Peer-reviewed Publications

All papers published before 2010 are available at DBLP. My citations are available from my Google Scholar

  1. Muhammad Saad, Laurent Njilla, Charles Kamhoua, and Aziz Mohaisen, Countering Selfish Mining in Blockchains, in IEEE Workshop on Computing, Networking and Communications (CNC 2019)., Hawaii, USA, Feb 18-20, 2019.
  2. Mohammed Abuhamed, Tamer Abuhamed, Aziz Mohaisen, DaeHun Nyang, “Large-Scale and Language-Oblivious Code Authorship Identification”, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2018), Toronto, Canada, October 13-17, 2018
  3. Zhongjie Ba, Sixu Piao, Xinwen Fu, Dimitrios Koutsonikolas, Aziz Mohaisen, Kui Ren: "ABC: Enabling Smartphone Authentication with Built-in Camera". In Proceedings of Network and Distributed System Security Symposium (ISOC NDSS 2018), San Diego, CA, USA, February 18-21, 2018
  4. Sungha Baek, Youngdon Jung, Aziz Mohaisen, Sungjin Lee and Daehun Nyang. “SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery”. Proceedings of 38th IEEE International Conference on Distributed Computing Systems, (IEEE ICDCS 2018), Vienna, Austria, July 2-6, 2018.
  5. Shinyoung Ahn, Joongheon Kim, Eunji Lim, Wan Choi, Aziz Mohaisen and Sungwon Kang. ShmCaffe: A Distributed Deep Learning Platform with Shablack Memory. Proceedings of 38th IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2018), Vienna, Austria, July 2-6, 2018.
  6. Afsah Anwar, Aminollah Khormali, and Aziz Mohaisen. “Understanding the Hidden Cost of Software Vulnerabili- ties: Measurements and Pblackictions”, Proceeding of The 14th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2018), Singapore, August 8–10, 2018
  7. Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, Aziz Mohaisen. "QOI: Assessing Participation in Threat Information Sharing". International Conference on Acoustics, Speech, and Signal Processing (IEEE ICASSP 2018), Calgary, Alberta, Canada, April 15–20, 2018.
  8. Changhun Jung, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang. "DIGITALSEAL: A Transaction Authentication Tool for Online and Offline Transactions". International Conference on Acoustics, Speech, and Signal Processing (IEEE ICASSP 2018), Calgary, Alberta, Canada, April 15–20, 2018.
  9. Jeman Park, DaeHun Nyang, and Aziz Mohaisen. "Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks." 16th Annual Conference on Privacy, Security and Trust (IEEE PST 2018), Belfast, Northern Ireland, United Kingdom, August 28-30, 2018.
  10. Hisham Alasmary, Afsah Anwar, Jeman Park, Jinchun Choi, Daehun Nyang, and Aziz Mohaisen, Graph-based Comparison of IoT and Android Malware, International Conference on Computational Data and Social Networks (CSoNet 2018), Shanghai, China, Dec 18-20, 2018.
  11. Ashar Ahmad, Muhammad Saad, Mostafa Bassiouni, and Aziz Mohaisen, Towards Blockchain-Driven, Secure and Transparent Audit Logs, in 1st International Workshop on Distributed Ledger of Things (DLoT) in conjunction with MobiQuitous 2018. NYC, USA, Nov 5, 2018.
  12. Shin, Joongheon Kim, Aziz Mohaisen, Jaebok Park, Kyung Hee Lee. Neural Network Syntax Analyzer for Embedded Standardized Deep Learning. In the 2nd International Workshop on Embedded and Mobile Deep Learning, EMDL18 (in conjunction with ACM MobiSys 2018), Munich, Germany, June 15, 2018.
  13. Jeffrey Spaulding, Jeman Park, Joongheon Kim, DaeHun Nyang, Aziz Mohaisen. Thriving on chaos: Proactive detection of command and control domains in internet of things‐scale botnets using DRIFT. Transactions on Emerging Telecommunications Technologies, 2018(8):1-17, 2018.
  14. Aziz Mohaisen, Zhongshu Gu, and Kui Ren, Zhenhua Li, Charles Kamhoua, Laurent Njilla, DaeHun Nyang. "Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-aside Validation". IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2018.
  15. An Wang, Wentao Chang, Songqing Chen, and Aziz Mohaisen. "A Data-Driven Study of DDoS Attacks and Their Dynamics". IEEE Trans. on Dependable and Secure Computing (IEEE TDSC), 2018
