Peer-reviewed Publications

All papers published before 2010 are available at DBLP. My citations are available from my Google Scholar

📚 2019

  1. David Mohaisen, Songqing Chen:
    Computer Systems Have 99 Problems, Let's Not Make Machine Learning Another One
    IEEE Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (IEEE TPS 2019).
  2. Muhammad Saad, Aminollah Khormali, Aziz Mohaisen:
    Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking
    The fourteenth Symposium on Electronic Crime Research (eCrime 2019)
  3. Changhun Jung, Jumabek Alikhanov, Mohammed Abuhamad, Aziz Mohaisen, Kyungja Han, DaeHun Nyang:
    W-Net: A CNN-based Architecture for White Blood Cells Image Classification
    AAAI Fall Symposium on AI for Social Good, 2019
  4. Honor Among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets
    Jinchun Choi, Ahmed Abusnaina, Afsah Anwar, An Wang, Songqing Chen, Daehun Nyang and Aziz Mohaisen
    The 2019 IEEE Conference on Dependable and Secure Computing (DSC 2019)
  5. Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks
    Ahmed Abusnaina*, Aminollah Khormali*, Daehun Nyang, Murat Yuksel and Aziz Mohaisen
    The 2019 IEEE Conference on Dependable and Secure Computing (DSC 2019)
  6. Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems.
    A. Abusnaina, A. Khormali, H. Alasmary, J. Park, A. Anwar and A. Mohaisen.
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2019).
  7. InstaMeasure: Instant Per-flow Detection UsingLarge In-DRAM Working Set of Active Flows.
    R. Jang, S. Moon, Y. Noh, A. Mohaisen and D. Nyang.
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2019).
  8. Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network.
    M. Saad, V. Cook, L. Nguyen, My Thai, A. Mohaisen:
    IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2019).
  9. XLF: A Cross-layer Framework to Secure the Internet of Things (IoT).
    A. Wang, A. Mohaisen and S. Chen.
    39th IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2019).
  10. Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers.
    J. Park, A. Khormali, M. Mohaisen, A. Mohaisen.
    IEEE International Conference on Dependable Systems and Networks (IEEE DSN 2019).
  11. Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms
    J. Jeon, J. Kim, J. Kim, K. Kim, A. Mohaisen, J. Kim.
    IEEE International Conference on Dependable Systems and Networks (fast abstract) (IEEE DSN 2019).
  12. Mempool Optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems.
    M. Saad, L. Njilla, C. Kamhoua, J. Kim, D. Nyang, and A. Mohaisen:
    IEEE International Conference on Blockchain and Cryptocurrency (IEEE ICBC 2019).
  13. RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing.
    M. Saad, A. Anwar, A. Ahmad, H. Alasmary, M. Yukesl, and A. Mohaisen.
    IEEE International Conference on Blockchain and Cryptocurrency (IEEE ICBC 2019).
  14. Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference
    R. Jang, J. Kang, A. Mohaisen, D. Nyang.
    IEEE Transactions on Mobile Computing (IEEE TMC 2019).
  15. Towards Characterizing Blockchain-based Cryptocurrencies for Highly-Accurate Predictions.
    M. Saad, J. Choi, J. Kim, D. Nyang, A Mohaisen
    IEEE Systems Journal (ISJ 2019)
  16. Two-Stage IoT Device Scheduling with Dynamic Programming for Energy Internet Systems
    L. Park, C. Lee, J. Kim, A. Mohaisen, and S. Cho
    IEEE Internet of Things Journal (IEEE IoT Journal 2019)
  17. Analyzing and Detecting Emerging Internet of Things Malware: A Graph-based Approach
    H. Alasmary, A. Khormali, A. Anwar, J. Park, J. Choi, A. Abusnaina, A. Awad, D. Nyang, A. Mohaisen
    IEEE Internet of Things Journal (IEEE IoT Journal 2019)
  18. Kyeongseon Kim, Dohyun Kwon, Joongheon Kim, and Aziz Mohaisen
    Personalized Online Live Video Streaming Using Softmax-Based Multinomial Classification
    Applied Science, 2019, 9(11), 2297.
  19. Ashar Ahmed, Muhammad Saad, Aziz Mohaisen.
    Secure and Transparent Audit Logs with BlockAudit
    Journal of Network and Computer Applications, 2019.
  20. Jeman Park, Jinchun Choi, DaeHun Nyang, and Aziz Mohaisen.
    Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service
    IEEE Transactions on Network and Service Management (TNSM), 2019
  21. Mao Ye, Kazi Abu Zubair, Aziz Mohaisen, and Amro Awad
    Towards Low-Cost Mechanisms to Enable Restoration of Encrypted Non-Volatile Memories
    IEEE Transactions on Dependable Computing, 2019.
  22. BlockTrail: A Scalable Multichain Solution for Blockchain-based Audit Trails.
    A. Ahmad, M. Saad, L. Njilla, C. Kamhoua, M. Bassiouni, and A. Mohaisen:
    IEEE International Conference on Communications (IEEE ICC 2019).
  23. Poster: DL-CAIS: Deep Learning-based Code Authorship Identification System.
    M. Abuhamad, T. Abuhmed, A. Mohaisen and D. Nyang:
    ISOC Network and Distributed System Security Symposium (NDSS 2019)
  24. Poster: Examining Adversarial Learning against Graph-based IoT Malware Detection Systems.
    A. Abusnaina, A. Khormali, H. Alasmary, J. Park, A. Anwar, U. Meteriz and A. Mohaisen.
    ISOC Network and Distributed System Security Symposium (NDSS 2019)
  25. Poster: Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table.
    R. Jang, S. Moon, Y. Noh, A. Mohaisen and D. Nyang.
    ISOC Network and Distributed System Security Symposium (NDSS 2019)
  26. Poster: Analyzing Endpoints in the Internet of Things Malware.
    J. Choi, A. Anwar, H. Alasmary, J. Spaulding, D. Nyang and A. Mohaisen.
    ISOC Network and Distributed System Security Symposium (NDSS 2019)
  27. Poster: Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network.
    M. Saad, V. Cook, L. Nguyen, M. Thai and A. Mohaisen.
    ISOC Network and Distributed System Security Symposium (NDSS 2019)
  28. Poster: Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach.
    H. Alasmary, A. Khormali, A. Anwar, J. Park, J. Choi, D. Nyang and A. Mohaisen.
    ISOC Network and Distributed System Security Symposium (NDSS 2019)
  29. Countering Selfish Mining in Blockchains
    M. Saad, L. Njilla, C. Kamhoua, and A. Mohaisen
    IEEE Computing, Networking and Communications (ICNC 2019)
  30. Muhammad Saad, Jeffrey Spaulding, L. Njilla, C. A. Kamhoua, S. Shetty, D. Nyang, Aziz Mohaisen:
    Exploring the Attack Surface of Blockchain: A Systematic Overview.
    Manuscript (2019)
  31. Amirali Sanatinia, Jeman Park, Erik-Oliver Blass, Aziz Mohaisen, Guevara Noubir:
    A Privacy-Preserving Longevity Study of Tor's Hidden Services
    Manuscript (2019)
  32. Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen:
    COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection.
    Manuscript (2019)

