I am a postdoctoral Research Associate at the Northeastern University, working with Dr. Long Lu. I was so lucky to had a chance to work with great advisors such as Prof. Giorgio Giacinto, Dr. Lorenzo Cavallaro, Dr. Johannes Kinder during my Ph.D., and Dr. Ashkan Sami during my Master.


I'm originally from a small village, Davan in Fars, Iran, but I lived for many years in the beautiful city of Shiraz.

Research interests

I am interested in Computer security, Android security, Malware, Data mining, Machine Learning and Computational Linguistics.


EMail: m.[My Lastname]
Skype: Mansour-Ahmadi


[18] Microsoft Malware Classification Challenge [PDF] [Challenge Website]
Royi Ronen, Marian Radu, Corina Feuerstein, Elad Yom-Tov, Mansour Ahmadi
arXiv, February

[17] IntelliAV: Building an Effective On-Device Android Malware Detector [PDF] [Official Website]
Mansour Ahmadi, Angelo Sotgiu, Giorgio Giacinto
arXiv, February


[16] IntelliAV: Toward the Feasibility of Building Intelligent Anti-Malware on Android Devices [PDF] [Official Website] [Online] [Slides]
Mansour Ahmadi, Angelo Sotgiu, Giorgio Giacinto
International Cross Domain Conference for Machine Learning & Knowledge Extraction (CD-MAKE), Springer, Italy, September

[15] Modeling Neglected Functions of Android Applications to Effectively Detect Malware [PDF]
Mansour Ahmadi
PhD Thesis, University of Cagliari, Italy, April

[14] DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware [PDF] [Online] [Slides] Guillermo Suarez-Tangil, Santanu Kumar Dash, Mansour Ahmadi, Johannes Kinder, Giorgio Giacinto, and Lorenzo Cavallaro
Data and Application Security and Privacy (CODASPY), ACM, USA, March (AR=16%)


[13] Detecting Misuse of Google Cloud Messaging in Android Badware [PDF] [Online] [Slides]
Mansour Ahmadi, Battista Biggio, Steven Arzt, Davide Ariu, Giorgio Giacinto
Security and Privacy in Smartphones and Mobile Devices (SPSM), in conjunction with the CCS, ACM, Vienna, Asuria, October (AR=42%)

[12] DROIDSCRIBE: Classifying Android Malware based on Runtime Behavior [PDF] [Online] [Slides]
Santanu Kumar Dash, Guillermo Suarez-Tangil, Salahuddin Khan, Kimberly Tam, Mansour Ahmadi, Johannes Kinder and Lorenzo Cavallaro, May, Mobile Security Technologies (MoST), in conjunction with the S&P, IEEE, San Jose, CA, USA (AR=28%)

[11] Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification [PDF] [Online] [Slides]
Mansour Ahmadi, Dmitry Ulyanov, Stanislav Semenov and Mikhail Trofimov, Giorgio Giacinto, March, 6th Conference on Data and Applications Security and Privacy (CODASPY), ACM, New Orleans, USA (AR=19%)


[10] Clustering Android Malware Families by Http Traffic [PDF] [Online] [Slides]
Marco Aresu, Davide Ariu, Mansour Ahmadi, Davide Maiorca and Giorgio Giacinto, October, 10th International Conference on Malicious and Unwanted Software (MALCON), IEEE, Puerto Rico, USA (AR=28%)

[9] DLLMiner: structural mining for malware detection [PDF] Extended version of #4, #8, [Online]
Masoud Narouei, Mansour Ahmadi, Giorgio Giacinto, Hassan Takabi, Ashkan Sami, April, security and communication networks, Wiley (SJR=Q2)


[8] Structural Mining for Malware Detection [#9 for PDF] [Online]
Masoud Narouei, Mansour Ahmadi, Hassan Takabi, Giorgio Giacinto, December, 31st Annual Computer Security Applications Conference (ACSAC), USA (Poster)


[7] SePaS: Word Sense Disambiguation by Sequential Patterns in Sentences [PDF], [Online]
Masoud Narouei, Mansour Ahmadi, Ashkan Sami, September, Journal of Natural Language Engineering, Cambridge university press, UK (SJR=Q1)

[6] Malware Detection by Behavioral Sequential patterns [PDF] Extended version of #2, [Online]
Mansour Ahmadi, Ashkan Sami, Hossein Rahimi, Babak Yadegari, Augest, Computer fraud & Security, Volume 2013 Issue 8, Pages: 11-19, Elsevier, Netherlands (SJR=Q3)


[5] A Novel Approach toward Spam Detection Based on Iterative Patterns [PDF] [Online]
Mohammad Razmara, Babak Asadi, Masoud Narouei, Mansour Ahmadi, October, 2nd International eConference on Computer and Knowledge Engineering , Pages: 318-323, IEEE, Mashhad, Iran

[4] Mining Modules’ Dependencies for Malware Detection [Slides] 3rd Paper award [Online]
Masoud Narouei, Mansour Ahmadi, Ashkan Sami, March, Kaspersky Lab Asia Pacific & MEA Cup, Hong Kong

[3] Semantic Malware Detection by Deploying Graph Mining [PDF] [Online]
Fatemeh Karbalaie, Ashkan Sami, Mansour Ahmadi, January, International Journal of Computer Science Issues, Volume 9 Issue 1, Pages: 373-379, Mauritius


[2] Iterative System Call Patterns Blow the Malware Cover [#6 for PDF] [Slides] 1st Paper award [Online]
Mansour Ahmadi, Ashkan Sami, Hossein Rahimi, Babak Yadegari, March, Kaspersky Lab Asia Pacific & MEA Cup, Malaysia (AR=16%)

[1] A Novel Classification Method by SAW [PDF]
Mansour Ahmadi, Peyman Gholami, March, 16th conference of Computer Society of Iran, Tehran, Iran