Peer-reviewed Publications

All papers published before 2010 are available at DBLP. My citations are available from my Google Scholar

    2017

  1. (SECURECOMM 2017) Wentao Chang, Aziz Mohaisen, An Wang and Songqing Chen: "Understanding Adversarial Strategies from Bot Recruitment to Scheduling". In Proceedings of the 2017 International Conference on Security and Privacy in Communication Networks, SECURECOMM 2017, Niagara Falls, NY, Canada, October 22–24, 2017.
  2. [ACM HotWeb 2017] Aziz Mohaisen, Omar Al Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla: Rethinking Information Sharing for Actionable Threat Intelligence, In ACM HotWeb 2017, San Jose, CA, USA, October 14, 2017.
  3. [ACM HotWeb 2017] Jeff Spaulding, Daehun Nyang, Aziz Mohaisen: Understanding the Effectiveness of Typosquatting Techniques, In ACM HotWeb 2017, San Jose, CA, USA, October 14, 2017.
  4. [ACM ToN 2017] Aziz Mohaisen, Kui Ren: Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures, IEEE/ACM Transactions on Networking, August 2017
  5. [IEEE ICDCS 2017] Si Chen, Sixu Piao, Cong Wang, Qian Wang, Jian Weng, Lu Su, Kui Ren, and Aziz Mohaisen: You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones. In Proceedings of the 37th International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-7, 2017.
  6. [IEEE ICDCS 2017] An Wang, Aziz Mohaisen and Songqing Chen: An Adversary-Centric Behavior Modeling of DDoS Attacks. In Proceedings of the 37th International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-7, 2017.
  7. [IEEE ICDCS 2017] Chaowen Guan, Aziz Mohaisen, Zhi Sun, Fei Wei, Lu Su, Kui Ren and Yaling Yang: When Smart TV Meets CRN: Privacy-preserving Fine-grained Spectrum Access. In Proceedings of the 37th International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-7, 2017.
  8. [IEEE ICDCS 2017] Feng Shen, Justin Del Vecchio, Aziz Mohaisen, Steven Y. Ko and Lukasz Ziarek: Android Malware Detection using Complex-Flows In Proceedings of the 37th International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-7, 2017.
  9. [IEEE ICDCS 2017] Aziz Mohaisen, Zhongshu Gu and Kui Ren: Privacy Implications of DNSSEC Look-aside Validation In Proceedings of the 37th International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-7, 2017.
  10. [IEEE ICDCS 2017] Rhongho Jang, Jeonil Kang, Aziz Mohaisen and DaeHun Nyang: Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n In Proceedings of the 37th International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-7, 2017.
  11. [IEEE ICDCS 2017] Jeffrey Spaulding, Shambhu Upadhyaya and Aziz Mohaisen: You’ve Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques. In Proceedings of the 37th International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-7, 2017.
  12. [IEEE INFOCOM 2017] Fan Dang, Pengfei Zhou, Zhenhua Li, Ennan Zhai, Aziz Mohaisen, Qingfu Wen, and Mo Li: Large-scale Invisible Attack on AFC Systems with NFC-equipped Smartphones. In Proceedings of the 36th IEEE International Conf. on Computer Communications, INFOCOM 2017, Atlanta, GA, USA, May 1-4, 2017.
  13. [FC 2017] Qian Wang, Kui Ren, Minxin Du, Qi Li, and Aziz Mohaisen: SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates. Financial Cryptography and Data Security, FC 2017, Malta, April 3–7, 2017.
  14. [IEEE TIFS 2017] Jiyoung Woo and Aziz Mohaisen * and Yongdae Kim and Huy Kang Kim: Crime Scene Reconstruction: Online Gold Farming Network Analysis, IEEE Transactions on Information Forensics and Security (IEEE TIFS 2017)
  15. [IEEE TDSC 2017] An Wang and Wentao Chang and Songqing Chen and Aziz Mohaisen: A Data-Driven Study of DDoS Attacks and Their Dynamics, In IEEE Transactions on Dependable and Secure Computing (accepted with revisions)
  16. [ACM WiSec 2017] RhongHo Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang: Highly-accurate rogue access point detection using intentional channel interference: poster, In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2017)
  17. [ACM WiSec 2017] RhongHo Jang, DongGyu Cho, Aziz Mohaisen, Youngtae Noh, DaeHun Nyang: Two-level network monitoring and management in WLAN using software-defined networking: poster, In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2017)
  18. Young Jong Mo, Joongheon Kim, Jong-Kook Kim, Aziz Mohaisen, and Woojoo Lee: Performance of Deep Learning Computation with TensorFlow Software Library in GPU-Capable Multicore Computing Platforms, The 9th International Conference on Ubiquitous and Future Networks (IEEE ICUFN 2017)
  19. Omar Al Ibrahim *, Aziz Mohaisen *, Charles Kamhoua, Kevin Kwiat, Laurent Njilla: Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence Technical Report 2017, University at Buffalo and Air Force Research Lab (88ABW-2017-0416)

