Aziz Mohaisen Associate Professor
Dept. Computer Science
Dept. Electrical and Computer Engineering (joint)
Director, Security Analytics Research Lab (SEAL)
co-Director, Research Lab of Big Data Security
Member, Cybersecurity Faculty Cluster Initiative
University of Central Florida

4000 Central Florida Blvd., Orlando, FL 32816, USA
Phone: 407-823-1294, Fax: 407-823-5835

Openings: We are always looking for talented Postdoctoral Scholars (P3), and motivated Ph.D. students (Blockchain, IoT security, software security) to join our group. Drop me a line to learn more.

Biography: I am an Associate Professor at UCF's CS / ECE (joint) departments. Earlier, I was a researcher at ETRI, a (senior) researcher at Verisign Labs, and a faculty member at SUNY Buffalo. I work on computer security and privacy, focusing on malware, denial of service, domain name system, Internet of Things, Blockchain, and mobile systems. I am a senior member of ACM (2018) and IEEE (2015) -- DBLP and Google Scholar.


Teaching: Fall 2018: CIS 4615: Secure Software Development (Undergraduate). Spring 2018: CAP 6133. Fall 2017: CIS 4615,
Current Service: PC member: WPES 2018, INFOCOM 2019, ASIA CCS 2018, NDSS 2018, ICWSM 2018, ICC 2018. DCOSS 2018.
(co-)chair: IEEE ICASSP 2018 (security track), MASS 2018 (security and privacy track), ACM SCC 2018 (with ACM ASIACCS 2018), IEEE ICC 2019 (security track).
Editorial board: IEEE Transactions on Mobile Computing and ETRI Journal (Wiley)

▬ Recent Updates

  • 06/2018:: SEAL hosted 80 k-12 students for a security summer camp via Camp Connect. Check out some of the photos
  • 06/2018: Jeff accepted a tenure-track Assistant Professor position at Niagara University. Successfully defended, too!
  • 04/2018: I was elevated to the rank of ACM senior member (IEEE senior member since 2015).
  • 04/2018: FC2 funded our project on mobile security training (joint with Karim Elish from Florida Poly). Thanks FC2!
  • 04/2018: Served as an offense to the defense of An Wang (GMU) and Amirali Sanatinia (NEU)! Well done! Congrats!
  • 04/2018: One paper accepted in SECURECOMM 2018. Congratulations to Afsah and Amin!
  • 04/2018: Two papers accepted in IEEE ICDCS 2018. Congratulations to Sungha, Youngdon, and Shinyoung!
  • 03/2018: Incremental funding from AFRL for blockchain research! Thanks AFRL!
  • 04/2018: Ahmed will be funded by an ORC fellowship for 2018/2019! Congrats, Ahmed.
  • 03/2018: FC2 funded our project on thwarting APTs in IoT (joint with My T. Thai from UF). Thanks FC2!
  • 02/2018: We welcomed Ashar, Jinchun, Jiyoo, and Ahmed for their Ph.D. studies.
  • 02/2018: Two papers accepted at ICASSP 2018 (QoI and DigitalSEAL). Congrats to Jeman, Hisham, and Changhun.
  • 01/2018: Two papers were accepted in IEEE Trans on Dependable and Secure Computing. Congrats to An and Wentao
  • 01/2018: I was invited to the editorial board of IEEE Transactions on Mobile Computing. Submit your best work!
  • 11/2017: NSF funded our work on understanding abuse of privacy enhancing technology. Thanks NSF!
  • 11/2017: I am co-chairing The 6th Workshop on Security in Cloud Computing (ACM ASIACCS-SCC). Consider attending!.
  • 11/2017: Jeman won 3rd place in KOCSEA Poster competition
  • 10/2017: Papers accepted: NDSS 2018, ICC 2018, and ICOIN 2018. Congrats to Saad, Zhongjie, Sixu, Jeff, and Jeman.
  • 08/2017: NVIDIA donated GPUs for our research work on malware analysis. Thanks NVIDIA!
  • 08/2017: Afsah, Amin, Hisham, and Saad joined for their Ph.D. studies.
  • 08/2017: We received funding from AFRL to pursue research on blockchain security. Thanks AFRL!
  • 08/2017: One paper accepted at the SECURECOMM 2017. Congrats to An and Wentao!
  • 08/2017: Two papers accepted at ACM HotWeb 2017. Congrats to Jeff and Omar!
  • 08/2017: One paper appearing in IEEE/ACM Transactions on Networking (DNS measurement)
  • 08/2017: I moved to UCF as an Associate Professor (from the exquisite city of Buffalo!!!).
  • 06/2017: Five papers, a demo and a poster @ IEEE ICDCS 2017. Congrats to Jeff, Jiyoo, Feng, Si, An, and Chaowen!
  • 05/2017: One paper presented at IEEE INFOCOM 2017. Congrats to Fan!
  • 01/2017: One research paper @ Financial Cryptography 2017 (privacy-preserving graph analytics)! Way to go, Qian!.
  • 01/2018: Openings for a postdoctoral researcher and several Ph.D. students. Email mohaisen@ucf.edu to learn more.

