Posts by Collection

members

publications

Cooperative Public Key Authentication Protocol in Wireless Sensor Network

DaeHun Nyang, David Mohaisen, "Cooperative Public Key Authentication Protocol in Wireless Sensor Network." In the proceedings of Ubiquitous Intelligence and Computing, Third International Conference, UIC 2006, Wuhan, China, September 3-6, 2006.

Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks

David Mohaisen, DaeHun Nyang, "Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks." In the proceedings of Wireless Sensor Networks, Third European Workshop, EWSN 2006, Zurich, Switzerland, February 13-15, 2006.

On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network

David Mohaisen, YoungJae Maeng, DaeHun Nyang, "On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network." In the proceedings of Emerging Technologies in Knowledge Discovery and Data Mining, PAKDD 2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers, 2007.

Secret Key Revocation in Sensor Networks

YoungJae Maeng, David Mohaisen, DaeHun Nyang, "Secret Key Revocation in Sensor Networks." In the proceedings of Ubiquitous Intelligence and Computing, 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007.

Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network

David Mohaisen, DaeHun Nyang, YoungJae Maeng, KyungHee Lee, "Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network." In the proceedings of Mobile Ad-Hoc and Sensor Networks, Third International Conference, MSN 2007, Beijing, China, December 12-14, 2007.

A Survey on Deep Packet Inspection for Intrusion Detection Systems

Tamer AbuHmed, David Mohaisen, DaeHun Nyang, "A Survey on Deep Packet Inspection for Intrusion Detection Systems." CoRR, 2008.

Data Randomization for Lightweight Secure Data Aggregation in Sensor Network

David Mohaisen, Ik Jeong, Dowon Hong, Nam{-}Su Jho, DaeHun Nyang, "Data Randomization for Lightweight Secure Data Aggregation in Sensor Network." In the proceedings of Ubiquitous Intelligence and Computing, 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008.

Privacy in Location Based Services: Primitives Toward the Solution

David Mohaisen, Dowon Hong, DaeHun Nyang, "Privacy in Location Based Services: Primitives Toward the Solution." The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008 - Volume 1, 2008.

A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network

David Mohaisen, Nam{-}Su Jho, Dowon Hong, "A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network." In the proceedings of Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, 2009.

Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks

David Mohaisen, DaeHun Nyang, KyungHee Lee, "Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks." Int. J. Netw. Secur., 2009.

Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering

David Mohaisen, Dowon Hong, "Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering." ETRI Journal, 2009.

Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering

Dowon Hong, David Mohaisen, "Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering." ETRI Journal, 2010.

Designs to account for trust in social network-based sybil defenses

David Mohaisen, Nicholas Hopper, Yongdae Kim, "Designs to account for trust in social network-based sybil defenses." In the proceedings of Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010.

Losing control of the internet: using the data plane to attack the control plane

Max Schuchard, David Mohaisen, Denis Kune, Nicholas Hopper, Yongdae Kim, Eugene Vasserman, "Losing control of the internet: using the data plane to attack the control plane." In the proceedings of Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010.

Measuring the mixing time of social graphs

David Mohaisen, Aaram Yun, Yongdae Kim, "Measuring the mixing time of social graphs." In the proceedings of Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, IMC 2010, Melbourne, Australia - November 1-3, 2010.

On the Inefficiency of the Resources Optimal Key Pre-Distribution Scheme for Wireless Sensor Network

David Mohaisen, DaeHun Nyang, "On the Inefficiency of the Resources Optimal Key Pre-Distribution Scheme for Wireless Sensor Network." J. Commun., 2010.

Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency

David Mohaisen, Nam{-}Su Jho, Dowon Hong, DaeHun Nyang, "Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency." IEICE Trans. Inf. Syst., 2010.

Secure encounter-based social networks: requirements, challenges, and designs

David Mohaisen, Eugene Vasserman, Max Schuchard, Denis Kune, Yongdae Kim, "Secure encounter-based social networks: requirements, challenges, and designs." In the proceedings of Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010.

Keep your friends close: Incorporating trust into social network-based Sybil defenses

David Mohaisen, Nicholas Hopper, Yongdae Kim, "Keep your friends close: Incorporating trust into social network-based Sybil defenses." In the proceedings of INFOCOM 2011. 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 10-15 April 2011, Shanghai, China, 2011.

Losing Control of the Internet: Using the Data Plane to Attack the Control Plane

Max Schuchard, David Mohaisen, Denis Kune, Nicholas Hopper, Yongdae Kim, Eugene Vasserman, "Losing Control of the Internet: Using the Data Plane to Attack the Control Plane." In the proceedings of Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, 2011.

Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks

David Mohaisen, Tamer AbuHmed, Hun Kang, Yongdae Kim, DaeHun Nyang, "Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks." In the proceedings of Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011, Seoul, Republic of Korea, 2011.

Parallel QRD-M Encoder for Decentralized Multi-User MIMO Systems

Manar Mohaisen, David Mohaisen, Yanhua Li, Pengkui Luo, "Parallel QRD-M Encoder for Decentralized Multi-User MIMO Systems." In the proceedings of Proceedings of IEEE International Conference on Communications, ICC 2011, Kyoto, Japan, 2011.

Understanding Social Networks Properties for Trustworthy Computing

David Mohaisen, Huy Tran, Nicholas Hopper, Yongdae Kim, "Understanding Social Networks Properties for Trustworthy Computing." In the proceedings of 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 20-24 June 2011, Minneapolis, Minnesota, USA, 2011.

