Research

Internet of Things Security

  • Analyze IoT malware and focus on the endpoints reachable on the public Internet. Discover their different behavioral aspects and affinities. Reverse-engineer IoT malware binaries, augment geographical, and network information.
  • Explore various characteristics of endpoints of IoT malware, including spatial, network, and organizational affinities. Identify 56 unique chains among different IoT botnets. Suggest a centrality-based defense and monitoring mechanism to limit the propagation of malware.
  • Network Security

  • Investigate transparency of the centralized zone data service (CZDS) by measurement and evaluation. Conduct experiment to request access to zone data of all generic Top-Level Domains (gTLDs), analyze various aspects of CZDS, including access status, responsiveness and provided reasons for granting access or denial.
  • Measure the performance of the authentication method in Wireless Sensor Network (WSN) using u-TESLA. Simulate the routing protocol and sensor node behaviors with NS-2. Suggest a method of enhanced energy efficiency and responsibility.
  • Implement relay attack and its countermeasures in the payment process using Bluetooth Low Energy (BLE) protocol. Build an Android application using the BLE protocol for the experiment.
  • Publications

    * Equal contributor

    • Jinchun Choi, Mohammed Abuhamad, Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Jeman Park, DaeHun Nyang and David Mohaisen, "Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet", IEEE Access, 2020 PDF
    • Afsah Anwar, Aminollah Khormali, Jinchun Choi, Hisham Alasmary and Aziz Mohaisen, "Measuring the Cost of Software Vulnerabilities", EAI Endorsed Transactions on Security and Safety, 2020 PDF
    • Jinchun Choi, Ahmed Abusnaina, Afsah Anwar, An Wang, Songqing Chen, DaeHun Nyang and Aziz Mohaisen, "Honor Among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets." IEEE Conference on Dependable and Secure Computing (IDSC 2019) PDF
    • Jinchun Choi*, Afsah Anwar*, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, and Aziz Mohaisen, "IoT Malware Ecosystem in the Wild: A Glimpse into Analysis and Exposures" The Second ACM/IEEE Workshop on Hot Topics on Web of Things (HoTWoT 2019) PDF
    • Jeman Park, Jinchun Choi, DaeHun Nyang and Aziz Mohaisen, "Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service." IEEE Transactions on Network and Service Management (TNSM 2019) PDF
    • Muhammad Saad, Jinchun Choi, DaeHun Nyang, Joongheon Kim and Aziz Mohaisen, "Towards Characterizing Blockchain-based Cryptocurrencies for Highly-Accurate Predictions." IEEE Systems Journal (ISJ 2019) Best Paper Award PDF
    • Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, Ahmed Abusnaina, Amro Awad, DaeHun Nyang and Aziz Mohaisen, "Analyzing and Detecting Emerging Internet of Things Malware: A Graph-based Approach." IEEE Internet of Things Journal (IoTJ 2019) PDF
    • Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen "Poster: Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach." The Network and Distributed System Security Symposium 2019. (NDSS 2019 Poster) PDF

    • Jinchun Choi*, Afsah Anwar*, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, and Aziz Mohaisen, "Poster: Analyzing Endpoints in Internet of Things Malware." The Network and Distributed System Security Symposium 2019. (NDSS 2019 Poster) PDF
    • Hisham Alasmary, Afsah Anwar, Jeman Park, Jinchun Choi, Daehun Nyang, and Aziz Mohaisen, "Graph-based Comparison of IoT and Android Malware.", International Conference on Computational Data and Social Networks (CSoNet 2018) PDF
    • Jong-Hyuk Im, Jinchun Choi, DaeHun Nyang, and Mun-Kyu Lee, "Privacy-Preserving Palm Print Authentication Using Homomorphic Encryption.", Proceedings of IEEE DataCom 2016, Poster, pp. 878-881, Aug 2016. - Best Poster Award Best Poster Award PDF

    Contact

    • jc.choi AT knights.ucf.edu
    • HPA1-111, University of Central Florida, Orlando, Florida 32816

    Contact

      © 2016-2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.