📚 2018

📚 2017

📚 2016

📚 2013-2015

📚 2013 and before

# Standard and Industry Work

  1. Privacy Implications of DNSSEC Look-aside Validation
    A. Mohaisen
    DNS OARC Workhsop, 2016 (oral presentation)
  2. Detecting Botnet Domains Using DNS Traffic
    Matt Thomas and A. Mohaisen
    DNS OARC Workshop 2014
  3. Open resolvers in the com/net resolution
    Duane Wessels and A. Mohaisen
    DNS OARC Workshop 2014
  4. XMSS: Extended Hash-Based Signatures
    Andreas Huelsing et al.
    Internet Draft (IRTF, CFRG), 2016
  5. Evaluation of Privacy for DNS Private Exchange
    A. Mohaisen and Allison Mankin
    Internet Draft, 2015 (source)
  6. Opportunistic Encryption with DANE Semantics and IPsec: IPSECA
    Eric Osterweil et al.
    Internet Draft, 2015

# Patents

# Talks

# Media Coverage

Our work on measuring the leakage of .onion in the public domain name system infrastructure has been coveblack by a post in the DeepDotWeb. The work was presented at ACM WPES and was jointly done with Matt Thomas.

Our work on Social Clouds, a design of a trustworthy social computing system bootstrapped by social networks, was coveblack by several news stories and posts, including posts at MIT Technology Review, The Verge, Data News, Atelier, msn.com. This work was published in IEEE Transactions on Service Computing and was jointly done with Huy Tran (undergraduate student; now at Microsoft), Abhishek Chandra and Y. Kim.

Our work on DDoS attacks has been coveblack by several news stories in the New Scientist, CBS News, Info Packets, Infosec Island, Minnesota Daily, Slashdot, METRO, The Register, Gizmodo, Geekosystem, ISSSource, among others. This work was published at ISOC NDSS, and was jointly done with Max Schuchard, Eugene Vasserman, Denis Foo Kune, Nick Hopper, and Y. Kim.

Copyrights

For IEEE publications:
© 2000-2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or blackistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

For ACM publications:
ACM COPYRIGHT NOTICE. Copyright © 2001-2016 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honoblack. Abstracting with cblackit is permitted. To copy otherwise, to republish, to post on servers, or to blackistribute to lists, requires prior specific permission and/or a fee. Request permissions from Publications Dept., ACM, Inc., fax +1 (212) 869-0481, or permissions@acm.org.