2020

  1. Rhongho Jang, Daehong Min, Seongkwang Moon, David Mohaisen, and DaeHun Nyang:
    SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event.
    The 39th IEEE International Conf. on Computer Communications (INFOCOM 2020). Virtual.

  2. Ahmed Abusnaina, Rhongho Jang, Aminollah Khormali, DeaHun Nyang, and David Mohaisen:
    DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting.
    The 39th IEEE International Conf. onComputer Communications (INFOCOM 2020). Virtual.

  3. H. Alasmary, A. Abusnaina, R. Jang, M. Abuhamad, A. Anwar, D. Nyang, and D. Mohaisen:
    Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers.
    The 40th IEEE International Conference on Distributed Computing Systems (ICDCS 2020)

  4. Ulku Meteriz, Necip Fazil Yıldıran, Joongheon Kim, and David Mohaisen:
    Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications.
    The 40th IEEE International Conference on Distributed Computing Systems (ICDCS 2019)

  5. Mohammed Abuhamad, Tamer Abuhmed, DaeHun Nyang, and David Mohaisen:
    Multi-χ: Identifying Multiple Authors from Source Code Files.
    Privacy Enhancing Technologies Symposium (PETS 2020). Virtual.

  6. Afsah Anwar, Hisham Alasmary, Jeman Park, An Wang, Songqing Chen and David Mohaisen:
    Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection.
    22nd International Conference on Information and Communications Security (ICICS 2020).

  7. Sungha Baek, Youngdon Jung, David Mohaisen, Sungjin Lee and Daehun Nyang:
    SSD-assisted Ransomware Detection and Data Recovery Techniques.
    IEEE Transactions on Computer (accepted), 2020

  8. Muhammad Saad, Jeffrey Spaulding, L. Njilla, C. A. Kamhoua, S. Shetty, D. Nyang, David Mohaisen:
    Exploring the Attack Surface of Blockchain: A Systematic Overview.
    IEEE Communication Surveys and Tutorials, 2020

  9. M. Saad, J. Choi, J. Kim, D. Nyang, A Mohaisen:
    Towards Characterizing Blockchain-based Cryptocurrencies for Highly-Accurate Predictions
    IEEE Systems Journal (ISJ 2020)
    Best Paper Award

  10. Mohammed Abuhamad, Tamer Abuhmed, David Mohaisen, and DaeHun Nyang
    AUToSen: Deep Learning-based Implicit Continuous Authentication Using Smartphone Sensors
    IEEE Internet of Things Journal (IoTJ 2020)

  11. Dohyun Kwon, Joongheon Kim, David Mohaisen, and Wonjun Lee.
    Power Control with Deep Reinforcement Learning for Millimeter-Wave Internet-of-Vehicles Video Caching
    Journal of Communications and Networks (JCN), 2020.

  12. Jinchun Choi
    Endpoints and interdependencies in IoT Residual Artifacts
    Doctoral Dissertation, University of Central Florida, 2020.

  13. Jeman Park
    Improving the security of critical infrastructure: metrics, measurements, and analysis
    Doctoral Dissertation, University of Central Florida, 2020.

  14. Rhongho Jang
    Towards scalable network traffic measurement with sketches
    Doctoral Dissertation, University of Central Florida, 2020.

  15. 2019

  16. Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking
    Muhammad Saad, Aminollah Khormali, David Mohaisen:
    The 14th Symposium on Electronic Crime Research (eCrime 2019). Pittsburgh, PA, USA, Nov 14, 2019

  17. W-Net: A CNN-based Architecture for White Blood Cells Image Classification
    Changhun Jung, Jumabek Alikhanov, Mohammed Abuhamad, David Mohaisen, Kyungja Han, DaeHun Nyang:
    AAAI Fall Symposium on AI for Social Good (AAAI FS 2019)

