Department of Software Engineering
Mr. Md. Maruf Hassan  Associate Professor
Name :
Mr. Md. Maruf Hassan
Employee ID
710001741
Designation
Associate Professor  
Department
Department of Software Engineering
Faculty
Faculty of Science and Information Technology
Personal Webpage
https://faculty.daffodilvarsity.edu.bd/profile/swe/hassan-swe.html
E-mail
maruf.swe@diu.edu.bd
Phone
Cell-Phone
+8801833320477

- Ph.D. from UniMap, Malaysia (Continuing);
- M. Sc. in CSE, East West University, Dhaka, Bangladesh;
- Bachelor of Information Systems, Australian Catholic University, Sydney Australia.

Professional Certification

1. Computer Hacking Forensic Investigator (CHFI), EC-Council, Florida, USA, (Certificate No. ECC701239xxx8);
2. Certified Information Systems Auditor (CISA) from ISACA, USA (Certificate No.2016xxx2);
3. Certified EC-Council Instructor (CEI) from EC-Council, USA (Certificate No.ECC7368764xxx5);
4. Certified Ethical Hacker (CEH) from EC-Council (Certificate No.ECC2774167xxx4).

  1. “Developing the theoretical framework: Concepts, Theories, Models, and Application” (November 07, 2020) at UniMap, Malaysia.
  2. IT Risk Management, IT Audit Management in Banks and Financial Institutions, IT Security Risk Management in Banks and Financial Institutions, Core Banking System and IT Audit, Privacy, Workplace Security, Database;
  3. Fundamentals, Object-Oriented Analysis: Dynamic Modeling, Application Testing – Solutions, etc.;
  4. Participatory Engaging Techniques (PET) for teachers regarding “The way of conducting class for students in classroom” organized by Daffodil International University (January, 2017);
  5. Training for teachers “How to use Google Classroom for students for effective e-Learning” organized by Daffodil International University (January, 2017).
  1. Head of IT & Systems Audit Department, Premier Bank Limited, Dhaka, Bangladesh;
  2. IT Audit In-charge, National Credit & Commerce Bank Limited, Dhaka, Bangladesh;
  3. Senior Software Test Engineer, LEADS Corporation Limited, Dhaka, Bangladesh;
  4. Manager (IT Audit), Hoda Vasi Chowdhury & Co, Dhaka, Bangladesh;
  5. Associate Software Engineer, Accenture, Sydney, Australia;
  6. Test Analyst, Commonwealth Bank of Australia, Sydney, Australia;
  7. Software Developer, Australian Taxation Office (ATO), Australia.

Software Security; Information Security; Distributed Computing & Network Security; Operating System.