2016

  1. [NDSS 2016] Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Aziz Mohaisen, Huy Kang Kim: You are a Game Bot!: Uncovering game bots in MMORPGs via self-similarity in the wild, The Network and Distributed System Security Symposium (NDSS 2016)
  2. [ARES 2016] Jeffrey Spaulding *, Shambhu Upadhyaya and Aziz Mohaisen: The Landscape of Domain Name Typosquatting: Techniques and Countermeasures, In Proceeding of the The International Conference on Availability, Reliability and Security (ARES 2016)
  3. [HotWeb 2016] Ah Reum Kang, Seong Hoon Jeong, Steven Y. Ko, Kui Ren, Aziz Mohaisen: Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service, In Proceeding of Hot Topics in Web Systems and Technologies (IEEE HotWeb 2016)
  4. [WISA 2016] Aziz Mohaisen, Ah Reum Kang, and Kui Ren: Does Query Blocking Improve DNS Privacy?, In proceeding of the 17th Conference on Information Security Applications (WISA 2016)
  5. [WISA 2016] An Wang, Aziz Mohaisen, Wentao Chang, and Songqing Chen: Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks, In proceeding of the 17th Conference on Information Security Applications (WISA 2016)
  6. [ERMIS 2016 @ WWWW] Omar Alrawi and Aziz Mohaisen: Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications, In Proceeding of the Empirical Research Methods in Information Security @ WWW 2016
  7. [TKDE 2016] Myungsun Kim, Aziz Mohaisen, Jung Hee Cheon, Yonggdae Kim: Private Over-threshold Aggregation Protocols over Distributed Databases, In IEEE Transactions on Knowledge and Data Engineering (IEEE TKDE 2016)
  8. [COSE 2016] Jae-wook Jang, Hyunjae Kang, Jiyoung Woo, Aziz Mohaisen, and Huy Kang Kim: Andro-Dumpsys: Anti-Malware System Based on Malware Creator and Malware Centric Information, In Elsevier Computers & Security (COSE 2016)
  9. Jae-wook Jang, Yaesung Yun, Aziz Mohaisen, Jiyoung Woo, Huy Kang Kim: Detection and Classification of Android Malware by Similarity Matching of Behavior Profiles, In SpringerPlus 2016
  10. Ah Reum Kang, Seong Hoon Jeong, Aziz Mohaisen, Huy Kang Kim: Multimodal game bot detection using user behavioral characteristics, In SpringerPlus 2016
  11. Manar Mohaisen and Aziz Mohaisen: Characterizing Collaboration in Social Network-enabled Routing, In Transactions on Internet and Info Systems, 2016
  12. Seong Hoon Jeong, Ah Reum Kang, Joongheon Kim, Huy Kang Kim, and Aziz Mohaisen: A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure, In ACM SGICOMM 2016 (poster)