  18. Honor Among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets
    Jinchun Choi, Ahmed Abusnaina, Afsah Anwar, An Wang, Songqing Chen, Daehun Nyang and David Mohaisen
    The 2019 IEEE Conference on Dependable and Secure Computing (IEEE DSC 2019)

  19. Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks
    Ahmed Abusnaina, Aminollah Khormali, Daehun Nyang, Murat Yuksel and David Mohaisen
    The 2019 IEEE Conference on Dependable and Secure Computing (IEEE DSC 2019)
    Best Paper Award -- Runner Up

  20. Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems.
    A. Abusnaina, A. Khormali, H. Alasmary, J. Park, A. Anwar and A. Mohaisen.
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2019)

  21. InstaMeasure: Instant Per-flow Detection UsingLarge In-DRAM Working Set of Active Flows.
    R. Jang, S. Moon, Y. Noh, A. Mohaisen and D. Nyang.
    39th IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2019)

  22. Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network.
    M. Saad, V. Cook, L. Nguyen, My Thai, A. Mohaisen:
    39th IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2019)

  23. XLF: A Cross-layer Framework to Secure the Internet of Things (IoT).
    An Wang, David Mohaisen and Songqing Chen.
    39th IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2019)

  24. Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers.
    J. Park, A. Khormali, M. Mohaisen, A. Mohaisen.
    IEEE International Conference on Dependable Systems and Networks (IEEE DSN 2019)

  25. Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms
    J. Jeon, J. Kim, J. Kim, K. Kim, A. Mohaisen, J. Kim.
    IEEE International Conference on Dependable Systems and Networks (fast abstract) (IEEE DSN 2019)

  26. Mempool Optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems.
    M. Saad, L. Njilla, C. Kamhoua, J. Kim, D. Nyang, and A. Mohaisen:
    IEEE International Conference on Blockchain and Cryptocurrency (IEEE ICBC 2019)

  27. RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing.
    M. Saad, A. Anwar, A. Ahmad, H. Alasmary, M. Yukesl, and A. Mohaisen.
    IEEE International Conference on Blockchain and Cryptocurrency (IEEE ICBC 2019)

  28. BlockTrail: A Scalable Multichain Solution for Blockchain-based Audit Trails.
    A. Ahmad, M. Saad, L. Njilla, C. Kamhoua, M. Bassiouni, and A. Mohaisen:
    IEEE International Conference on Communications (IEEE ICC 2019)

  29. Countering Selfish Mining in Blockchains
    M. Saad, L. Njilla, C. Kamhoua, and A. Mohaisen
    IEEE Computing, Networking and Communications (ICNC 2019)

  30. Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference
    R. Jang, J. Kang, A. Mohaisen, D. Nyang.
    IEEE Transactions on Mobile Computing (IEEE TMC 2019)

  31. Two-Stage IoT Device Scheduling with Dynamic Programming for Energy Internet Systems
    L. Park, C. Lee, J. Kim, A. Mohaisen, and S. Cho
    IEEE Internet of Things Journal (IEEE IoT Journal 2019)

  32. Analyzing and Detecting Emerging Internet of Things Malware: A Graph-based Approach
    H. Alasmary, A. Khormali, A. Anwar, J. Park, J. Choi, A. Abusnaina, A. Awad, D. Nyang, A. Mohaisen
    IEEE Internet of Things Journal (IEEE IoT Journal 2019)

  33. Personalized Online Live Video Streaming Using Softmax-Based Multinomial Classification
    Kyeongseon Kim, Dohyun Kwon, Joongheon Kim, and David Mohaisen
    Applied Science, 2019, 9(11), 2297

  34. Secure and Transparent Audit Logs with BlockAudit
    Ashar Ahmed, Muhammad Saad, David Mohaisen.
    Journal of Network and Computer Applications, 2019

  35. Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service
    Jeman Park, Jinchun Choi, DaeHun Nyang, and David Mohaisen.
    IEEE Transactions on Network and Service Management (TNSM), 2019