Publication

  1. Hassan, M. M., Ahmad, B. R., Esha, A., Risha, R., & Hasan, M. S. (2022). Important factors to remember when constructing a cross-site scripting prevention mechanism. Bulletin of Electrical Engineering and Informatics, 11(2), 965-973. (Scopus)
  2. Hassan, M. M., Ahmad, R. B., & Ghosh, T. (2021). SQL Injection Vulnerability Detection Using Deep Learning: A Feature-based Approach. Indonesian Journal of Electrical Engineering and Informatics (IJEEI), 9(3), 702-718. (Scopus)
  3. Hassan, M. M., Nipa, S. S., Akter, M., Haque, R., Deepa, F. N., Rahman, M., ... & Sharif, M. H. (2018). Broken authentication and session management vulnerability: a case study of web application. International Journal of Simulation Systems, Science & Technology, 19(2), 6-1. ISSN 1473-804x. DOI 10.5013/IJSSST.a.19.02.06
  4. Noyon, A. D., Abid, Y. M., Hassan, M. M., Sharif, M. H., Deepa, F. N., Rumel, R. I., ... & Zaman, M. (2018). A study of ajax template injection in web applications. International Journal of Engineering & Technology, 7(3), 123-127. DOI: 10.14419/ijet.v7i3.13.16337
  5. Hassan, M. M., Bhuyian, T., Sohel, M. K., Sharif, M. H., & Biswas, S. (2018). SAISAN: an automated local file inclusion vulnerability detection model. International Journal of Engineering & Technology, 7(2-3), 4. DOI: 10.14419/ijet.v7i2.3.9956 (Scopus)
  6. Ahmed, M. I., Hassan, M. M., & Bhuyian, T. (2017, December). Local File Disclosure Vulnerability: A Case Study of Public-Sector Web Applications. In Journal of Physics: Conference Series (Vol. 933, No. 1, p. 012011). IOP Publishing. DOI :10.1088/1742-6596/933/1/012011 (Scopus)
  7. Rana, M. S., Hassan, M. M., & Bhuiyan, T. (2017). An Enhanced Model for Inpainting on Digital Images Using Dynamic Masking. Journal of Communications, 12(4), 248-253. DOI: 10.12720/jcm.12.4.248-253 (Scopus)
  8. Paul, B. K., Bhuiyan, T., Abdulrazak, L. F., Sarker, K., Hassan, M. M., Shariful, S., & Ahmed, K. (2019). Extremely low loss optical waveguide for terahertz pulse guidance. Results in Physics, 15, 102666. DOI: 10.1016/j.rinp.2019.102666 (Scopus)
  9. Hassan, M., Sarker, K., Biswas, S., & Sharif, M. (2017). (2018). Detection of Wordpress content injection vulnerability. International Journal on Cybernetics & Informatics (IJCI). 6(3/4/5), 123-127. DOI: 10.5121/ijci.2017.6501
  10. Hassan, M., Risha, R., & Esha, A. (2023). ADT-SQLi: An Automated Detection of SQL Injection Vulnerability in Web Applications. In Proceedings of International Conference on Frontiers in Computing and Systems (pp. 433-443). Springer, Singapore.
  11. Tabassum, M., Sarower, A. H., Esha, A., & Hassan, M. M. (2020, February). An Enhancement of Kerberos Using Biometric Template and Steganography. In International Conference on Cyber Security and Computer Science (pp. 116-127). Springer, Cham. DOI: 10.1007/978-3-030-52856-0_9 (SCOPUS)
  12. Alam, S. T., Jahan, N., & Hassan, M. M. (2020, February). A New 8-Directional Pixel Selection Technique of LSB Based Image Steganography. In International Conference on Cyber Security and Computer Science (pp. 101-115). Springer, Cham. DOI: 10.1007/978-3-030-52856-0_8 (SCOPUS)
  13. Royel, R. I., Sharif, M. H., Risha, R., Bhuiyan, T., Hassan, M. M., & Hassan, M. S. (2020, February). A Risk Based Analysis on Linux Hosted E-Commerce Sites in Bangladesh. In International