Collaboration in social network-based information dissemination

David Mohaisen, Tamer AbuHmed, Ting Zhu, Manar Mohaisen, "Collaboration in social network-based information dissemination." In the proceedings of Proceedings of IEEE International Conference on Communications, ICC 2012, Ottawa, ON, Canada, 2012.

DEOS: Dynamic energy-oriented scheduling for sustainable wireless sensor networks

Ting Zhu, David Mohaisen, Yi Ping, Don Towsley, "DEOS: Dynamic energy-oriented scheduling for sustainable wireless sensor networks." In the proceedings of Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, 2012.

Measuring bias in the mixing time of social graphs due to graph sampling

David Mohaisen, Pengkui Luo, Yanhua Li, Yongdae Kim, Zhi{-}Li Zhang, "Measuring bias in the mixing time of social graphs due to graph sampling." In the proceedings of 31st IEEE Military Communications Conference, MILCOM 2012, Orlando, FL, USA, 2012.

On the mixing time of directed social graphs and security implications

David Mohaisen, Huy Tran, Nicholas Hopper, Yongdae Kim, "On the mixing time of directed social graphs and security implications." In the proceedings of 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS, Seoul, Korea, 2012.

Private Over-Threshold Aggregation Protocols

Myungsun Kim, David Mohaisen, Jung Cheon, Yongdae Kim, "Private Over-Threshold Aggregation Protocols." In the proceedings of Information Security and Cryptology - ICISC 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers, 2012.

Protecting access privacy of cached contents in information centric networks

David Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim, "Protecting access privacy of cached contents in information centric networks." In the proceedings of the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, 2012.

ADAM: Automated detection and attribution of malicious webpages

Ahmed Kosba, David Mohaisen, Andrew West, Trevor Tonn, "ADAM: Automated detection and attribution of malicious webpages." In the proceedings of IEEE Conference on Communications and Network Security, CNS 2013, National Harbor, MD, USA, 2013.

Babble: Identifying malware by its dialects

David Mohaisen, Omar Alrawi, Andrew West, Allison Mankin, "Babble: Identifying malware by its dialects." In the proceedings of IEEE Conference on Communications and Network Security, CNS 2013, National Harbor, MD, USA, 2013.

Characterization of the dynamics and interactions of domain names and name server

Mansurul Bhuiyan, David Mohaisen, Yannis Labrou, Mohammad Hasan, "Characterization of the dynamics and interactions of domain names and name server." In the proceedings of IEEE Conference on Communications and Network Security, CNS 2013, National Harbor, MD, USA, 2013.

Dynamix: anonymity on dynamic social structures

David Mohaisen, Yongdae Kim, "Dynamix: anonymity on dynamic social structures." In the proceedings of 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, 2013.

Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs

David Mohaisen, Scott Hollenbeck, "Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs." In the proceedings of Information Security Applications - 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers, 2013.

Protecting access privacy of cached contents in information centric networks

David Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim, "Protecting access privacy of cached contents in information centric networks." In the proceedings of 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China, 2013.

Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs

David Mohaisen, Denis Kune, Eugene Vasserman, Myungsun Kim, Yongdae Kim, "Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs." IEEE Trans. Dependable Secur. Comput., 2013.

Towards a Methodical Evaluation of Antivirus Scans and Labels - "If You're Not Confused, You're Not Paying Attention"

David Mohaisen, Omar Alrawi, Matt Larson, Danny McPherson, "Towards a Methodical Evaluation of Antivirus Scans and Labels - "If You're Not Confused, You're Not Paying Attention"." In the proceedings of Information Security Applications - 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers, 2013.

Trading Optimality for Scalability in Large-Scale Opportunistic Routing

Yanhua Li, David Mohaisen, Zhi{-}Li Zhang, "Trading Optimality for Scalability in Large-Scale Opportunistic Routing." IEEE Trans. Veh. Technol., 2013.

Trustworthy distributed computing on social networks

David Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim, "Trustworthy distributed computing on social networks." In the proceedings of 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China, 2013.

Unveiling Zeus: automated classification of malware samples

David Mohaisen, Omar Alrawi, "Unveiling Zeus: automated classification of malware samples." In the proceedings of 22nd International World Wide Web Conference, WWW '13, Rio de Janeiro, Brazil, May 13-17, 2013, Companion Volume, 2013.

A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain

Youngbae Song, Hyoungshick Kim, David Mohaisen, "A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain." In the proceedings of Trust, Privacy, and Security in Digital Business - 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014.

ADAM: Automated Detection and Attribution of Malicious Webpages

Ahmed Kosba, David Mohaisen, Andrew West, Trevor Tonn, Huy Kim, "ADAM: Automated Detection and Attribution of Malicious Webpages." In the proceedings of Information Security Applications - 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers, 2014.

AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification

David Mohaisen, Omar Alrawi, "AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification." In the proceedings of Information Security Applications - 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers, 2014 (BEST PAPER AWARD).

AV-Meter: An Evaluation of Antivirus Scans and Labels

David Mohaisen, Omar Alrawi, "AV-Meter: An Evaluation of Antivirus Scans and Labels." In the proceedings of Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, 2014.