  36. Towards Low-Cost Mechanisms to Enable Restoration of Encrypted Non-Volatile Memories
    Mao Ye, Kazi Abu Zubair, David Mohaisen, and Amro Awad
    IEEE Transactions on Dependable Computing, 2019

  37. Poster: DL-CAIS: Deep Learning-based Code Authorship Identification System.
    M. Abuhamad, T. Abuhmed, A. Mohaisen and D. Nyang:
    ISOC Network and Distributed System Security Symposium (NDSS 2019)

  38. Poster: Examining Adversarial Learning against Graph-based IoT Malware Detection Systems.
    A. Abusnaina, A. Khormali, H. Alasmary, J. Park, A. Anwar, U. Meteriz and A. Mohaisen.
    ISOC Network and Distributed System Security Symposium (NDSS 2019)

  39. Poster: Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table.
    R. Jang, S. Moon, Y. Noh, A. Mohaisen and D. Nyang.
    ISOC Network and Distributed System Security Symposium (NDSS 2019)

  40. Poster: Analyzing Endpoints in the Internet of Things Malware.
    J. Choi, A. Anwar, H. Alasmary, J. Spaulding, D. Nyang and A. Mohaisen.
    ISOC Network and Distributed System Security Symposium (NDSS 2019)

  41. Poster: Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network.
    M. Saad, V. Cook, L. Nguyen, M. Thai and A. Mohaisen.
    ISOC Network and Distributed System Security Symposium (NDSS 2019)

  42. Poster: Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach
    H. Alasmary, A. Khormali, A. Anwar, J. Park, J. Choi, D. Nyang and A. Mohaisen.
    ISOC Network and Distributed System Security Symposium (NDSS 2019)

  43. A Privacy-Preserving Longevity Study of Tor's Hidden Services
    Amirali Sanatinia, Jeman Park, Erik-Oliver Blass, David Mohaisen, Guevara Noubir:
    Manuscript (2019)

  44. COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
    Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, David Mohaisen:
    Manuscript (2019)
  45. 2018

  46. Large-Scale and Language-Oblivious Code Authorship Identification.
    M. Abuhamed, T. Abuhamed, A. Mohaisen, D. Nyang:
    ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2018)

  47. ABC: Enabling Smartphone Authentication with Built-in Camera.
    Z. Ba, S. Piao, X. Fu, D. Koutsonikolas, A. Mohaisen, K. Ren:
    ISOC Network and Distributed System Security Symposium (ISOC NDSS 2018)

  48. SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery.
    S. Baek, Y. Jung, A. Mohaisen, S. Lee and D. Nyang.
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2018)

  49. ShmCaffe: A Distributed Deep Learning Platform with Shablack Memory.
    S. Ahn, J. Kim, E. Lim, W. Choi, A. Mohaisen and S. Kang.
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2018)

  50. Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Pblackictions.
    A. Anwar, A. Khormali, and A. Mohaisen.
    International Conference on Security and Privacy in Communication Networks (SecureComm 2018)

  51. QOI: Assessing Participation in Threat Information Sharing.
    J. Park, H. Alasmary, O. Al-Ibrahim, C. Kamhoua, K. Kwiat, L. Njilla, A. Mohaisen.
    IEEE International Conference on Acoustics, Speech, and Signal Processing (IEEE ICASSP 2018).

  52. DIGITALSEAL: A Transaction Authentication Tool for Online and Offline Transactions
    C. Jung, J. Kang, A. Mohaisen, D. Nyang.
    IEEE International Conference on Acoustics, Speech, and Signal Processing (IEEE ICASSP 2018)

  53. Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks.
    J. Park, D. Nyang, and A. Mohaisen.
    IEEE Annual Conference on Privacy, Security and Trust (IEEE PST 2018)

  54. Graph-based Comparison of IoT and Android Malware
    H. Alasmary, A. Anwar, J. Park, J. Choi, D. Nyang, and A. Mohaisen
    International Conference on Computational Data and Social Networks (CSoNet 2018).