  16. Feng Shen, Justin Del Vecchio, Aziz Mohaisen, Steven Y. Ko and Lukasz Ziarek. “Android Malware Detection using Multi-Flows and API Patterns”. IEEE Transactions on Mobile Computing (IEEE TMC), 2018.
  17. Fan Dang, Pengfei Zhou, Zhenhua Li, Ennan Zhai, Aziz Mohaisen, Qingfu Wen, and Mo Li. “Large-scale Invisible Attack on AFC Systems with NFC-equipped Smartphones”. IEEE Transactions on Mobile Computing (IEEE TMC), 2018.
  18. DaeHun Nyang, Hyoungshick Kim, Woojoo Lee, Sung-bae Kang, Geumhwan Cho, Mun-Kyu Lee, Aziz Mohaisen "Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks", In Elsevier Computers & Security (COSE), Volume 78, September 2018, Pages 1-15.
  19. Jeffrey Spaulding, D-FENS: DNS Filtering and Extraction Network System for Malicious Domain Names, PhD Dissertation, University of Central Florida, August 2018.
  20. Aziz Mohaisen, Omar Alrawi, Jeman Park, Joongheon Kim, DaeHun Nyang, Manar Mohaisen Network-based analysis and classification of malware using behavioral artifacts ordering. ICST Trans. Security Safety, 2018.
  21. (SECURECOMM 2017) Wentao Chang, Aziz Mohaisen, An Wang and Songqing Chen: "Understanding Adversarial Strategies from Bot Recruitment to Scheduling". In Proceedings of the 2017 International Conference on Security and Privacy in Communication Networks, SECURECOMM 2017, Niagara Falls, NY, Canada, October 22–24, 2017.
  22. [ACM HotWeb 2017] Aziz Mohaisen, Omar Al Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla: Rethinking Information Sharing for Actionable Threat Intelligence, In ACM HotWeb 2017, San Jose, CA, USA, October 14, 2017.
  23. [ACM HotWeb 2017] Jeff Spaulding, Daehun Nyang, Aziz Mohaisen: Understanding the Effectiveness of Typosquatting Techniques, In ACM HotWeb 2017, San Jose, CA, USA, October 14, 2017.
  24. [ACM ToN 2017] Aziz Mohaisen, Kui Ren: Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures, IEEE/ACM Transactions on Networking, August 2017
  25. [IEEE ICDCS 2017] Si Chen, Sixu Piao, Cong Wang, Qian Wang, Jian Weng, Lu Su, Kui Ren, and Aziz Mohaisen: You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones. In Proceedings of the 37th International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-7, 2017.
  26. [IEEE ICDCS 2017] An Wang, Aziz Mohaisen and Songqing Chen: An Adversary-Centric Behavior Modeling of DDoS Attacks. In Proceedings of the 37th International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-7, 2017.
  27. [IEEE ICDCS 2017] Chaowen Guan, Aziz Mohaisen, Zhi Sun, Fei Wei, Lu Su, Kui Ren and Yaling Yang: When Smart TV Meets CRN: Privacy-preserving Fine-grained Spectrum Access. In Proceedings of the 37th International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-7, 2017.
  28. [IEEE ICDCS 2017] Feng Shen, Justin Del Vecchio, Aziz Mohaisen, Steven Y. Ko and Lukasz Ziarek: Android Malware Detection using Complex-Flows In Proceedings of the 37th International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-7, 2017.
  29. [IEEE ICDCS 2017] Aziz Mohaisen, Zhongshu Gu and Kui Ren: Privacy Implications of DNSSEC Look-aside Validation In Proceedings of the 37th International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-7, 2017.
  30. [IEEE ICDCS 2017] Rhongho Jang, Jeonil Kang, Aziz Mohaisen and DaeHun Nyang: Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n In Proceedings of the 37th International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-7, 2017.
  31. [IEEE ICDCS 2017] Jeffrey Spaulding, Shambhu Upadhyaya and Aziz Mohaisen: You’ve Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques. In Proceedings of the 37th International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-7, 2017.
  32. [IEEE INFOCOM 2017] Fan Dang, Pengfei Zhou, Zhenhua Li, Ennan Zhai, Aziz Mohaisen, Qingfu Wen, and Mo Li: Large-scale Invisible Attack on AFC Systems with NFC-equipped Smartphones. In Proceedings of the 36th IEEE International Conf. on Computer Communications, INFOCOM 2017, Atlanta, GA, USA, May 1-4, 2017.
  33. [FC 2017] Qian Wang, Kui Ren, Minxin Du, Qi Li, and Aziz Mohaisen: SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates. Financial Cryptography and Data Security, FC 2017, Malta, April 3–7, 2017.
