David A. Mohaisen

I am a Professor of Computer Science at the University of Central Florida. My research is in systems, security, and privacy. My recent research addressed various questions related to ML/AI, malware analysis, web systems, IoT, wearables, and blockchains. I obtained my PhD from the University of Minnesota, in 2012, working with the magnificent duo, Prof. Yongdae Kim (major advisor) and Prof. Nick Hopper. At UCF, I direct the Security and Analytics Lab (SEAL).

Teaching: Spring 2022: None. Office Hours: (Spring 2022): By appointment.

Current Service: TPC: IEEE S&P 2023, ACM CCS 2022, IEEE ICDCS 2022. EB: IEEE TMC and IEEE TPDS.

Societies and Speaking: I am a Senior Member of ACM and IEEE, a Distinguished Speaker of ACM (2021-2024; request) and Distinguished Visitor of IEEE's Computer Society (2021-2023; request).

Opportunities: I am always looking for new hardworking members to join my group. I am looking for PhD applicants who are interested in (cyber)security and privacy (with aspects of measurements, learning, and design). Preference will be given to candidates with MS degree and solid CS background (algorithms, programming, and networking; machine learning is a plus). If you are at UCF, drop me line to set up a time to talk. If not at UCF, apply then email me to discuss opportunities. UCF undergraduate students who want to research (cyber)security and online privacy are also strongly encouraged to contact me for opportunities.

Doctoral Advisees

Here is a list of the current and past Ph.D. students I had the privilege of mentoring!

  1. Mohammed Alkinoon (CS)
  2. Soohyeon Choi (CS)
  3. Ran Gedawy (CS)
  4. Hattan Althebeiti (ECE)
  5. Kyle Thomas (CS); co-advised
  6. Ayodeji Adeniran (MST), part-time
  7. Mohamed Alqadhi (CS)
  8. Ali Alkinoon (CS)

Selected Recent Conference Publications (last 5 years)

Also see my DBLP and Google Scholar profiles for complete lists
IEEE VR 2022 A Keylogging Inference Attack on Air-Tapping KeyboardsBest Paper Candidate
RAID 2022 Systematically Evaluating the Robustness of ML-based Malware Detection Systems
IEEE VR 2022 AiRType: An Air-Tapping Keyboard for Augmented Reality Environments*
ACM CHI 2022 AcousticType: Smartwatch-Enabled Cross-Device Text Entry Using Keyboard Acoustics (LBW)
IEEE HPCA 2022 Filesystem Encryption or Direct-Access for NVM Filesystems? Let’s Have Both
IEEE DSN 2022 Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows
IEEE IPDPS 2022 Minerva: Rethinking Secure Architectures for Fabric-Attached Memory Architectures
ACM CCS 2021 Revisiting Nakamoto Consensus in Asynchronous Networks
ACM CCS 2021 SyncAttack: Double-spending in Bitcoin Without Mining Power
ACM ICS 2021 Optimizing Integrity Tree Updates for Write-Intensive Secure NVMs. Best Paper Candidate
IEEE ICCV 2021 Adversarial Example Detection Using Latent Neighborhood Graph
ACM SIGSPATIAL 2021 Aligning Semantic and Embedding Spaces in Spatial Representation Learning.
IEEE ICDCS 2021 Root Cause Analyses for the Deteriorating Bitcoin Network Synchronization
ACM WPES 2021 SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals
ACM WPES 2021 Deep Learning-Based Automated Privacy Policy Annotation with Key Policy Highlights
IEEE DSN 2021 Evaluating the Robustness of ML-based IoT Malware Detectors. Best Paper (fast abstract)
PoPETS 2020 Multi-χ: Identifying Multiple Authors from Source Code Files
IEEE ICDCS 2020 Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers
IEEE ICDCS 2020 Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications.
IEEE INFOCOM 2020 Adversarial Learning-based Approach to Defend Against Website Fingerprinting
IEEE INFOCOM 2020 SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event
IEEE ICDCS 2019 Exploring Spatial Temporal and Logical Attacks on the Bitcoin Network
IEEE ICDCS 2019 Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems
IEEE ICDCS 2019 XLF: A Cross-layer Framework to Secure the Internet of Things
IEEE ICBC 2019 Mempool Optimization for Defending Against DDoS Attacks in PoW-based Blockchains
IEEE DSN 2019 Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers
IEEE DSC 2019 Examining the robustness of learning-based ddos detection Best Paper--Runner-up
ACM CCS 2018 Large-Scale and Language-Oblivious Code Authorship Identification
ISOC NDSS 2018 ABC: Enabling Smartphone Authentication with Built-in Camera
IEEE ICDCS 2018 ShmCaffe: A Distributed Deep Learning Platform with Shared Memory
ACM DLoT 2018 Towards Blockchain-Driven Secure and Transparent Audit Logs. Best Paper
IEEE ICDCS 2017 Defending Against Voice Impersonation Attacks on Smartphones. Best Paper
IEEE INFOCOM 2017 Large-scale Invisible Attack on AFC Systems with NFC-equipped Smartphones
ISOC NDSS 2016 Uncovering game bots in MMORPGs via self-similarity in the wild