  55. Towards Blockchain-Driven, Secure and Transparent Audit Logs
    A. Ahmad, M. Saad, M. Bassiouni, and A. Mohaisen
    International Workshop on Distributed Ledger of Things (DLoT) @ MobiQuitous 2018.
    Best Paper Award

  56. Neural Network Syntax Analyzer for Embedded Standardized Deep Learning
    M. Shin, J. Kim, A. Mohaisen, J. Park, K. Lee.
    ACM International Workshop on Embedded and Mobile Deep Learning (EMDL18) @ ACM MobiSys 2018.

  57. Proactive detection of command and control domains in internet of things‐scale botnets using DRIFT
    J. Spaulding, J. Park, J. Kim, D. Nyang, A. Mohaisen
    Transactions on Emerging Telecommunications Technologies (ETT 2018).

  58. Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-aside Validation
    A. Mohaisen, Z. Gu, and K. Ren, Z. Li, C. Kamhoua, L. Njilla, D. Nyang
    IEEE Transactions on Dependable and Secure Computing (IEEE TDSC 2018)

  59. A Data-Driven Study of DDoS Attacks and Their Dynamics
    A. Wang, W. Chang, S. Chen, and A. Mohaisen
    IEEE Transactions on Dependable and Secure Computing (IEEE TDSC 2018)

  60. Delving Into Internet DDoS Attacks by Botnets: Characterization and Analysis
    A. Wang, W. Chang, S. Chen, and A. Mohaisen
    IEEE/ACM Transactions on Networking (IEEE/ACM TNET 2018)

  61. Android Malware Detection using Multi-Flows and API Patterns
    F. Shen, J. Del Vecchio, A. Mohaisen, S. Ko and L. Ziarek
    IEEE Transactions on Mobile Computing (IEEE TMC 2018).

  62. Large-scale Invisible Attack on AFC Systems with NFC-equipped Smartphones
    F. Dang, P. Zhou, Z. Li, E. Zhai, A. Mohaisen, Q. Wen, and M. Li
    IEEE Transactions on Mobile Computing (IEEE TMC 2018).

  63. Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks
    D. Nyang, H. Kim, W. Lee, S. Kang, G. Cho, M. Lee, A. Mohaisen
    Elsevier Computers & Security (COSE 2018)

  64. D-FENS: DNS Filtering and Extraction Network System for Malicious Domain Names
    J. Spaulding
    PhD Dissertation, University of Central Florida, August 2018.

  65. Network-based analysis and classification of malware using behavioral artifacts ordering
    A. Mohaisen, O. Alrawi, J. Park, J. Kim, D. Nyang, M. Mohaisen
    ICST Transactions on Security Safety, 2018.
  66. 2017

  67. Understanding Adversarial Strategies from Bot Recruitment to Scheduling
    W. Chang, A. Mohaisen, A. Wang and S. Chen:
    International Conference on Security and Privacy in Communication Networks (SECURECOMM 2017)

  68. Rethinking Information Sharing for Actionable Threat Intelligence
    A. Mohaisen, O. Al Ibrahim, C. Kamhoua, K. A. Kwiat, L. Njilla:
    ACM/IEEE Hot Topics in Web Systems and Technologies (ACM/IEEE HotWeb 2017)

  69. Understanding the Effectiveness of Typosquatting Techniques
    J. Spaulding, D. Nyang, A. Mohaisen:
    ACM/IEEE Hot Topics in Web Systems and Technologies (ACM/IEEE HotWeb 2017)

  70. Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures
    A. Mohaisen, K. Ren:
    ACM/IEEE Transactions on Networking (IEEE/ACM TNET 2018)

  71. You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones
    S. Chen, S. Piao, C. Wang, Q. Wang, J. Weng, L. Su, K. Ren, and A. Mohaisen:
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2017).
    Best Paper Award