Characterizing botnets-as-a-service

Wentao Chang, An Wang, David Mohaisen, Songqing Chen, "Characterizing botnets-as-a-service." In the proceedings of ACM SIGCOMM 2014 Conference, SIGCOMM'14, Chicago, IL, USA, 2014.

Chatter: Classifying malware families using system event ordering

David Mohaisen, Andrew West, Allison Mankin, Omar Alrawi, "Chatter: Classifying malware families using system event ordering." In the proceedings of IEEE Conference on Communications and Network Security, CNS 2014, San Francisco, CA, USA, 2014.

Fast and Low-Power Link Setup for IEEE 802.15.3c Multi-Gigabit/s Wireless Sensor Networks

Joongheon Kim, David Mohaisen, Jong{-}Kook Kim, "Fast and Low-Power Link Setup for IEEE 802.15.3c Multi-Gigabit/s Wireless Sensor Networks." IEEE Commun. Lett., 2014.

Keylogging-Resistant Visual Authentication Protocols

DaeHun Nyang, David Mohaisen, Jeonil Kang, "Keylogging-Resistant Visual Authentication Protocols." IEEE Trans. Mob. Comput., 2014.

Kindred domains: detecting and clustering botnet domains using DNS traffic

Matthew Thomas, David Mohaisen, "Kindred domains: detecting and clustering botnet domains using DNS traffic." In the proceedings of 23rd International World Wide Web Conference, WWW '14, Seoul, Republic of Korea, Companion Volume, 2014.

Measuring the Leakage of Onion at the Root: A measurement of Tor's .onion pseudo-TLD in the global domain name system

Matthew Thomas, David Mohaisen, "Measuring the Leakage of Onion at the Root: A measurement of Tor's .onion pseudo-TLD in the global domain name system." In the proceedings of Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES 2014, Scottsdale, AZ, USA, 2014.

Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware

Andrew West, David Mohaisen, "Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware." In the proceedings of Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, 2014.

Name Server Switching: Anomaly Signatures, Usage, Clustering, and Prediction

David Mohaisen, Mansurul Bhuiyan, Yannis Labrou, "Name Server Switching: Anomaly Signatures, Usage, Clustering, and Prediction." In the proceedings of Information Security Applications - 15th International Workshop, WISA 2014, Jeju Island, Korea, Revised Selected Papers, 2014.

POSTER: Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification

Hesham Mekky, David Mohaisen, Zhi{-}Li Zhang, "POSTER: Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification." In the proceedings of Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, 2014.

POSTER: How Distributed Are Today's DDoS Attacks?

An Wang, Wentao Chang, David Mohaisen, Songqing Chen, "POSTER: How Distributed Are Today's DDoS Attacks?." In the proceedings of Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, 2014.

Parallel QRD-M encoder for multi-user MIMO systems

Manar Mohaisen, David Mohaisen, M{\'{e}}rouane Debbah, "Parallel QRD-M encoder for multi-user MIMO systems." Telecommun. Syst., 2014.

Trustworthy Distributed Computing on Social Networks

David Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim, "Trustworthy Distributed Computing on Social Networks." IEEE Trans. Serv. Comput., 2014.

AMAL: High-fidelity, behavior-based automated malware analysis and classification

David Mohaisen, Omar Alrawi, Manar Mohaisen, "AMAL: High-fidelity, behavior-based automated malware analysis and classification." Comput. Secur., 2015.

Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information

Jae{-}wook Jang, Hyunjae Kang, Jiyoung Woo, David Mohaisen, Huy Kim, "Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information." Digit. Investig., 2015.

Capturing DDoS Attack Dynamics Behind the Scenes

An Wang, David Mohaisen, Wentao Chang, Songqing Chen, "Capturing DDoS Attack Dynamics Behind the Scenes." In the proceedings of Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings, 2015.

Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis

An Wang, David Mohaisen, Wentao Chang, Songqing Chen, "Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis." In the proceedings of 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015, Rio de Janeiro, Brazil, 2015.

Detecting and Classifying Android Malware Using Static Analysis along with Creator Information

Hyun{-}Jae Kang, Jae{-}wook Jang, David Mohaisen, Huy Kim, "Detecting and Classifying Android Malware Using Static Analysis along with Creator Information." Int. J. Distributed Sens. Networks, 2015.

Interference impacts on 60 ghz real-time online video streaming in wireless smart tv platforms

Joongheon Kim, David Mohaisen, Song{-}Nam Hong, "Interference impacts on 60 ghz real-time online video streaming in wireless smart tv platforms." Multim. Tools Appl., 2015.

Measuring Botnets in the Wild: Some New Trends

Wentao Chang, David Mohaisen, An Wang, Songqing Chen, "Measuring Botnets in the Wild: Some New Trends." In the proceedings of Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, 2015.

Separation of benign and malicious network events for accurate malware family classification

Hesham Mekky, David Mohaisen, Zhi-Li Zhang, "Separation of benign and malicious network events for accurate malware family classification." In the proceedings of 2015 IEEE Conference on Communications and Network Security, CNS 2015, Florence, Italy, 2015.

Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures

David Mohaisen, Hesham Mekky, Xinwen Zhang, Haiyong Xie, Yongdae Kim, "Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures." IEEE Trans. Dependable Secur. Comput., 2015.

