><\/p>\n<ol style=\"text-align: justify\" start=\"13\">\n<li><strong>(Workshop) <\/strong><strong>Mansour Ahmadi<\/strong>, Battista Biggio, Steven Arzt, Davide Ariu, Giorgio Giacinto, &#8220;Detecting Misuse of Google Cloud Messaging in Android Badware&#8221;, SPSM, in conjunction with the CCS, 2016.<\/li>\n<li><strong>(Workshop) <\/strong>Santanu Kumar Dash, Guillermo Suarez-Tangil, Salahuddin Khan, Kimberly Tam, <strong>Mansour Ahmadi<\/strong>, Johannes Kinder, Lorenzo Cavallaro, &#8220;DROIDSCRIBE: Classifying Android Mal- ware based on Runtime Behavior&#8221;, Mobile Security Technologies (MoST) Workshop, in conjunction with the S&amp;P, IEEE, USA, 2016.<\/li>\n<li><strong>(Conference) <\/strong><strong>Mansour Ahmadi<\/strong>, Giorgio Giacinto, Dmitry Ulyanov, Stanislav Semenov and Mikhail Trofimov, &#8220;Novel feature extraction, &nbsp;selection and &nbsp;fusion for effective malware&nbsp; family classification&#8221;, 6th Conference on Data and Applications Security and Privacy (CODASPY), ACM, New Orleans, USA, Mar, 2016.<\/li>\n<\/ol>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">2015:<\/span><\/p>\n<ol style=\"text-align: justify\" start=\"11\">\n<li><strong>(Conference) <\/strong>Marco Aresu, Davide Ariu, <strong>Mansour Ahmadi<\/strong>, Davide Maiorca, Giorgio Giacinto, &#8220;Clustering Android Malware Families by Http Traffic&#8221;, 10th International Conference on Malicious and Unwanted Software (MALCON), IEEE, Puerto Rico, USA, Oct, 2015.<\/li>\n<li><strong>(Workshop) <\/strong><strong>Mansour Ahmadi<\/strong>, Giorgio Giacinto, &#8220;A light-weight malware family classification system: Microsoft malware challenge&#8221;, BIG event, co-located with WWW conference, 2015.<\/li>\n<li><strong>(Journal) <\/strong>Masoud Narouei, <strong>Mansour Ahmadi<\/strong>, Giorgio Giacinto, Hassan Takabi, Ashkan Sami, &#8220;DLLMiner: structural mining for malware detection&#8221;, Security and Communication Networks, Wiley, 2015.<\/li>\n<\/ol>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">2014:<\/span><\/p>\n<ol style=\"text-align: justify\" start=\"8\">\n<li><strong>(Poster) <\/strong>Masoud Narouei, <strong>Mansour Ahmadi<\/strong>, Hassan Takabi, Giorgio Giacinto, &#8220;Structural Mining for Malware Detection&#8221;, ACSAC, 2014.<\/li>\n<\/ol>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">2013:<\/span><\/p>\n<ol style=\"text-align: justify\" start=\"7\">\n<li><strong>(Journal) <\/strong>Masoud Naroie, <strong>Mansour Ahmadi<\/strong>, Ashkan Sami, &#8220;SePaS: Word Sense Disambigua- tion by Sequential Patterns in Sentences&#8221;, Natural Language Engineering, Cambridge, 2013.<\/li>\n<li><strong>(Journal) <\/strong><strong>Mansour Ahmadi<\/strong>, Ashkan Sami, Hossein Rahimi, Babak Yadegari, &#8220;Malware Detection by Behavioral Sequential patterns&#8221;, Computer Fraud &amp; Security, Elsevier, 2013.<\/li>\n<\/ol>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">2012:<\/span><\/p>\n<ol style=\"text-align: justify\" start=\"5\">\n<li><strong>(Conference) <\/strong>Mohammad Razmara, Babak Asadi, Masoud Narouei, <strong>Mansour Ahmadi<\/strong>, &#8220;A Novel Approach toward Spam Detection Based on Iterative Patterns&#8221;, ICCKE, IEEE, Iran, 2012.<\/li>\n<li><strong>(Conference) <\/strong>Masoud Narouei, <strong>Mansour Ahmadi<\/strong>, Ashkan Sami, &#8220;Mining Modules\u2019 Dependencies for Malware Detection&#8221;, presented at the IT Security for Next Generation Cup, Kaspersky, Hong Kong, 2012. 3rd Paper Award<\/li>\n<li><strong>(Journal) <\/strong>Fatemeh Karbalaie, Ashkan Sami, <strong>Mansour Ahmadi<\/strong>, &#8220;Semantic Malware Detection by Deploying Graph Mining&#8221;, International Journal of Computer Science Issues, vol. 9, Issue. 