2015

  1. [HotWeb 2015] Aziz Mohaisen: Towards Automatic and Lightweight Detection and Classification of Malicious Web Contents, In Proceeding of Hot Topics in Web Systems and Technologies (IEEE HotWeb 2015)
  2. [CNS 2015] Hesham Mekky, Aziz Mohaisen, Zhi-Li Zhang: Separation of Benign and Malicious Network Events for Accurate Malware Family Classification, In Proceeding of IEEE Conference on Communications and Network Security (IEEE CNS 2015)
  3. [DSN 2015] An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen: Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis, In Proceeding of IEEE International Conference on Dependable Systems and Networks (IEEE DSN 2015)
  4. [DIMVA 2015] An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen: Revealing DDoS Attack Dynamics behind the Scenes, In Proceeding of the International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2015)
  5. [ASIA CCS 2015] Wentao Chang, Aziz Mohaisen, An Wang, Songqing Chen: Measuring Botnets in the Wild: Some New Trends, In Proceedings of ACM Symposium on Information, Computer and Communications Security (ACM ASIA CCS 2015)
  6. Jae-wook Jang, Hyunjae Kang, Jiyoung Woo, Aziz Mohaisen, Huy Kang Kim: Andro-AutoPsy: Anti-malware system based on similarity matching and creator-centric information, In Elsevier Digital Investigation, 2015
  7. [TDSC 2015] Aziz Mohaisen, Hesham Mekky, Xinwen Zhang, Haiyong Xie, and Yongdae Kim: Timing Attacks on Access Privacy in ICN and Countermeasures, In IEEE Transactions on Dependable and Secure Computing (IEEE TDSC 2015)
  8. [COSE 2015] Aziz Mohaisen and Omar AlrawiL Behavior-based Automated Malware Analysis and Classification, In Elsevier Computers & Security, 2015
  9. [COSE 2015] Youngjae Maeng, Aziz Mohaisen, Daehun Nyang: Transaction Authentication Using Complementary Colors, In Elsevier Computers & Security, 2015
  10. [MPE 2015] Jae-wook Jang, Jiyoung Woo, Aziz Mohaisen, Jaesung Yun, and Huy Kang Kim: Mal-Netminer: Malware Classification Approach Based on Social Network Analysis of System Call Graph, In Mathematical Problems in Engineering, 2015
  11. [MTA 2015] Joongheon Kim and Aziz Mohaisen: Interference Impacts on 60 GHz Video Streaming in Smart TV Platforms, In Multimedia Tools and Applications, 2015
  12. [TR 2015] Eric Ostweil, Craig Murray, Aziz Mohaisen: Having your cake and eating it too: Domain Name Data Networking (DNDN), Technical Report, Verisign Labs, 2015

2014

  1. [WPES 2014] Matt Thomas and Aziz Mohaisen: Measuring the Leakage of Onion at the Root, In Proceeding of the ACM Workshop on Privacy in the Electronic Society (ACM WPES 2014)
  2. [CNS 2014] Aziz Mohaisen, Omar Alrawi, Andrew West, and Allison Mankin: Chatter: Exploring Classification of Malware based on the Order of Events, In Proceeding of the IEEE Conference on Communications and Network Security (IEEE CNS 2014)
  3. [TRUSTBUS 2014] Youngbae Song, Hyoungshick Kim, and Aziz Mohaisen: A Private Walk in the Clouds, International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2014)
  4. [WISA 2014] Ahmed Kosba, Aziz Mohaisen, Andrew West, Trevor Tonn: ADAM: Automated Detection and Attribution of Malicious Webpages, In Proceeding of Conference on Information Security Applications (WISA 2014)
  5. [WISA 2014] Hyun Jae Kang, Jae-wook Jang, Aziz Mohaisen, and Huy Kang Kim: AndroTracker: Creator Information based Android Malware Classification System, In Proceeding of Conference on Information Security Applications (WISA 2014)
  6. [WISA 2014] Aziz Mohaisen, Mansurul Bhuiyan, and Yannis Labrou: Name Server Switching: Anomaly Signatures, Usage, Clustering, and Prediction, In Proceeding of Conference on Information Security Applications (WISA 2014)
  7. [WISA 2014] Aziz Mohaisen and Omar Alrawi: High-Fidelity, Behavior-based Automated Malware Analysis and Classification In Proceeding of Conference on Information Security Applications (WISA 2014)
  8. [HOTPETS 2014] Matt Thomas and Aziz Mohaisen: Measuring the Leakage of Onion at the Root, In Hot Topics in Privacy Enhancing Technologies (HotPETS 2014)
  9. [DIMVA 2014] Aziz Mohaisen and Omar Alrawi: AV-Meter: An Evaluation of Antivirus Scans and Labels, In the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2014)
  10. [DIMVA 2014] Andrew G. West and Aziz Mohaisen: Metadata-driven Threat Classification of Network Endpoints Appearing in Malware, In the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2014)
  11. [@WWW 2014] Matt Thomas and Aziz Mohaisen: Kindred Domains: Detecting and Clustering Botnet Domains Using DNS Traffic, In WWW Workshops 2014
  12. [TMC 2014] DaeHun Nyang, Aziz Mohaisen, and Jeonil Kang: Keylogging-resistant Visual Authentication Protocols In IEEE Transactions on Mobile Computing (TMC 2014)
  13. [CL 2014] Joongheon Kim, Aziz Mohaisen: Fast and Low-Power Link Setup for IEEE 802.15.3c Multi-Gigabit/s Wireless Sensor Networks, IEEE Communication Letters, 2014.
  14. [TSC 2014] Aziz Mohaisen, Huy Tran, Abhishek Chandra, and Yongdae Kim: SocialCloud: Trustworthy Distributed Computing on Social Networks, In IEEE Transactions on Services Computing, 2014
  15. [@SIGCOMM 2014] Wentao Chang, An Wang, Aziz Mohaisen, and Songqing Chen: Characterizing Botnets-as-a-Service, In ACM SGICOMM 2014 (poster)
  16. [@CCS 2014] An Wang, Wentao Chang, Aziz Mohaisen, and Songqing Chen: How Distributed Are Today's DDoS Attacks?, In ACM CCS 2014 (poster)