  34. [IEEE TIFS 2017] Jiyoung Woo and Aziz Mohaisen * and Yongdae Kim and Huy Kang Kim: Crime Scene Reconstruction: Online Gold Farming Network Analysis, IEEE Transactions on Information Forensics and Security (IEEE TIFS 2017)
  35. [IEEE TDSC 2017] An Wang and Wentao Chang and Songqing Chen and Aziz Mohaisen: A Data-Driven Study of DDoS Attacks and Their Dynamics, In IEEE Transactions on Dependable and Secure Computing (accepted with revisions)
  36. Young Jong Mo, Joongheon Kim, Jong-Kook Kim, Aziz Mohaisen, and Woojoo Lee: Performance of Deep Learning Computation with TensorFlow Software Library in GPU-Capable Multicore Computing Platforms, The 9th International Conference on Ubiquitous and Future Networks (IEEE ICUFN 2017)
  37. Omar Al Ibrahim, Aziz Mohaisen, Charles Kamhoua, Kevin Kwiat, Laurent Njilla: Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence Technical Report 2017, University at Buffalo and Air Force Research Lab (88ABW-2017-0416)
  38. [NDSS 2016] Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Aziz Mohaisen, Huy Kang Kim: You are a Game Bot!: Uncovering game bots in MMORPGs via self-similarity in the wild, The Network and Distributed System Security Symposium (NDSS 2016)
  39. [ARES 2016] Jeffrey Spaulding *, Shambhu Upadhyaya and Aziz Mohaisen: The Landscape of Domain Name Typosquatting: Techniques and Countermeasures, In Proceeding of the The International Conference on Availability, Reliability and Security (ARES 2016)
  40. [HotWeb 2016] Ah Reum Kang, Seong Hoon Jeong, Steven Y. Ko, Kui Ren, Aziz Mohaisen: Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service, In Proceeding of Hot Topics in Web Systems and Technologies (IEEE HotWeb 2016)
  41. [WISA 2016] Aziz Mohaisen, Ah Reum Kang, and Kui Ren: Does Query Blocking Improve DNS Privacy?, In proceeding of the 17th Conference on Information Security Applications (WISA 2016)
  42. [WISA 2016] An Wang, Aziz Mohaisen, Wentao Chang, and Songqing Chen: Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks, In proceeding of the 17th Conference on Information Security Applications (WISA 2016)
  43. [ERMIS 2016 @ WWWW] Omar Alrawi and Aziz Mohaisen: Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications, In Proceeding of the Empirical Research Methods in Information Security @ WWW 2016
  44. [TKDE 2016] Myungsun Kim, Aziz Mohaisen, Jung Hee Cheon, Yonggdae Kim: Private Over-threshold Aggregation Protocols over Distributed Databases, In IEEE Transactions on Knowledge and Data Engineering (IEEE TKDE 2016)
  45. [COSE 2016] Jae-wook Jang, Hyunjae Kang, Jiyoung Woo, Aziz Mohaisen, and Huy Kang Kim: Andro-Dumpsys: Anti-Malware System Based on Malware Creator and Malware Centric Information, In Elsevier Computers & Security (COSE 2016)
  46. Jae-wook Jang, Yaesung Yun, Aziz Mohaisen, Jiyoung Woo, Huy Kang Kim: Detection and Classification of Android Malware by Similarity Matching of Behavior Profiles, In SpringerPlus 2016
  47. Ah Reum Kang, Seong Hoon Jeong, Aziz Mohaisen, Huy Kang Kim: Multimodal game bot detection using user behavioral characteristics, In SpringerPlus 2016
  48. Manar Mohaisen and Aziz Mohaisen: Characterizing Collaboration in Social Network-enabled Routing, In Transactions on Internet and Info Systems, 2016
  49. [HotWeb 2015] Aziz Mohaisen: Towards Automatic and Lightweight Detection and Classification of Malicious Web Contents, In Proceeding of Hot Topics in Web Systems and Technologies (IEEE HotWeb 2015)
  50. [CNS 2015] Hesham Mekky, Aziz Mohaisen, Zhi-Li Zhang: Separation of Benign and Malicious Network Events for Accurate Malware Family Classification, In Proceeding of IEEE Conference on Communications and Network Security (IEEE CNS 2015)
  51. [DSN 2015] An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen: Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis, In Proceeding of IEEE International Conference on Dependable Systems and Networks (IEEE DSN 2015)