  72. An Adversary-Centric Behavior Modeling of DDoS Attacks.
    A. Wang, A. Mohaisen and S. Chen:
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2017)

  73. When Smart TV Meets CRN: Privacy-preserving Fine-grained Spectrum Access.
    C. Guan, A. Mohaisen, Z. Sun, F. Wei, L. Su, K. Ren and Y. Yang:
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2017)

  74. Android Malware Detection using Complex-Flows
    F. Shen, J. Del Vecchio, A. Mohaisen, S. Ko and L. Ziarek:
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2017)

  75. Privacy Implications of DNSSEC Look-aside Validation
    A. Mohaisen, Z. Gu and K. Ren:
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2017)

  76. Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n
    R. Jang, J. Kang, A. Mohaisen and D. Nyang:
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2017)

  77. You’ve Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques.
    J. Spaulding, S. Upadhyaya and A. Mohaisen:
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2017)

  78. Large-scale Invisible Attack on AFC Systems with NFC-equipped Smartphones.
    F. Dang, P. Zhou, Z. Li, E. Zhai, A. Mohaisen, Q. Wen, and M. Li:
    IEEE International Conf. on Computer Communications (IEEE INFOCOM 2017)

  79. SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates.
    Q. Wang, K. Ren, M. Du, Q. Li, and A. Mohaisen:
    Financial Cryptography and Data Security (FC 2017).

  80. Crime Scene Reconstruction: Online Gold Farming Network Analysis
    J. Woo and A. Mohaisen and Y. Kim and H. Kim:
    IEEE Transactions on Information Forensics and Security (IEEE TIFS 2017)

  81. Performance of Deep Learning Computation with TensorFlow Software Library in GPU-Capable Multicore Computing Platforms.
    Y. Mo, J. Kim, J. Kim, A. Mohaisen, and W. Lee:
    International Conference on Ubiquitous and Future Networks (IEEE ICUFN 2017)

  82. Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence
    O. Al Ibrahim, A. Mohaisen, C. Kamhoua, K. Kwiat, L. Njilla:
    Technical Report 2017, University at Buffalo and Air Force Research Lab (88ABW-2017-0416)
  83. 2016

  84. You are a Game Bot!: Uncovering game bots in MMORPGs via self-similarity in the wild.
    E. Lee, J. Woo, H. Kim, A. Mohaisen, H. Kim:
    ISOC Network and Distributed System Security Symposium (ISOC NDSS 2016)

  85. The Landscape of Domain Name Typosquatting: Techniques and Countermeasures.
    J. Spaulding, S. Upadhyaya and A. Mohaisen:
    IEEE International Conference on Availability, Reliability and Security (ARES 2016)

  86. Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service.
    A. Kang, S. Jeong, S. Ko, K. Ren, A. Mohaisen:
    ACM/IEEE Hot Topics in Web Systems and Technologies (ACM/IEEE HotWeb 2016)

  87. Does Query Blocking Improve DNS Privacy?.
    A. Mohaisen, A. Kang, and K. Ren:
    17th Conference on Information Security Applications (WISA 2016)

  88. Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks.
    A. Wang, A. Mohaisen, W. Chang, and S. Chen:
    17th Conference on Information Security Applications (WISA 2016)

  89. Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications.
    O. Alrawi and A. Mohaisen:
    Empirical Research Methods in Information Security @ WWW 2016

  90. Private Over-threshold Aggregation Protocols over Distributed Databases.
    M. Kim, A. Mohaisen, J. Cheon, Y. Kim:
    IEEE Transactions on Knowledge and Data Engineering (IEEE TKDE 2016)

  91. Andro-Dumpsys: Anti-Malware System Based on Malware Creator and Malware Centric Information.
    J. Jang, Hyunjae Kang, J. Woo, A. Mohaisen, and H. Kim:
    Elsevier Computers & Security (COSE 2016)