Selected Recent Journal Publications (last 3 years)

IEEE TDSC 2022 Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses
IEEE/ACM TNET 2022 A Large-Scale Behavioral Analysis of the Open DNS Resolvers
IEEE/ACM TNET 2022 Exploring Partitioning Attacks on the Bitcoin Network
ACM TOPS 2021 Large-Scale and Robust Code Authorship Identification with Deep Feature Learning
IEEE TDSC 2021 Deep learning-based fine-grained hierarchical learning for robust malware detection
IEEE TPDS 2021 e-PoS: making proof-of-stake decentralized and fair
IEEE TMC 2021 A one-page text entry method optimized for recentagle smartwatches
IEEE IoT Journal 2021 ShellCore: automating malicious IoT software detection using shell commands
IEEE IoT Journal 2021 Sensor-based continous authentication using behavioral biometrics
IET Blockchains 2021 Emperically comparing the performance of blockchain's consensus algorithms
IEEE TC 2021 SSD-Assisted ransomware detection and data recovery techniques
IEEE TKDE 2020 GraphShield: dynamic large graphs for secure queries with forward privacy
IEEE Sys. Journal 2020 Characterizing Blockchains for Highly-Accurate Predictions. Best Paper
IEEE TDSC 2020 A Data-Driven Study of DDoS Attacks and Their Dynamics
IEEE TDSC 2020 Look-aside At Your Own Risk: Privacy Implications of DNSSEC Look-aside Validation
IEEE TDSC 2020 Low-Cost Mechanisms to Restoration of Encrypted Non-Volatile Memories
IEEE TDSC 2020 Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM
IEEE TMC 2020 Rogue Access Point Detection Using Intentional Channel Interference
IEEE CS&T 2020 Exploring the Attack Surface of Blockchain: A Systematic Overview
IEEE IoT Journal 2020 AUToSen: Deep Learning-based Implicit Continuous Authentication

Selected Recent Talks


  • Fall 2021: CAP 5150 - Foundations of Computer Security and Privacy
  • Spring 2021: CAP 6640 - Computer Understanding of Natural Language
  • Spring 2021: CAP 5150 - Foundations of Computer Security and Privacy
  • Spring 2020: CAP 6640 - Computer Understanding of Natural Language
  • Spring 2020: CAP 5150 - Foundations of Computer Security and Privacy
  • Spring 2019: CAP 6640 - Computer Understanding of Natural Language
  • Spring 2019: CIS 4361 - Secure Operating Systems and Administration
  • Fall 2018: CIS 4615 - Secure Software Development and Assurance
  • Spring 2018: CAP 6133 - Advanced Topics in Computer Security and Computer Forensics
  • Fall 2017: CIS 4615 - Secure Software Development and Assurance

Contact: HPA2-240, 4000 Central Florida Blvd, Orlando, FL 32816, USA. last_name@ucf.edu