  52. [DIMVA 2015] An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen: Revealing DDoS Attack Dynamics behind the Scenes, In Proceeding of the International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2015)
  53. [ASIA CCS 2015] Wentao Chang, Aziz Mohaisen, An Wang, Songqing Chen: Measuring Botnets in the Wild: Some New Trends, In Proceedings of ACM Symposium on Information, Computer and Communications Security (ACM ASIA CCS 2015)
  54. Jae-wook Jang, Hyunjae Kang, Jiyoung Woo, Aziz Mohaisen, Huy Kang Kim: Andro-AutoPsy: Anti-malware system based on similarity matching and creator-centric information, In Elsevier Digital Investigation, 2015
  55. [TDSC 2015] Aziz Mohaisen, Hesham Mekky, Xinwen Zhang, Haiyong Xie, and Yongdae Kim: Timing Attacks on Access Privacy in ICN and Countermeasures, In IEEE Transactions on Dependable and Secure Computing (IEEE TDSC 2015)
  56. [COSE 2015] Aziz Mohaisen and Omar AlrawiL Behavior-based Automated Malware Analysis and Classification, In Elsevier Computers & Security, 2015
  57. [COSE 2015] Youngjae Maeng, Aziz Mohaisen, Daehun Nyang: Transaction Authentication Using Complementary Colors, In Elsevier Computers & Security, 2015
  58. [MPE 2015] Jae-wook Jang, Jiyoung Woo, Aziz Mohaisen, Jaesung Yun, and Huy Kang Kim: Mal-Netminer: Malware Classification Approach Based on Social Network Analysis of System Call Graph, In Mathematical Problems in Engineering, 2015
  59. [MTA 2015] Joongheon Kim and Aziz Mohaisen: Interference Impacts on 60 GHz Video Streaming in Smart TV Platforms, In Multimedia Tools and Applications, 2015
  60. [TR 2015] Eric Ostweil, Craig Murray, Aziz Mohaisen: Having your cake and eating it too: Domain Name Data Networking (DNDN), Technical Report, Verisign Labs, 2015
  61. [WPES 2014] Matt Thomas and Aziz Mohaisen: Measuring the Leakage of Onion at the Root, In Proceeding of the ACM Workshop on Privacy in the Electronic Society (ACM WPES 2014)
  62. [CNS 2014] Aziz Mohaisen, Omar Alrawi, Andrew West, and Allison Mankin: Chatter: Exploring Classification of Malware based on the Order of Events, In Proceeding of the IEEE Conference on Communications and Network Security (IEEE CNS 2014)
  63. [TRUSTBUS 2014] Youngbae Song, Hyoungshick Kim, and Aziz Mohaisen: A Private Walk in the Clouds, International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2014)
  64. [WISA 2014] Ahmed Kosba, Aziz Mohaisen, Andrew West, Trevor Tonn: ADAM: Automated Detection and Attribution of Malicious Webpages, In Proceeding of Conference on Information Security Applications (WISA 2014)
  65. [WISA 2014] Hyun Jae Kang, Jae-wook Jang, Aziz Mohaisen, and Huy Kang Kim: AndroTracker: Creator Information based Android Malware Classification System, In Proceeding of Conference on Information Security Applications (WISA 2014)
  66. [WISA 2014] Aziz Mohaisen, Mansurul Bhuiyan, and Yannis Labrou: Name Server Switching: Anomaly Signatures, Usage, Clustering, and Pblackiction, In Proceeding of Conference on Information Security Applications (WISA 2014)
  67. [WISA 2014] Aziz Mohaisen and Omar Alrawi: High-Fidelity, Behavior-based Automated Malware Analysis and Classification In Proceeding of Conference on Information Security Applications (WISA 2014)
  68. [HOTPETS 2014] Matt Thomas and Aziz Mohaisen: Measuring the Leakage of Onion at the Root, In Hot Topics in Privacy Enhancing Technologies (HotPETS 2014)
  69. [DIMVA 2014] Aziz Mohaisen and Omar Alrawi: AV-Meter: An Evaluation of Antivirus Scans and Labels, In the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2014)
  70. [DIMVA 2014] Andrew G. West and Aziz Mohaisen: Metadata-driven Threat Classification of Network Endpoints Appearing in Malware, In the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2014)
  71. [@WWW 2014] Matt Thomas and Aziz Mohaisen: Kindblack Domains: Detecting and Clustering Botnet Domains Using DNS Traffic, In WWW Workshops 2014
  72. [TMC 2014] DaeHun Nyang, Aziz Mohaisen, and Jeonil Kang: Keylogging-resistant Visual Authentication Protocols In IEEE Transactions on Mobile Computing (TMC 2014)
  73. [CL 2014] Joongheon Kim, Aziz Mohaisen: Fast and Low-Power Link Setup for IEEE 802.15.3c Multi-Gigabit/s Wireless Sensor Networks, IEEE Communication Letters, 2014.