▬ Recent Publications

ACM CCS 2018
Large-Scale and Language-Oblivious Code Authorship Identification
ISOC NDSS 2018
ABC: Enabling Smartphone Authentication with Built-in Camera
CACM, Science Newsline, New Atlas, Geek.com, Digital Trends, Futurity, etc.
IEEE ICDCS 2018
SSD-Insider: Internal Defense of Solid-State Drive against Ransomware
IEEE ICDCS 2018
ShmCaffe: A Distributed Deep Learning Platform with Shared Memory
IEEE PST 2018
Realistic Evaluation of the Very Short Intermittent DDoS Attacks
SECURECOMM 2018
Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions
IEEE ICASSP 2018
QOI: Assessing Participation in Threat Information Sharing
IEEE ICASSP 2018
DIGITALSEAL: A Transaction Authentication Tool for Online and Offline Transactions
Comp & Security 2018
Physical Protection for PIN Entry Secure against Recording Attacks
IEEE TMC 2018
Pricing Data Tampering in Automated Fare Collection with NFC-equipped Smartphones
IEEE TMC 2018
Android Malware Detection using Complex-Flows
IEEE TDSC 2018
A Data-Driven Study of DDoS Attacks and Their Dynamics
IEEE TDSC 2018
Look-aside At Your Own Risk: Privacy Implications of DNSSEC Look-aside Validation
IEEE ICC 2018
Securing the Internet of Things: A Machine Learning Approach (Tutorial)
IEEE HotPOST 2018
Towards Characterizing Blockchain-based Cryptocurrencies for Highly-Accurate Predictions
RFC 8391 / 2018
XMSS: Extended Hash-Based Signatures (Standard)
IEEE ICDCS 2017
An Adversary-Centric Behavior Modeling of DDoS Attacks
IEEE ICDCS 2017
Privacy Implications of DNSSEC-Lookaside Validation
IEEE ICDCS 2017
When Smart TV Meets CRN: Privacy-preserving Fine-grained Spectrum Access
IEEE ICDCS 2017
Android Malware Detection Using Complex Flows
IEEE ICDCS 2017
Rogue Access Point Detector Using Channel Overlapping in 802.11n (Demo)
IEEE ICDCS 2017
Defending Against Voice Impersonation Attacks on Smartphones (Best student paper)
Phys.org, Sci. Amer., CBS, Financial Express, Tech Radar, NDTV, Science Daily, Gizmodo, etc.
IEEE INFOCOM 2017
Large-scale Invisible Attack on AFC Systems with NFC-equipped Smartphones
Financial Crypto 2017
Graph Encryption for Exact Shortest Distance Queries with Efficient Updates
SECURECOMM 2017
Understanding Adversarial Strategies from Bot Recruitment to Scheduling
ACM HotWeb 2017
Understanding the Effectiveness of Typosquatting Techniques
ACM HotWeb 2017
Rethinking Information Sharing for Threat Intelligence
ACM/IEEE ToN 2017
Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures (3.376)
ACM WiSec 2017
Highly-Accurate Access Point Detection using Intentional Interference
ACM WiSec 2017
Two-level Network Monitoring in WLAN using Software-Defined Networking
USPTO 2017
Access control for named domain networking (Patent)
USPTO 2017
Methods and systems for domain name data networking (Patent)
IEEE TIFS 2017
Crime Scene Reconstruction: Online Gold Farming Network Analysis (2.44)
ISOC NDSS 2016