1,2012.<\/li>\n<\/ol>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">2011:<\/span><\/p>\n<ol style=\"text-align: justify\" start=\"2\">\n<li><strong>(Conference) <\/strong><strong>Mansour Ahmadi<\/strong>, Ashkan Sami, Hossein Rahimi, Babak Yadegari, &#8220;Iterative Patterns Blow the Malware Cover&#8221;, IT Security for Next Generation Cup, Kaspersky, Malaysia, 2011. Best Paper Award<\/li>\n<li><strong>(Conference) <\/strong><strong>Mansour Ahmadi<\/strong>, Peyman Gholami, &#8220;A Novel Classification Method &nbsp;aided SAW&#8221;, 16th conference of Computer Society of Iran, Iran, 2011.<\/li>\n<\/ol>\n<p style=\"text-align: justify\"><span style=\"color: #ff0000\"><strong><br \/>\nINTERESTS:<\/strong>&nbsp;<\/span><strong><span style=\"color: #ff0000\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n<p><\/strong><span style=\"color: #0000ff\">Vocational:<\/span> Computer security, Android security, Malware detection, Data mining, Machine Learning and Computational Linguistics<br \/>\n<span style=\"color: #0000ff\">Personal:<\/span> Traveling, Harmonica, Cooking, Table Tennis, Swimming<\/p>\n<p style=\"text-align: justify\"><strong><span style=\"color: #ff0000\"><br \/>\nSERVICES:&nbsp;<\/p>\n<p><\/span><\/strong><span style=\"color: #0000ff\">Reviewer: <\/span>Computers &amp; Security Journal<br \/>\n<span style=\"color: #0000ff\">Sub Reviewer:<\/span> &nbsp;MLDM 2015, 2016, IC4S 2016, ITA-SEC 2017<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #ff0000\"><strong><br \/>\nEXPERIENCE:<br \/>\n<\/strong><\/span><span style=\"color: #0000ff\"><br \/>\nWORK:<\/span><\/p>\n<p style=\"text-align: left\"><span style=\"color: #0000ff\">01\/2017 \u2013 Present<\/span>&nbsp;<strong>University of Cagliari, Cagliari, Italy<br \/>\n<\/strong>Postdoctoral Researcher &#8211; Machine Learning for Malware Classification. Working with Prof. &nbsp;Giorgio Giacinto<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">08\/2015 \u2013 01\/2016,&nbsp;<\/span><span style=\"color: #0000ff\">06\/2016 \u2013 07\/2016<\/span>&nbsp;<strong>Royal Holloway, University of London, Egham, UK<br \/>\n<\/strong>Visiting research assistant &#8211; Static and dynamic analysis of Android malware. Working with Dr. Lorenzo Cavallaro &amp; Dr. Johannes Kinder<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">06\/2013 \u2013 12\/2013<\/span> <strong>F<\/strong><strong>r<\/strong><strong>eelancer, <\/strong><strong>Shiraz, Iran<br \/>\n<\/strong>Master thesis consultant &#8211; Persian POS tagger system, Malicious PDF detection by frequent patterns<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">04\/2013 \u2013 06\/2013<\/span> <strong>Research Institute for ICT, Tehran, Iran<br \/>\n<\/strong>Software developer, security researcher &#8211; Developer of a system by MS Visual C#<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">10\/2007 \u2013 03\/2013<\/span> <strong>Nikan Network Company, Shiraz, Iran<br \/>\n<\/strong>Software development manager &amp; Engineer, Security Consultant &#8211; Web Application Security Consultant, Kaspersky Anti Malware Technical Manager, Designed and implemented of customized applications by MS Visual C#, SQL Server<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">01\/2010 \u2013 01\/2012<\/span> <strong>APA, Shiraz University, Shiraz, Iran<br \/>\n<\/strong>Software Engineer and Security Researcher &#8211; Malware Analysis by MS Visual C#, MS Visual C++, API Monitoring, Virtual Box<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">05\/2007 \u2013 10\/2007<\/span> <strong>SIDA