  14. Conference on Cyber Security and Computer Science (pp. 140-151). Springer, Cham. DOI: 10.1007/978-3-030-52856-0_11 (SCOPUS)
  15. Hassan, M. M., Mustain, U., Khatun, S., Karim, M. S. A., Nishat, N., & Rahman, M. (2020). Quantitative Assessment of Remote Code Execution Vulnerability in Web Apps. In InECCE2019 (pp. 633-642). Springer, Singapore. DOI: 10.1007/978-981-15-2317-5_53 (Scopus)
  16. Hossain, M. E., Rahman, M., Qaiduzzaman, K. M., Shakir, A. K., & Hassan, M. M. (2019, October). Efficient Anti-Kidnapping and Anti-Harassment (Avoidance-Detection-Notification) Mobile Application for Unwanted Incidents. In 2019 IEEE Student Conference on Research and Development (SCOReD) (pp. 112-116). IEEE. DOI: 10.1109/SCORED.2019.8896280 (Scopus)
  17. Bhuiyan, T., Sarower, A. H., Karim, R., & Hassan, M. (2019, July). An image steganography algorithm using LSB replacement through XOR substitution. In 2019 International Conference on Information and Communications Technology (ICOIACT) (pp. 44-49). IEEE. DOI: 10.1109/ICOIACT46704.2019.8938486 (Scopus)
  18. Rahman, S. S. M. M., Mollah, S. A., Anirban, S., Rahman, M. H., Rahman, M., Hassan, M. M., & Sharif, M. H. (2018). OSCRUM: A modified scrum for open source software development. International Journal of Simulation: Systems, Science and Technology, 19(3), 20-1. DOI: 10.5013/IJSSST.a.19.03.20 (Scopus)
  19. Biswas, S., Sajal, M. M. H. K., Afrin, T., Bhuiyan, T., & Hassan, M. M. (2018). A study on remote code execution vulnerability in web applications. In International Conference on Cyber Security and Computer Science (ICONCS 2018). pp. 50-57. ISBN: 978-605-9554-32-9
  20. Hassan, M. M., Ali, M. A., Bhuiyan, T., Sharif, M. H., & Biswas, S. Quantitative Assessment on Broken Access Control Vulnerability in Web Applications. In International Conference on Cyber Security and Computer Science (ICONCS 2018). pp. 26-32. ISBN: 978-605-9554-32-9
  21. Farah, T., Shelim, R., Zaman, M., Hassan, M. M., & Alam, D. (2017). Study of race condition: A privilege escalation vulnerability. In WMSCI 2017-21st World Multi-Conference Syst. Cybern. Informatics, Proc (Vol. 2, pp. 100-105).
  22. Rana, M. S., Sarker, K., Bhuiyan, T., & Hassan, M. M. (2017, June). Comparing the performance of different ultrasonic images enhancement for speckle noise reduction in ultrasound images using techniques: a preference study. In Second International Workshop on Pattern Recognition (Vol. 10443, p. 104430W). International Society for Optics and Photonics. DOI: 10.1117/12.2280277 (Scopus)
  23. Begum, A., Hassan, M. M., Bhuiyan, T., & Sharif, M. H. (2016, December). RFI and SQLi based local file inclusion vulnerabilities in web applications of Bangladesh. In 2016 International Workshop on Computational Intelligence (IWCI) (pp. 21-25). IEEE. DOI: 10.1109/IWCI.2016.7860332 (Scopus)
  24. Farah, T., Shojol, M., Hassan, M., & Alam, D. (2016, July). Assessment of vulnerabilities of web applications of Bangladesh: A case study of XSS & CSRF. In 2016 sixth international conference on digital information and communication technology and its applications (DICTAP) (pp. 74-78). IEEE. DOI: 10.1109/DICTAP.2016.7544004 (Scopus)
  25. Hassan, M. M., Bhuiyan, T., & Biswas, S. (2016). An Investigation of Educational Web Applications in Bangladesh: A Case Study on Local File Disclosure Vulnerability. In 4th International Conf. on “Engineering & Technology, Computer, Basic & Applied Sciences” (ECBA-2016), Sydney.
  26. Tabassum, M., Sarower, A. H., Esha, A., & Hassan, M. M. (2020, February). An Enhancement of Kerberos Using Biometric Template and Steganography. In International Conference on Cyber Security and Computer Science (pp. 116-127). Springer, Cham. DOI: 10.1007/978-3-030-52856-0_9 (Scopus)
  27. Alam, S. T., Jahan, N., & Hassan, M. M. (2020, February). A New 8-Directional Pixel Selection Technique of LSB Based Image Steganography. In International Conference on Cyber Security and Computer Science (pp. 101-115). Springer, Cham. DOI: 10.1007/978-3-030-52856-0_8 (Scopus)
  28. Royel, R. I., Sharif, M. H., Risha, R., Bhuiyan, T., Hassan, M. M., & Hassan, M. S. (2020, February). A Risk Based Analysis on Linux Hosted E-Commerce Sites in Bangladesh. In International Conference on Cyber Security and Computer Science (pp. 140-151). Springer, Cham. DOI: 10.1007/978-3-030-52856-0_11 (Scopus)
  29. Hassan, M. M., Mustain, U., Khatun, S., Karim, M. S. A., Nishat, N., & Rahman, M. (2020). Quantitative Assessment of Remote Code Execution Vulnerability in Web Apps.

1. Cyber Security;
2. Malware Detection;
3. Machine Learning;
4. Image Processing.

  1. Erasmus+ Staff Exchange Scholarship from European Union to conduct research project at Staffordshire University in UK.
  2. Received best paper award from the 2nd International Conference on Cyber Security and Computer Science, Dhaka, Bangladesh during 15-16 February, 2020.
  3. Received Gold Award for SAISAN: Application Layer Vulnerability Detection Model from the International Engineering Invention Innovation Exhibition (i-ENVEX 2018), held at University Malaysia Perlis (UniMAP), Malaysia from 13th-14th April 2018;
  4. Received People Developer Recognition Certificate from Accenture Australia.
  1. Member of Bangladesh Society for Private University Academics. (Member ID: GM-x3)
  2. Fellow Member of CTO Forum Bangladesh. (Member ID: FMxx0)
  3. Member of ISACA in Bangladesh Chapter. (Member ID: 840xx4)
  4. Member of Australian Computer Society (Member ID: 3061xx6)

The Premier Bank Ltd.
National Credit and Commerce Bank Ltd.
LEADS Corporation.
Hoda Vasi Chowdhury & Co. (an affiliated firm of  Deloitte)
Commonwealth Bank of Australia
Australian Taxation Office (Department of Revenue of Australian Government)
Accenture Australia