  92. Detection and Classification of Android Malware by Similarity Matching of Behavior Profiles.
    J. Jang, Yaesung Yun, A. Mohaisen, J. Woo, H. Kim:
    SpringerPlus 2016

  93. Multimodal game bot detection using user behavioral characteristics.
    A. Kang, S. Jeong, A. Mohaisen, H. Kim:
    SpringerPlus 2016

  94. 2015-2010

  95. Towards Automatic and Lightweight Detection and Classification of Malicious Web Contents.
    A. Mohaisen:
    ACM/IEEE Hot Topics in Web Systems and Technologies (ACM/IEEE HotWeb 2015)

  96. Separation of Benign and Malicious Network Events for Accurate Malware Family Classification.
    H. Mekky, A. Mohaisen, Z. Zhang:
    IEEE Conference on Communications and Network Security (IEEE CNS 2015)

  97. Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis.
    A. Wang, A. Mohaisen, W. Chang, S. Chen:
    IEEE International Conference on Dependable Systems and Networks (IEEE DSN 2015)

  98. Revealing DDoS Attack Dynamics behind the Scenes.
    A. Wang, A. Mohaisen, W. Chang, S. Chen:
    International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2015)

  99. Measuring Botnets in the Wild: Some New Trends.
    W. Chang, A. Mohaisen, A. Wang, S. Chen:
    ACM Symposium on Information, Computer and Communications Security (ACM ASIACCS 2015)

  100. Andro-AutoPsy: Anti-malware system based on similarity matching and creator-centric information.
    J. Jang, H. Kang, J. Woo, A. Mohaisen, H. Kim:
    Elsevier Digital Investigation, 2015

  101. Timing Attacks on Access Privacy in ICN and Countermeasures.
    A. Mohaisen, H. Mekky, X. Zhang, H. Xie, and Y. Kim:
    IEEE Transactions on Dependable and Secure Computing (IEEE TDSC 2015)

  102. Behavior-based Automated Malware Analysis and Classification.
    A. Mohaisen, O. Alrawi, M. Mohaisen:
    Elsevier Computers & Security (COSE 2015)

  103. Transaction Authentication Using Complementary Colors.
    Y. Maeng, A. Mohaisen, D. Nyang:
    Elsevier Computers & Security (COSE 2015)

  104. Mal-Netminer: Malware Classification Approach Based on Social Network Analysis of System Call Graph.
    J. Jang, J. Woo, A. Mohaisen, J. Yun, and H. Kim:
    Mathematical Problems in Engineering, 2015

  105. Interference Impacts on 60 GHz Video Streaming in Smart TV Platforms.
    J. Kim and A. Mohaisen:
    Multimedia Tools and Applications, 2015

  106. Having your cake and eating it too: Domain Name Data Networking (DNDN).
    E. Ostweil, C. Murray, A. Mohaisen:
    Technical Report, Verisign Labs, 2015

  107. Measuring the Leakage of Onion at the Root.
    M. Thomas and A. Mohaisen:
    ACM Workshop on Privacy in the Electronic Society (ACM WPES 2014)

  108. Chatter: Exploring Classification of Malware based on the Order of Events.
    A. Mohaisen, O. Alrawi, A. West, and A. Mankin:
    IEEE Conference on Communications and Network Security (IEEE CNS 2014)

  109. A Private Walk in the Clouds.
    Y. Song, H. Kim, and A. Mohaisen:
    International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2014)

  110. ADAM: Automated Detection and Attribution of Malicious Webpages.
    A. Kosba, A. Mohaisen, A. West, T. Tonn:
    International Conference on Information Security Applications (WISA 2014)

  111. AndroTracker: Creator Information based Android Malware Classification System.
    H. Kang, J. Jang, A. Mohaisen, and H. Kim:
    International Conference on Information Security Applications (WISA 2014)

  112. Name Server Switching: Anomaly Signatures, Usage, Clustering, and Pblackiction.
    A. Mohaisen, M. Bhuiyan, and Y. Labrou:
    International Conference on Information Security Applications (WISA 2014)