company, Tehran, Iran<br \/>\n<\/strong>Developer and Database Designer &#8211; Designed and implemented of customized applications by MS Visual C#, ASP.Net, Oracle<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\"><br \/>\nTEACH:<\/span><\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\">01\/2008 \u2013 12\/2013&nbsp;<\/span><strong>Fa<\/strong><strong>rs Universities, Iran<br \/>\n<\/strong>Instructor: Professional experience in teaching bachelor courses at 4 universities such as Pasargad Non State &nbsp;University (Shiraz), Azad University (FiroozAbad), Payame Noor University (Safa-shahr), University of Applied Science and Technology (Sa\u2019adat-Shahr)<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #0000ff\"><br \/>\nCOURSES:&nbsp;<\/span><\/p>\n<p style=\"text-align: justify\">Certified Ethical Hacking (CEH), Software Engineering, Object Oriented Analysis and Design, Object Oriented Programming, Network Programming, Multimedia, Artificial Intelligence, Data Structure, E-Commerce, File system and structures, Technical English, Documentation, Web Design<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>EDUCATION:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 01\/2014 \u2013 01\/2017 University of Cagliari, Cagliari, Italy PhD, Research-based &#8211; Computer Security 09\/2007 \u2013 02\/2011 Azad University of Arak, Arak, Iran Master of science, GPA \u2013 17.57\/20 &#8211; Computer Software Engineering 02\/2003 \u2013 09\/2007 University of Sistan &amp; Baloochestan, Zahedan, Iran Bachelor &#8211; Applied Mathematics in Computer Science THESIS:&nbsp; &nbsp; &nbsp; &nbsp; PhD &#8220;Modeling Neglected Functions of Android Applications to Effectively Detect Malware&#8221; Supervisor: Prof.&nbsp; Giorgio Giacinto (University of Cagliari) Description: &nbsp;I proposed different machine learning techniques for Android malware classification. Master&nbsp; &#8220;Software Classification based on Execution Pattern: a Data Mining Approach&#8221; Supervisor: Prof.&nbsp; Ashkan Sami (Shiraz University) <a href='https:\/\/people.unica.it\/researchersinmotion\/alumni-profiles\/mansour-ahmadi\/cv-mansour-ahmadi\/' class='excerpt-more'>[&#8230;]<\/a><\/p>\n","protected":false},"author":366,"featured_media":0,"parent":2247,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-2249","page","type-page","status-publish","hentry","post-seq-1","post-parity-odd","meta-position-corners","fix"],"publishpress_future_action":{"enabled":false,"date":"2026-04-11 05:09:10","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"frm_application","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/people.unica.it\/researchersinmotion\/wp-json\/wp\/v2\/pages\/2249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/people.unica.it\/researchersinmotion\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/people.unica.it\/researchersinmotion\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/people.unica.it\/researchersinmotion\/wp-json\/wp\/v2\/users\/366"}],"replies":[{"embeddable":true,"href":"https:\/\/people.unica.it\/researchersinmotion\/wp-json\/wp\/v2\/comments?post=2249"}],"version-history":[{"count":22,"href":"https:\/\/people.unica.it\/researchersinmotion\/wp-json\/wp\/v2\/pages\/2249\/revisions"}],"predecessor-version":[{"id":6753,"href":"https:\/\/people.unica.it\/researchersinmotion\/wp-json\/wp\/v2\/pages\/2249\/revisions\/6753"}],"up":[{"embeddable":true,"href":"https:\/\/people.unica.it\/researchersinmotion\/wp-json\/wp\/v2\/pages\/2247"}],"wp:attachment":[{"href":"https:\/\/people.unica.it\/researchersinmotion\/wp-json\/wp\/v2\/media?parent=2249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}