  74. [TSC 2014] Aziz Mohaisen, Huy Tran, Abhishek Chandra, and Yongdae Kim: SocialCloud: Trustworthy Distributed Computing on Social Networks, In IEEE Transactions on Services Computing, 2014
  75. [WISA 2013] Aziz Mohaisen, Omar Alrawi, Matt Larson, and Danny McPherson: A Methodical Evaluation of Antivirus Scans and Labels, In Proceeding of Conference on Information Security Applications (WISA 2013)
  76. [WISA 2013] Aziz Mohaisen and Scott Hollenbeck: Improving Social Network-based Sybil Defenses by Augmenting Social Graphs, In Proceeding of Conference on Information Security Applications (WISA 2013)
  77. [@WWW 2013] Aziz Mohaisen and Omar Alrawi: Unveiling Zeus: Automated Classification of Malware Samples, In WWW Workshop 2013
  78. [ASIACCS 2013] Aziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim: Protecting Access Privacy of Cached Contents in Information Centric Networks, ACM Symposium on Information, Computer and Communications Security (ASIA CCS 2013)
  79. [ASIACCS 2013] Aziz Mohaisen, Huy Tran, Abhishek Chandra, and Yongdae Kim: Trustworthy Distributed Computing on Social Networks, ACM Symposium on Information, Computer and Communications Security (ASIA CCS 2013)
  80. [ASIACCS 2013] Aziz Mohaisen and Yongdae Kim: Dynamix: Anonymity on Dynamic Social Structures, ACM Symposium on Information, Computer and Communications Security (ASIA CCS 2013)
  81. [TDSC 2013] Aziz Mohaisen, Denis Foo Kune, Eugene Vasserman, Myungsun Kim, and Yongdae Kim: Secure encounter-based social networks: Requirements, challenges, and designs, IEEE Transactions on Dependable and Secure Computing (TDSC 2013)
  82. [TVT 2013] Yanhua Li, Aziz Mohaisen, and Zhi-Li Zhang: Trading Optimality for Scalability in Large-scale Opportunistic Routing, IEEE Transactions on Vehicular Technology (TVT 2013)
  83. Myungsun Kim and Aziz Mohaisen and Jung Hee Cheon and Yongdae Kim: Private Top-k Aggregation Protocols, In Proceeding of the International Conference on Information Security and Cryptology (ICISC 2012)
  84. Aziz Mohaisen, Pengkui Luo, Yanhua Li, Yongdae Kim, Zhi-Li Zhang: Measuring Bias in the Mixing Time of Social Graphs due to Graph Sampling, In IEEE International Conference for Military Communications (MILCOM 2012)
  85. Aziz Mohaisen, Huy Tran, Nicholas Hopper, and Yongdae Kim: On the Mixing Time of Directed Social Graphs and Security Implications, In ACM Symposium on Information, Computer and Communications Security (ASIA CCS 2012)
  86. Aziz Mohaisen, Tamer AbuHmed, Ting Zhu, Manar Mohaisen: Collaboration in Social Network-based Information Dissemination, In the International Conference on Communications (IEEE ICC 2012)
  87. Ting Zhu, Aziz Mohaisen, Yi Ping, Don Towsley: DEOS: Dynamic Energy-Oriented Scheduling for Sustainable Wireless Sensor Networks, In International Conference on Computer Communications (IEEE INFOCOM 2012)
  88. Aziz Mohaisen, Nicholas Hopper, Yongdae Kim: Incorporating trust into social network-based Sybil defenses, In IEEE International Conference on Computer Communications (INFOCOM 2011)
  89. Aziz Mohaisen, Huy Tran, Nicholas Hopper, and Yongdae Kim: Understanding social networks properties for trustworthy computing, IEEE ICDCS Workshops 2011
  90. Manar Mohaisen and Aziz Mohaisen: Parallel QRD-M Encoder for Decentralized Multi-User MIMO Systems, In IEEE International Conference on Communications (IEEE ICC 2011)
  91. Max Schuchard, E Vasserman, A Mohaisen, D Foo Kune, N Hopper, Y Kim: Losing control of the Internet: Using the data plane to attack the control plane In The Network and Distributed System Security Symposium (ISOC NDSS 2011)
  92. Aziz Mohaisen, Tamer AbuHmed, Hun Jeong Kang, Daehun Nyang, Yongdae Kim: An analysis of a social network-based Sybil defense in mobile networks, In the International Conference on Ubiquitous Information Management and Communication (ACM IMCOM 2011)
  93. Aziz Mohaisen, Aaram Yun, Yongdae Kim: Measuring the mixing time of social graphs, In Internet Measurements Conference (ACM IMC 2010)