2013

  1. [WISA 2013] Aziz Mohaisen, Omar Alrawi, Matt Larson, and Danny McPherson: A Methodical Evaluation of Antivirus Scans and Labels, In Proceeding of Conference on Information Security Applications (WISA 2013)
  2. [WISA 2013] Aziz Mohaisen and Scott Hollenbeck: Improving Social Network-based Sybil Defenses by Augmenting Social Graphs, In Proceeding of Conference on Information Security Applications (WISA 2013)
  3. [@WWW 2013] Aziz Mohaisen and Omar Alrawi: Unveiling Zeus: Automated Classification of Malware Samples, In WWW Workshop 2013
  4. [ASIACCS 2013] Aziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim: Protecting Access Privacy of Cached Contents in Information Centric Networks, ACM Symposium on Information, Computer and Communications Security (ASIA CCS 2013)
  5. [ASIACCS 2013] Aziz Mohaisen, Huy Tran, Abhishek Chandra, and Yongdae Kim: Trustworthy Distributed Computing on Social Networks, ACM Symposium on Information, Computer and Communications Security (ASIA CCS 2013)
  6. [ASIACCS 2013] Aziz Mohaisen and Yongdae Kim: Dynamix: Anonymity on Dynamic Social Structures, ACM Symposium on Information, Computer and Communications Security (ASIA CCS 2013)
  7. [TDSC 2013] Aziz Mohaisen, Denis Foo Kune, Eugene Vasserman, Myungsun Kim, and Yongdae Kim: Secure encounter-based social networks: Requirements, challenges, and designs, IEEE Transactions on Dependable and Secure Computing (TDSC 2013)
  8. [TVT 2013] Yanhua Li, Aziz Mohaisen, and Zhi-Li Zhang: Trading Optimality for Scalability in Large-scale Opportunistic Routing, IEEE Transactions on Vehicular Technology (TVT 2013)

2012

  1. Myungsun Kim and Aziz Mohaisen and Jung Hee Cheon and Yongdae Kim: Private Top-k Aggregation Protocols, In Proceeding of the International Conference on Information Security and Cryptology (ICISC 2012)
  2. Aziz Mohaisen, Pengkui Luo, Yanhua Li, Yongdae Kim, Zhi-Li Zhang: Measuring Bias in the Mixing Time of Social Graphs due to Graph Sampling, In IEEE International Conference for Military Communications (MILCOM 2012)
  3. Aziz Mohaisen, Huy Tran, Nicholas Hopper, and Yongdae Kim: On the Mixing Time of Directed Social Graphs and Security Implications, In ACM Symposium on Information, Computer and Communications Security (ASIA CCS 2012)
  4. Aziz Mohaisen, Tamer AbuHmed, Ting Zhu, Manar Mohaisen: Collaboration in Social Network-based Information Dissemination, In the International Conference on Communications (IEEE ICC 2012)
  5. Ting Zhu, Aziz Mohaisen, Yi Ping, Don Towsley: DEOS: Dynamic Energy-Oriented Scheduling for Sustainable Wireless Sensor Networks, In International Conference on Computer Communications (IEEE INFOCOM 2012)
  6. Aziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim: Protecting Access Privacy of Cached Contents in Information Centric Networks, In Proceeding of the Conference on Computer and Communications Security (ACM CCS 2012; poster)

