2018

Lisa Nguyen Quang Do, Stefan Krüger, Patrick Hill, Karim Ali, and Eric Bodden. Debugging Static Analysis. IEEE Transactions on Software Engineering (TSE).
Stefan Krüger, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini. CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. European Conference on Object Oriented Programming (ECOOP), 10:1–10:27.
Lisa Nguyen Quang Do, Stefan Krüger, Patrick Hill, Karim Ali, and Eric Bodden. VISUFLOW: a debugging environment for static analyses. International Conference on Software Engineering (ICSE) Companion Proceeedings, 89–92.

2017

Stefan Krüger, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric Bodden, Florian Göpfert, Felix Günther, Christian Weinert, Daniel Demmler, and Ram Kamath. CogniCrypt: Supporting Developers in Using Cryptography. IEEE/ACM International Conference on Automated Software Engineering (ASE), 931–936.
Johannes Späth, Karim Ali, and Eric Bodden. IDEal: Efficient and Precise Alias-Aware Dataflow Analysis. ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), 99:1–99:27.
Mona Nashaat, Karim Ali, and James Miller. Detecting Security Vulnerabilities in Object-Oriented PHP Programs. IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM), 159–164.
Taylor Lloyd, Artem Chikin, Erick Ochoa, Karim Ali, and José Nelson Amaral. A Case for Better Integration of Host and Target Compilation When Using OpenCL for FPGAs. International Workshop on FPGAs for Software Programmers (FSP), 1–9.
ACM SIGSOFT Distinguished Paper Award
Lisa Nguyen Quang Do, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, and Emerson R. Murphy-Hill. Just-in-Time Static Analysis. ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 307–317.
Lisa Nguyen Quang Do, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, and Emerson R. Murphy-Hill. Cheetah: Just-in-Time Taint Analysis for Android Apps. International Conference on Software Engineering (ICSE) Companion Proceeedings, 39–42.

2016

Johannes Späth, Lisa Nguyen Quang Do, Karim Ali, and Eric Bodden. Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java. European Conference on Object Oriented Programming (ECOOP), 22:1–22:26.

2015

Karim Ali, Marianna Rapoport, Ondřej Lhoták, Julian Dolby, and Frank Tip. Type-Based Call Graph Construction Algorithms for Scala. ACM Transactions on Software Engineering and Methodology (TOSEM), 9:1–9:43.
Steven Arzt, Sarah Nadi, Karim Ali, Eric Bodden, Sebastian Erdweg, and Mira Mezini. Towards Secure Integration of Cryptographic Software. ACM International Symposium on New Ideas, New paradigms, and Reflections on Programming and Software (Onward!), 1–13.

2014

Karim Ali. The Separate Compilation Assumption. PhD Thesis, David R. Cheriton School of Computer Science, University of Waterloo.
Distinguished Artifact Award
Karim Ali, Marianna Rapoport, Ondřej Lhoták, Julian Dolby, and Frank Tip. Constructing Call Graphs of Scala Programs. European Conference on Object Oriented Programming (ECOOP), 54–79.

2013

Karim Ali and Ondřej Lhoták. Averroes: Whole-Program Analysis Without The Whole Program. European Conference on Object Oriented Programming (ECOOP), 378–400.

2012

Karim Ali and Ondřej Lhoták. Application-Only Call Graph Construction. European Conference on Object Oriented Programming (ECOOP), 688–712.

2010

Karim Ali. Algorizmi: A Configurable Virtual Testbed to Generate Datasets for Offline Evaluation of Intrusion Detection Systems. M.Math Thesis, David R. Cheriton School of Computer Science, University of Waterloo.

2009

Karim Ali and Raouf Boutaba. Applying Kernel Methods to Anomaly-Based Intrusion Detection Systems. IEEE Global Information Infrastructure Symposium (GIIS).
Karim Ali, Issam Aib, and Raouf Boutaba. P2P-AIS: A P2P Artificial Immune Systems Architecture for Detecting DDoS Flooding Attacks. IEEE Global Information Infrastructure Symposium (GIIS).

2008

Sherif G. Aly, Sarah Nadi, and Karim Hamdan. A Java-Based Programming Language Support of Location Management in Pervasive Systems. International Journal of Computer Science and Network Security (IJCSNS), 329–336.