  113. High-Fidelity, Behavior-based Automated Malware Analysis and Classification
    A. Mohaisen and O. Alrawi:
    International Conference on Information Security Applications (WISA 2014).
    Best Paper Award

  114. Measuring the Leakage of Onion at the Root.
    M. Thomas and A. Mohaisen:
    Hot Topics in Privacy Enhancing Technologies (HotPETS 2014)

  115. AV-Meter: An Evaluation of Antivirus Scans and Labels.
    A. Mohaisen and O. Alrawi:
    Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2014)

  116. Metadata-driven Threat Classification of Network Endpoints Appearing in Malware.
    A. West and A. Mohaisen:
    Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2014)

  117. Kindblack Domains: Detecting and Clustering Botnet Domains Using DNS Traffic.
    M. Thomas and A. Mohaisen:
    WWW Workshops 2014

  118. Keylogging-resistant Visual Authentication Protocols
    D. Nyang, A. Mohaisen, and J. Kang:
    IEEE Transactions on Mobile Computing (IEEE TMC 2014)

  119. Fast and Low-Power Link Setup for IEEE 802.15.3c Multi-Gigabit/s Wireless Sensor Networks.
    J. Kim, A. Mohaisen:
    IEEE Communication Letters, 2014.

  120. SocialCloud: Trustworthy Distributed Computing on Social Networks.
    A. Mohaisen, Huy Tran, A. Chandra, and Y. Kim:
    IEEE Transactions on Services Computing, 2014 (IEEE TSC 2014)

  121. A Methodical Evaluation of Antivirus Scans and Labels.
    A. Mohaisen, O. Alrawi, M. Larson, and D. McPherson:
    International Conference on Information Security Applications (WISA 2013)

  122. Improving Social Network-based Sybil Defenses by Augmenting Social Graphs.
    A. Mohaisen and S. Hollenbeck:
    International Conference on Information Security Applications (WISA 2013)

  123. Unveiling Zeus: Automated Classification of Malware Samples.
    A. Mohaisen and O. Alrawi:
    WWW Workshop 2013

  124. ADAM: Automated detection and attribution of malicious webpages (poster).
    Ahmed E. Kosba, David Mohaisen, Andrew G. West, Trevor Tonn
    IEEE CNS 2013
    Best Poster Award

  125. Protecting Access Privacy of Cached Contents in Information Centric Networks.
    A. Mohaisen, X. Zhang, M. Schuchard, H. Xie, Y. Kim:
    ACM Symposium on Information, Computer and Communications Security (ACM ASIACCS 2013)

  126. Trustworthy Distributed Computing on Social Networks.
    A. Mohaisen, H. Tran, A. Chandra, and Y. Kim:
    ACM Symposium on Information, Computer and Communications Security (ACM ASIACCS 2013)

  127. Dynamix: Anonymity on Dynamic Social Structures.
    A. Mohaisen and Y. Kim:
    ACM Symposium on Information, Computer and Communications Security (ACM ASIACCS 2013)

  128. Secure encounter-based social networks: Requirements, challenges, and designs.
    A. Mohaisen, D. Foo Kune, E. Vasserman, M. Kim, and Y. Kim:
    IEEE Transactions on Dependable and Secure Computing (TDSC 2013)

  129. Trading Optimality for Scalability in Large-scale Opportunistic Routing.
    Y. Li, A. Mohaisen, and Z. Zhang:
    IEEE Transactions on Vehicular Technology (IEEE TVT 2013)

  130. Private Top-k Aggregation Protocols.
    M. Kim and A. Mohaisen and J. Cheon and Y. Kim:
    International Conference on Information Security and Cryptology (ICISC 2012)

  131. Measuring Bias in the Mixing Time of Social Graphs due to Graph Sampling.
    A. Mohaisen, P. Luo, Y. Li, Y. Kim, Z. Zhang:
    IEEE International Conference for Military Communications (IEEE MILCOM 2012)