Towards Automatic and Lightweight Detection and Classification of Malicious Web Contents

David Mohaisen, "Towards Automatic and Lightweight Detection and Classification of Malicious Web Contents." In the proceedings of Third IEEE Workshop on Hot Topics in Web Systems and Technologies, HotWeb 2015, Washington, DC, USA, 2015.

Transaction authentication using complementary colors

YoungJae Maeng, David Mohaisen, Mun-Kyu Lee, DaeHun Nyang, "Transaction authentication using complementary colors." Comput. Secur., 2015.

A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure

Seong Jeong, Ah Kang, Joongheon Kim, Huy Kim, David Mohaisen, "A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure." In the proceedings of Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, 2016.

A user study of the effectiveness of typosquatting techniques

Jeffrey Spaulding, Ah Kang, Shambhu Upadhyaya, David Mohaisen, "A user study of the effectiveness of typosquatting techniques." In the proceedings of 2016 IEEE Conference on Communications and Network Security, CNS 2016.

Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information

Jae-wook Jang, Hyun-Jae Kang, Jiyoung Woo, David Mohaisen, Huy Kim, "Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information." Comput. Secur., 2016.

Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles

Jae-wook Jang, Jaesung Yun, David Mohaisen, Jiyoung Woo, Huy Kim, "Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles." CoRR, 2016.

Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications

Omar Alrawi, David Mohaisen, "Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications." In the proceedings of Proceedings of the 25th International Conference on World Wide Web, WWW 2016, Montreal, Canada, Companion Volume, 2016.

Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph

Jae-wook Jang, Jiyoung Woo, David Mohaisen, Jaesung Yun, Huy Kim, "Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph." CoRR, 2016.

Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks

An Wang, David Mohaisen, Wentao Chang, Songqing Chen, "Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks." In the proceedings of Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, Revised Selected Papers, 2016.

Multimodal Game Bot Detection using User Behavioral Characteristics

Ah Kang, Seong Jeong, David Mohaisen, Huy Kim, "Multimodal Game Bot Detection using User Behavioral Characteristics." CoRR, 2016.

Private Over-Threshold Aggregation Protocols over Distributed Datasets

Myungsun Kim, David Mohaisen, Jung Cheon, Yongdae Kim, "Private Over-Threshold Aggregation Protocols over Distributed Datasets." IEEE Trans. Knowl. Data Eng., 2016.

The Landscape of Domain Name Typosquatting: Techniques and Countermeasures

Jeffrey Spaulding, Shambhu Upadhyaya, David Mohaisen, "The Landscape of Domain Name Typosquatting: Techniques and Countermeasures." In the proceedings of 11th International Conference on Availability, Reliability and Security, ARES, Salzburg, Austria, 2016.

Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service

Ah Kang, Seong Jeong, Steven Ko, Kui Ren, David Mohaisen, "Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service." In the proceedings of Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies, HotWeb, Washington, DC, USA, 2016.

You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild

Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, David Mohaisen, Huy Kim, "You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild." In the proceedings of 23rd Annual Network and Distributed System Security Symposium, NDSS, San Diego, California, USA, 2016.

An Adversary-Centric Behavior Modeling of DDoS Attacks

An Wang, David Mohaisen, Songqing Chen, "An Adversary-Centric Behavior Modeling of DDoS Attacks." In the proceedings of 37th IEEE International Conference on Distributed Computing Systems, ICDCS, Atlanta, GA, USA, 2017.

Android Malware Detection Using Complex-Flows

Feng Shen, Justin Vecchio, David Mohaisen, Steven Ko, Lukasz Ziarek, "Android Malware Detection Using Complex-Flows." In the proceedings of 37th IEEE International Conference on Distributed Computing Systems, ICDCS, Atlanta, GA, USA, 2017.

Crime Scene Reconstruction: Online Gold Farming Network Analysis

Hyukmin Kwon, David Mohaisen, Jiyoung Woo, Yongdae Kim, Eunjo Lee, Huy Kim, "Crime Scene Reconstruction: Online Gold Farming Network Analysis." IEEE Trans. Inf. Forensics Secur., 2017.

Distributed and reliable decision-making for cloud-enabled mobile service platforms

Joongheon Kim, David Mohaisen, "Distributed and reliable decision-making for cloud-enabled mobile service platforms." Int. J. Distributed Sens. Networks, 2017.

Highly-accurate rogue access point detection using intentional channel interference: poster

RhongHo Jang, Jeonil Kang, David Mohaisen, DaeHun Nyang, "Highly-accurate rogue access point detection using intentional channel interference: poster." In the proceedings of Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec, Boston, MA, USA, 2017.

Large-scale invisible attack on AFC systems with NFC-equipped smartphones

Fan Dang, Pengfei Zhou, Zhenhua Li, Ennan Zhai, David Mohaisen, Qingfu Wen, Mo Li, "Large-scale invisible attack on AFC systems with NFC-equipped smartphones." In the proceedings of 2017 IEEE Conference on Computer Communications, INFOCOM, Atlanta, GA, USA, 2017.

Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures

David Mohaisen, Kui Ren, "Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures." IEEE/ACM Trans. Netw., 2017.

Performance of deep learning computation with TensorFlow software library in GPU-capable multi-core computing platforms

Young Mo, Joongheon Kim, Jong{-}Kook Kim, David Mohaisen, Woojoo Lee, "Performance of deep learning computation with TensorFlow software library in GPU-capable multi-core computing platforms." In the proceedings of Ninth International Conference on Ubiquitous and Future Networks, ICUFN, Milan, Italy, 2017.