Uncovering game bots in MMORPGs via self-similarity in the wild (15%)
IEEE TKDE 2016
Private Over-threshold Aggregation Protocols over Distributed Databases (1.82)
Comp & Security 2016
Andro-Dumpsys: Anti-malware system based on malware creator information
DIMVA 2015
Revealing DDoS Attack Dynamics behind the Scenes (23%)
ACM ASIACCS 2015
Measuring Botnets in the Wild: Some New Trends (22%)
IEEE CNS 2015
Separating Benign and Malicious Network Events for Malware Classification (28%)
IEEE DSN 2015
Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis (22%)
IEEE TDSC 2015
Timing Attacks on Access Privacy in ICN and Countermeasures (1.59)
Comp & Security 2015
Transaction authentication using complementary colors.
Comp & Security 2015
AMAL: High-fidelity, behavior-based automated malware analysis and classification
ACM IMC 2014
Measuring Domain Forwarding and Applications at the Internet Scale (20.3%)
DIMVA 2014
Metadata-driven Threat Classification of Network Endpoints Appearing in Malware (23%)
DIMVA 2014
AV-Meter: An Evaluation of Antivirus Scans and Labels (23%)
ACM WPES 2014
Measuring the Leakage of Onion at the Root (25%)
IEEE CNS 2014
Exploring Classification of Malware using the Order of Events (26%)
IEEE TMC 2014
Keylogging-resistant Visual Authentication Protocols (2.91)
IEEE TDSC 2014
Secure encounter-based social networks: Requirements, challenges, and designs (1.59)
ACM ASIACCS 2013
Dynamix: anonymity on dynamic social structures (28%)
IEEE TSC 2013
Trustworthy Distributed Computing on Social Networks (2.37)
MIT Technology Review, The Verge, Data News, Atelier, msn.com.
IEEE TVT 2013
Trading Optimality for Scalability in Large-scale Opportunistic Routing (2.64)
ACM ASIACCS 2012
On the mixing time of directed social graphs and security implications (18%)
IEEE INFOCOM 2012
Dynamic energy-oriented scheduling for sustainable wireless sensor networks (18%)
ISOC NDSS 2011
Losing control of the Internet: Using the data plane to attack the control plane (18%)
New Scientist, CBS News, Slashdot, METRO, The Register, Gizmodo, etc.
IEEE INFOCOM 2011
Incorporating trust into social network-based Sybil defenses (16%)
ACM IMC 2010
Measuring the mixing time of social graphs (22%)

▬ Graduate Students

Current Students
  1. Jeman Park (Ph.D., 2016-)
  2. Hisham Alasmary (Ph.D., 2017-)
  3. Afsah Anwar (Ph.D., 2017-)
  4. Amin Khormali (Ph.D., 2017-)
  5. Muhammad Saad (Ph.D., 2017-)
  6. Ashar Ahmad (Ph.D., 2018-)
  7. Jinchun Choi (Ph.D., 2018-)
  8. Jiyoo Jang (Ph.D., 2018-)
  9. Ahmed Abusnaina (Ph.D., 2018-)
  10. Brandon Gray (pre-Ph.D., 2018-)
Gone but not forgotten:
  1. Jeff Spaulding (Ph.D., 2014-2018)
    → Assistant Professor @ Niagara University
  2. Joe D'Amato, (M.Sc., 2016) → Cyber Security Software Engineer @ MITRE
  3. Jesse Freeman (M.Sc., 2016) → US DoD
  4. Christopher Weeden (M.Sc., 2016) → US DoD
  5. Woodams Clark, (M.Sc., 2016) → US DoD

▬ Features

Rogue AP Detection
Voice Impersonation