2011

  1. Aziz Mohaisen, Nicholas Hopper, Yongdae Kim: Incorporating trust into social network-based Sybil defenses, In IEEE International Conference on Computer Communications (INFOCOM 2011)
  2. Aziz Mohaisen, Huy Tran, Nicholas Hopper, and Yongdae Kim: Understanding social networks properties for trustworthy computing, IEEE ICDCS Workshops 2011
  3. Manar Mohaisen and Aziz Mohaisen: Parallel QRD-M Encoder for Decentralized Multi-User MIMO Systems, In IEEE International Conference on Communications (IEEE ICC 2011)
  4. Max Schuchard, E Vasserman, A Mohaisen, D Foo Kune, N Hopper, Y Kim: Losing control of the Internet: Using the data plane to attack the control plane In The Network and Distributed System Security Symposium (ISOC NDSS 2011)
  5. Aziz Mohaisen, Tamer AbuHmed, Hun Jeong Kang, Daehun Nyang, Yongdae Kim: An analysis of a social network-based Sybil defense in mobile networks, In the International Conference on Ubiquitous Information Management and Communication (ACM IMCOM 2011)
  6. 2010

  7. Aziz Mohaisen, Aaram Yun, Yongdae Kim: Measuring the mixing time of social graphs, In Internet Measurements Conference (ACM IMC 2010)

# Standard and Industry Work

  1. Privacy Implications of DNSSEC Look-aside Validation
    Aziz Mohaisen
    DNS OARC Workhsop, 2016 (oral presentation)
  2. Detecting Botnet Domains Using DNS Traffic
    Matt Thomas and Aziz Mohaisen
    DNS OARC Workshop 2014
  3. Open resolvers in the com/net resolution
    Duane Wessels and Aziz Mohaisen
    DNS OARC Workshop 2014
  4. XMSS: Extended Hash-Based Signatures
    Andreas Huelsing et al.
    Internet Draft (IRTF, CFRG), 2016
  5. Evaluation of Privacy for DNS Private Exchange
    Aziz Mohaisen and Allison Mankin
    Internet Draft, 2015 (source)
  6. Opportunistic Encryption with DANE Semantics and IPsec: IPSECA
    Eric Osterweil et al.
    Internet Draft, 2015

# Patents

# Talks

# Media Coverage

Our work on measuring the leakage of .onion in the public domain name system infrastructure has been covered by a post in the DeepDotWeb. The work was presented at ACM WPES and was jointly done with Matt Thomas.

Our work on Social Clouds, a design of a trustworthy social computing system bootstrapped by social networks, was covered by several news stories and posts, including posts at MIT Technology Review, The Verge, Data News, Atelier, msn.com. This work was published in IEEE Transactions on Service Computing and was jointly done with Huy Tran (undergraduate student; now at Microsoft), Abhishek Chandra and Yongdae Kim.

Our work on DDoS attacks has been covered by several news stories in the New Scientist, CBS News, Info Packets, Infosec Island, Minnesota Daily, Slashdot, METRO, The Register, Gizmodo, Geekosystem, ISSSource, among others. This work was published at ISOC NDSS, and was jointly done with Max Schuchard, Eugene Vasserman, Denis Foo Kune, Nick Hopper, and Yongdae Kim.

Copyrights

For IEEE publications:
© 2000-2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

For ACM publications:
ACM COPYRIGHT NOTICE. Copyright © 2001-2016 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Publications Dept., ACM, Inc., fax +1 (212) 869-0481, or permissions@acm.org.