Poster: Android Malware Detection using Multi-Flows and API Patterns

Feng Shen, Justin Vecchio, David Mohaisen, Steven Ko, Lukasz Ziarek, "Poster: Android Malware Detection using Multi-Flows and API Patterns." In the proceedings of Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys, Niagara Falls, NY, USA, 2017.

Privacy Implications of DNSSEC Look-Aside Validation

David Mohaisen, Zhongshu Gu, Kui Ren, "Privacy Implications of DNSSEC Look-Aside Validation." In the proceedings of 37th IEEE International Conference on Distributed Computing Systems, ICDCS, Atlanta, GA, USA, 2017.

Rethinking information sharing for threat intelligence

David Mohaisen, Omar Al{-}Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, "Rethinking information sharing for threat intelligence." In the proceedings of Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, HotWeb, San Jose / Silicon Valley, CA, USA, 2017.

Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n

RhongHo Jang, Jeonil Kang, David Mohaisen, DaeHun Nyang, "Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n." In the proceedings of 37th IEEE International Conference on Distributed Computing Systems, ICDCS, Atlanta, GA, USA, 2017.

SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates

Qian Wang, Kui Ren, Minxin Du, Qi Li, David Mohaisen, "SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates." In the proceedings of Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers, 2017.

Two-level network monitoring and management in WLAN using software-defined networking: poster

RhongHo Jang, DongGyu Cho, David Mohaisen, Youngtae Noh, DaeHun Nyang, "Two-level network monitoring and management in WLAN using software-defined networking: poster." In the proceedings of Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, 2017.

Understanding Adversarial Strategies from Bot Recruitment to Scheduling

Wentao Chang, David Mohaisen, An Wang, Songqing Chen, "Understanding Adversarial Strategies from Bot Recruitment to Scheduling." In the proceedings of Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, 2017.

Understanding the Privacy Implications of DNSSEC Look-Aside Validation

David Mohaisen, Zhongshu Gu, Kui Ren, Laurent Njilla, Charles Kamhoua, DaeHun Nyang, "Understanding the Privacy Implications of DNSSEC Look-Aside Validation." In the proceedings of IEEE Symposium on Privacy-Aware Computing, PAC 2017, Washington, DC, USA, 2017.

Understanding the effectiveness of typosquatting techniques

Jeffrey Spaulding, DaeHun Nyang, David Mohaisen, "Understanding the effectiveness of typosquatting techniques." In the proceedings of Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, HotWeb 2017, San Jose / Silicon Valley, CA, USA, 2017.

When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access

Chaowen Guan, David Mohaisen, Zhi Sun, Lu Su, Kui Ren, Yaling Yang, "When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access." In the proceedings of 37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, 2017.

You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones

Si Chen, Kui Ren, Sixu Piao, Cong Wang, Qian Wang, Jian Weng, Lu Su, David Mohaisen, "You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones." In the proceedings of 37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, 2017.

You've Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques

Jeffrey Spaulding, Shambhu Upadhyaya, David Mohaisen, "You've Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques." In the proceedings of 37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, 2017.

ABC: Enabling Smartphone Authentication with Built-in Camera

Zhongjie Ba, Sixu Piao, Xinwen Fu, Dimitrios Koutsonikolas, David Mohaisen, Kui Ren, "ABC: Enabling Smartphone Authentication with Built-in Camera." In the proceedings of 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, 2018.

Countering Selfish Mining in Blockchains

Muhammad Saad, Laurent Njilla, Charles Kamhoua, David Mohaisen, "Countering Selfish Mining in Blockchains." ICNC, 2018.

Defending Internet of Things Against Malicious Domain Names using D-FENS

Jeffrey Spaulding, David Mohaisen, "Defending Internet of Things Against Malicious Domain Names using D-FENS." In the proceedings of 2018 IEEE/ACM Symposium on Edge Computing, SEC 2018, Seattle, WA, USA, 2018.

Delving Into Internet DDoS Attacks by Botnets: Characterization and Analysis

An Wang, Wentao Chang, Songqing Chen, David Mohaisen, "Delving Into Internet DDoS Attacks by Botnets: Characterization and Analysis." IEEE/ACM Trans. Netw., 2018.

Digitalseal: a Transaction Authentication Tool for Online and Offline Transactions

Changhun Jung, Jeonil Kang, David Mohaisen, DaeHun Nyang, "Digitalseal: a Transaction Authentication Tool for Online and Offline Transactions." In the proceedings of 2018 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2018, Calgary, AB, Canada, 2018.

Graph-Based Comparison of IoT and Android Malware

Hisham Alasmary, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, David Mohaisen, "Graph-Based Comparison of IoT and Android Malware." In the proceedings of Computational Data and Social Networks - 7th International Conference, CSoNet 2018, Shanghai, China, 2018.

Interference-Aware Adaptive Beam Alignment for Hyper-Dense IEEE 802.11ax Internet-of-Things Networks

Dohyun Kwon, Sang{-}Wook Kim, Joongheon Kim, David Mohaisen, "Interference-Aware Adaptive Beam Alignment for Hyper-Dense IEEE 802.11ax Internet-of-Things Networks." Sensors, 2018.