# Standard and Industry Work

  1. Privacy Implications of DNSSEC Look-aside Validation
    Aziz Mohaisen
    DNS OARC Workhsop, 2016 (oral presentation)
  2. Detecting Botnet Domains Using DNS Traffic
    Matt Thomas and Aziz Mohaisen
    DNS OARC Workshop 2014
  3. Open resolvers in the com/net resolution
    Duane Wessels and Aziz Mohaisen
    DNS OARC Workshop 2014
  4. XMSS: Extended Hash-Based Signatures
    Andreas Huelsing et al.
    Internet Draft (IRTF, CFRG), 2016
  5. Evaluation of Privacy for DNS Private Exchange
    Aziz Mohaisen and Allison Mankin
    Internet Draft, 2015 (source)
  6. Opportunistic Encryption with DANE Semantics and IPsec: IPSECA
    Eric Osterweil et al.
    Internet Draft, 2015

# Patents

# Talks

# Media Coverage

Our work on measuring the leakage of .onion in the public domain name system infrastructure has been coveblack by a post in the DeepDotWeb. The work was presented at ACM WPES and was jointly done with Matt Thomas.

Our work on Social Clouds, a design of a trustworthy social computing system bootstrapped by social networks, was coveblack by several news stories and posts, including posts at MIT Technology Review, The Verge, Data News, Atelier, msn.com. This work was published in IEEE Transactions on Service Computing and was jointly done with Huy Tran (undergraduate student; now at Microsoft), Abhishek Chandra and Yongdae Kim.

Our work on DDoS attacks has been coveblack by several news stories in the New Scientist, CBS News, Info Packets, Infosec Island, Minnesota Daily, Slashdot, METRO, The Register, Gizmodo, Geekosystem, ISSSource, among others. This work was published at ISOC NDSS, and was jointly done with Max Schuchard, Eugene Vasserman, Denis Foo Kune, Nick Hopper, and Yongdae Kim.

Copyrights

For IEEE publications:
© 2000-2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or blackistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

For ACM publications:
ACM COPYRIGHT NOTICE. Copyright © 2001-2016 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honoblack. Abstracting with cblackit is permitted. To copy otherwise, to republish, to post on servers, or to blackistribute to lists, requires prior specific permission and/or a fee. Request permissions from Publications Dept., ACM, Inc., fax +1 (212) 869-0481, or permissions@acm.org.