  132. On the Mixing Time of Directed Social Graphs and Security Implications.
    A. Mohaisen, H. Tran, N. Hopper, and Y. Kim:
    ACM Symposium on Information, Computer and Communications Security (ACM ASIACCS 2012)

  133. Collaboration in Social Network-based Information Dissemination.
    A. Mohaisen, T. AbuHmed, T. Zhu, M. Mohaisen:
    IEEE International Conference on Communications (IEEE ICC 2012)

  134. DEOS: Dynamic Energy-Oriented Scheduling for Sustainable Wireless Sensor Networks.
    T. Zhu, A. Mohaisen, Y. Ping, D. Towsley:
    IEEE International Conference on Computer Communications (IEEE INFOCOM 2012)

  135. Incorporating trust into social network-based Sybil defenses.
    A. Mohaisen, N. Hopper, Y. Kim:
    IEEE International Conference on Computer Communications (INFOCOM 2011)

  136. Parallel QRD-M Encoder for Decentralized Multi-User MIMO Systems.
    M. Mohaisen and A. Mohaisen:
    IEEE International Conference on Communications (IEEE ICC 2011)

  137. Losing control of the Internet: Using the data plane to attack the control plane.
    M. Schuchard, E Vasserman, A Mohaisen, D Foo Kune, N Hopper, Y Kim:
    ISOC Network and Distributed System Security Symposium (ISOC NDSS 2011)

  138. An analysis of a social network-based Sybil defense in mobile networks.
    A. Mohaisen, T. AbuHmed, H. Kang, D. Nyang, Y. Kim:
    ACM International Conference on Information Management and Communication (ACM IMCOM 2011)

  139. Measuring the mixing time of social graphs.
    A. Mohaisen, A. Yun, Y. Kim:
    ACM Internet Measurements Conference (ACM IMC 2010)

Selected Patents

  • 10,171,415: Characterization of domain names based on changes of authoritative name servers
  • 10,038,706: Systems, devices, and methods for separating malware and background events
  • 9,779,238: Classifying malware by order of network behavior artifacts
  • 9,769,189: Systems and methods for behavior-based automated malware analysis and classification
  • 9,578,125: Systems, devices, and methods for protecting access privacy of cached content
  • 9,489,514: Classifying malware by order of network behavior artifacts
  • 8,745,696: Apparatus and method for privacy protection in association rule mining
  • 8,112,386: Rotation based transformation method and apparatus for preserving data privacy

Media Coverage

Our work on measuring the leakage of .onion in the public domain name system infrastructure has been coveblack by a post in the DeepDotWeb. The work was presented at ACM WPES and was jointly done with Matt Thomas.

  1. Outreach: This work was presented at the DNS-OARC workshop held during Fall 2014 in Los Angeles, CA. DNS-OARC workshop is a gathering of DNS operators, admininistrators, and researchers.
  2. Impact: Findings in the work were incorporated in RFC 7686. As a result, .onion leakage is blocked in the most recent unbound release (1.5.8)

Our work on Social Clouds, a design of a trustworthy social computing system bootstrapped by social networks, was coveblack by several news stories and posts, including posts at MIT Technology Review, The Verge, Data News, Atelier, msn.com. This work was published in IEEE Transactions on Service Computing and was jointly done with Huy Tran (undergraduate student; now at Microsoft), Abhishek Chandra and Y. Kim.

Our work on DDoS attacks has been coveblack by several news stories in the New Scientist, CBS News, Info Packets, Infosec Island, Minnesota Daily, Slashdot, METRO, The Register, Gizmodo, Geekosystem, ISSSource, among others. This work was published at ISOC NDSS, and was jointly done with Max Schuchard, Eugene Vasserman, Denis Foo Kune, Nick Hopper, and Y. Kim.


Website last updated on 04/28/2019