Large-Scale and Language-Oblivious Code Authorship Identification

Mohammed Abuhamad, Tamer AbuHmed, David Mohaisen, DaeHun Nyang, "Large-Scale and Language-Oblivious Code Authorship Identification." In the proceedings of Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, 2018.

Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering

David Mohaisen, Omar Alrawi, Jeman Park, Joongheon Kim, DaeHun Nyang, Manar Mohaisen, "Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering." EAI Endorsed Trans. Security Safety, 2018.

Neural Network Syntax Analyzer for Embedded Standardized Deep Learning

Myungjae Shin, Joongheon Kim, David Mohaisen, Jaebok Park, KyungHee Lee, "Neural Network Syntax Analyzer for Embedded Standardized Deep Learning." In the proceedings of Proceedings of the 2nd International Workshop on Embedded and Mobile Deep Learning, EMDL@MobiSys 2018, Munich, Germany, 2018.

POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization

Muhammad Saad, My Thai, David Mohaisen, "POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization." In the proceedings of Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, 2018.

POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions

Afsah Anwar, Aminollah Khormali, David Mohaisen, "POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions." In the proceedings of Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, 2018.

Proactive detection of algorithmically generated malicious domains

Jeffrey Spaulding, Jeman Park, Joongheon Kim, David Mohaisen, "Proactive detection of algorithmically generated malicious domains." In the proceedings of 2018 International Conference on Information Networking, ICOIN 2018, Chiang Mai, Thailand, 2018.

QOI: Assessing Participation in Threat Information Sharing

Jeman Park, Hisham Alasmary, Omar Al{-}Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, David Mohaisen, "QOI: Assessing Participation in Threat Information Sharing." In the proceedings of 2018 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2018, Calgary, AB, Canada, 2018.

SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery

SungHa Baek, Youngdon Jung, David Mohaisen, Sungjin Lee, DaeHun Nyang, "SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery." In the proceedings of 38th IEEE International Conference on Distributed Computing Systems, ICDCS 2018, Vienna, Austria, 2018.

ShmCaffe: A Distributed Deep Learning Platform with Shared Memory Buffer for HPC Architecture

Shin-Young Ahn, Joongheon Kim, Eunji Lim, Wan Choi, David Mohaisen, Sungwon Kang, "ShmCaffe: A Distributed Deep Learning Platform with Shared Memory Buffer for HPC Architecture." In the proceedings of 38th IEEE International Conference on Distributed Computing Systems, ICDCS 2018, Vienna, Austria, 2018.

Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks

Jeman Park, DaeHun Nyang, David Mohaisen, "Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks." In the proceedings of 16th Annual Conference on Privacy, Security and Trust, PST 2018, Belfast, Northern Ireland, Uk, 2018.

Towards Blockchain-Driven, Secure and Transparent Audit Logs

Ashar Ahmad, Muhammad Saad, Mostafa Bassiouni, David Mohaisen, "Towards Blockchain-Driven, Secure and Transparent Audit Logs." In the proceedings of Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous, New York City, NY, USA, 2018 (BEST PAPER AWARD).

Towards characterizing blockchain-based cryptocurrencies for highly-accurate predictions

Muhammad Saad, David Mohaisen, "Towards characterizing blockchain-based cryptocurrencies for highly-accurate predictions." In the proceedings of IEEE INFOCOM Workshops, Honolulu, HI, USA, 2018.

Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks

DaeHun Nyang, Hyoungshick Kim, Woojoo Lee, Sung{-}bae Kang, Geumhwan Cho, Mun{-}Kyu Lee, David Mohaisen, "Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks." Comput. Secur., 2018.

Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions

Afsah Anwar, Aminollah Khormali, DaeHun Nyang, David Mohaisen, "Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions." In the proceedings of Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, 2018.

XMSS: eXtended Merkle Signature Scheme

Andreas Hulsing, Denis Butin, Stefan{-}Lukas Gazdag, Joost Rijneveld, David Mohaisen, "XMSS: eXtended Merkle Signature Scheme." RFC, 2018.

A Privacy-Preserving Longevity Study of Tor's Hidden Services

Amirali Sanatinia, Jeman Park, Erik{-}Oliver Blass, David Mohaisen, Guevara Noubir, "A Privacy-Preserving Longevity Study of Tor's Hidden Services." CoRR, 2019.

A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster

Rhongho Jang, Seongkwang Moon, Youngtae Noh, David Mohaisen, DaeHun Nyang, "A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster." In the proceedings of Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, 2019.

Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems

Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, David Mohaisen, "Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems." In the proceedings of 39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019, Dallas, TX, USA, 2019.

Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach

Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, Ahmed Abusnaina, Amro Awad, DaeHun Nyang, David Mohaisen, "Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach." IEEE Internet Things J., 2019.

Analyzing endpoints in the internet of things malware: poster

Jinchun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, David Mohaisen, "Analyzing endpoints in the internet of things malware: poster." In the proceedings of Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, 2019.

Android Malware Detection Using Complex-Flows

Feng Shen, Justin Vecchio, David Mohaisen, Steven Ko, Lukasz Ziarek, "Android Malware Detection Using Complex-Flows." IEEE Trans. Mob. Comput., 2019.

BlockTrail: A Scalable Multichain Solution for Blockchain-Based Audit Trails

Ashar Ahmad, Muhammad Saad, Laurent Njilla, Charles Kamhoua, Mostafa Bassiouni, David Mohaisen, "BlockTrail: A Scalable Multichain Solution for Blockchain-Based Audit Trails." In the proceedings of 2019 IEEE International Conference on Communications, ICC 2019, Shanghai, China, 2019.

Breaking graph-based IoT malware detection systems using adversarial examples: poster

Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, Ulku Meteriz, David Mohaisen, "Breaking graph-based IoT malware detection systems using adversarial examples: poster." In the proceedings of Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, 2019.

COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection

Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen, "COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection." CoRR, 2019.

Computer Systems Have 99 Problems, Let's Not Make Machine Learning Another One

David Mohaisen, Songqing Chen, "Computer Systems Have 99 Problems, Let's Not Make Machine Learning Another One." CoRR, 2019.

Countering Selfish Mining in Blockchains

Muhammad Saad, Laurent Njilla, Charles Kamhoua, David Mohaisen, "Countering Selfish Mining in Blockchains." In the proceedings of International Conference on Computing, Networking and Communications, ICNC 2019, Honolulu, HI, USA, 2019.

Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments

Jeman Park, David Mohaisen, Charles Kamhoua, Michael Weisman, Nandi Leslie, Laurent Njilla, "Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments." In the proceedings of Information Security Applications - 20th International Conference, WISA, Jeju Island, South Korea, Revised Selected Papers, 2019.

Detecting and Classifying Android Malware using Static Analysis along with Creator Information

Hyun-Jae Kang, Jae-wook Jang, David Mohaisen, Huy Kim, "Detecting and Classifying Android Malware using Static Analysis along with Creator Information." CoRR, 2019.

Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking

Muhammad Saad, Aminollah Khormali, David Mohaisen, "Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking." In the proceedings of 2019 APWG Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh, PA, USA, 2019.

Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks

Ahmed Abusnaina, Aminollah Khormali, DaeHun Nyang, Murat Yuksel, David Mohaisen, "Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks." In the proceedings of 2019 IEEE Conference on Dependable and Secure Computing, DSC 2019, Hangzhou, China, 2019.

Examining the Security of DDoS Detection Systems in Software Defined Networks

Ahmed Abusnaina, DaeHun Nyang, Murat Yuksel, David Mohaisen, "Examining the Security of DDoS Detection Systems in Software Defined Networks." In the proceedings of Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, CoNEXT 2019, Companion Volume, Orlando, FL, USA, 2019.

Exploring the Attack Surface of Blockchain: A Systematic Overview

Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang, David Mohaisen, "Exploring the Attack Surface of Blockchain: A Systematic Overview." CoRR, 2019.

Fighting Fake News Propagation with Blockchains

Muhammad Saad, Ashar Ahmad, David Mohaisen, "Fighting Fake News Propagation with Blockchains." In the proceedings of 7th IEEE Conference on Communications and Network Security, CNS 2019, Washington, DC, USA, 2019.

Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets

Jinchun Choi, Ahmed Abusnaina, Afsah Anwar, An Wang, Songqing Chen, DaeHun Nyang, David Mohaisen, "Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets." In the proceedings of 2019 IEEE Conference on Dependable and Secure Computing, DSC, Hangzhou, China, 2019.

InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows

Rhongho Jang, Seongkwang Moon, Youngtae Noh, David Mohaisen, DaeHun Nyang, "InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows." In the proceedings of 39th IEEE International Conference on Distributed Computing Systems, ICDCS, Dallas, TX, USA, 2019.

Investigating DNS Manipulation by Open DNS Resolvers

Jeman Park, Manar Mohaisen, David Mohaisen, "Investigating DNS Manipulation by Open DNS Resolvers." In the proceedings of Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, CoNEXT, Companion Volume, Orlando, FL, USA, 2019.

IoT malware ecosystem in the wild: a glimpse into analysis and exposures

Jinchun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, David Mohaisen, "IoT malware ecosystem in the wild: a glimpse into analysis and exposures." In the proceedings of Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC, Arlington, Virginia, USA, 2019.

Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems

Muhammad Saad, Laurent Njilla, Charles Kamhoua, Joongheon Kim, DaeHun Nyang, David Mohaisen, "Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems." In the proceedings of IEEE International Conference on Blockchain and Cryptocurrency, ICBC, Seoul, Korea (South), 2019.

Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic

Muhammad Saad, Victor Cook, Lan Nguyen, My Thai, David Mohaisen, "Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic." In the proceedings of 39th IEEE International Conference on Distributed Computing Systems, ICDCS, Dallas, TX, USA, 2019.

Pricing Data Tampering in Automated Fare Collection with NFC-Equipped Smartphones

Fan Dang, Ennan Zhai, Zhenhua Li, Pengfei Zhou, David Mohaisen, Kaigui Bian, Qingfu Wen, Mo Li, "Pricing Data Tampering in Automated Fare Collection with NFC-Equipped Smartphones." IEEE Trans. Mob. Comput., 2019.

Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms

Joohyung Jeon, Junhui Kim, Joongheon Kim, Kwangsoo Kim, David Mohaisen, Jong{-}Kook Kim, "Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms." In the proceedings of 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN, Portland, OR, USA, Supplemental Volume, 2019.

RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing

Muhammad Saad, Afsah Anwar, Ashar Ahmad, Hisham Alasmary, Murat Yuksel, David Mohaisen, "RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing." In the proceedings of IEEE International Conference on Blockchain and Cryptocurrency, ICBC, Seoul, Korea (South), 2019.

Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table

RhongHo Jang, Seongkwang Moon, Youngtae Noh, David Mohaisen, DaeHun Nyang, "Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table." CoRR, 2019.

Secure and transparent audit logs with emphBlockAudit

Ashar Ahmad, Muhammad Saad, David Mohaisen, "Secure and transparent audit logs with emphBlockAudit." J. Netw. Comput. Appl., 2019.

Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems

Ahmed Abusnaina, Hisham Alasmary, Mohammed Abuhamad, Saeed Salem, DaeHun Nyang, David Mohaisen, "Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems." In the proceedings of Computational Data and Social Networks - 8th International Conference, CSoNet, Ho Chi Minh City, Vietnam, 2019.

Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT

Jeffrey Spaulding, Jeman Park, Joongheon Kim, DaeHun Nyang, David Mohaisen, "Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT." Trans. Emerg. Telecommun. Technol., 2019.

Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service

Jeman Park, Jinchun Choi, DaeHun Nyang, David Mohaisen, "Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service." IEEE Trans. Netw. Serv. Manag., 2019.

Two-Stage IoT Device Scheduling With Dynamic Programming for Energy Internet Systems

Laihyuk Park, Chunghyun Lee, Joongheon Kim, David Mohaisen, Sungrae Cho, "Two-Stage IoT Device Scheduling With Dynamic Programming for Energy Internet Systems." IEEE Internet Things J., 2019.

Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers

Jeman Park, Aminollah Khormali, Manar Mohaisen, David Mohaisen, "Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers." In the proceedings of 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN, Portland, OR, USA, 2019.

XLF: A Cross-layer Framework to Secure the Internet of Things (IoT)

An Wang, David Mohaisen, Songqing Chen, "XLF: A Cross-layer Framework to Secure the Internet of Things (IoT)." In the proceedings of 39th IEEE International Conference on Distributed Computing Systems, ICDCS, Dallas, TX, USA, 2019.

A Data-Driven Study of DDoS Attacks and Their Dynamics

An Wang, Wentao Chang, Songqing Chen, David Mohaisen, "A Data-Driven Study of DDoS Attacks and Their Dynamics." IEEE Trans. Dependable Secur. Comput., 2020.

AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors

Mohammed Abuhamad, Tamer AbuHmed, David Mohaisen, DaeHun Nyang, "AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors." IEEE Internet Things J., 2020.

An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments

Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, Anho Lee, DaeHun Nyang, David Mohaisen, "An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments." In the proceedings of Computational Data and Social Networks - 9th International Conference, CSoNet, Dallas, TX, USA, 2020.

Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions

Jeman Park, Manar Mohaisen, DaeHun Nyang, David Mohaisen, "Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions." Comput. Networks, 2020.

Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference

Rhongho Jang, Jeonil Kang, David Mohaisen, DaeHun Nyang, "Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference." IEEE Trans. Mob. Comput., 2020.

Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses

Afsah Anwar, Ahmed Abusnaina, Songqing Chen, Frank Li, David Mohaisen, "Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses." CoRR, 2020.

Contra-*: Mechanisms for Countering Spam Attacks on Blockchain Memory Pools

Muhammad Saad, Joongheon Kim, DaeHun Nyang, David Mohaisen, "Contra-*: Mechanisms for Countering Spam Attacks on Blockchain Memory Pools." CoRR, 2020.

DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting

Ahmed Abusnaina, Rhongho Jang, Aminollah Khormali, DaeHun Nyang, David Mohaisen, "DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting." In the proceedings of 39th IEEE Conference on Computer Communications, INFOCOM, Toronto, ON, Canada, 2020.

Editorial

David Mohaisen, Sencun Zhu, "Editorial." EAI Endorsed Trans. Security Safety, 2020.

Exploring the Attack Surface of Blockchain: A Comprehensive Survey

Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang, David Mohaisen, "Exploring the Attack Surface of Blockchain: A Comprehensive Survey." IEEE Commun. Surv. Tutorials, 2020.

From Blue-Sky to Practical Adversarial Learning

Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, David Mohaisen, "From Blue-Sky to Practical Adversarial Learning." In the proceedings of Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA, Atlanta, GA, USA, 2020.

Generating Adversarial Examples with an Optimized Quality

Aminollah Khormali, DaeHun Nyang, David Mohaisen, "Generating Adversarial Examples with an Optimized Quality." CoRR, 2020.

Hiding in Plain Sight: A Measurement and Analysis of Kids' Exposure to Malicious URLs on YouTube

Sultan Alshamrani, Ahmed Abusnaina, David Mohaisen, "Hiding in Plain Sight: A Measurement and Analysis of Kids' Exposure to Malicious URLs on YouTube." CoRR, 2020.

Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks

Ahmed Abusnaina, Mohammed Abuhamad, DaeHun Nyang, Songqing Chen, An Wang, David Mohaisen, "Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks." In the proceedings of Information Security Applications - 21st International Conference, WISA, Jeju Island, South Korea, Revised Selected Papers, 2020.

Investigating Online Toxicity in Users Interactions with the Mainstream Media Channels on YouTube

Sultan Alshamrani, Mohammed Abuhamad, Ahmed Abusnaina, David Mohaisen, "Investigating Online Toxicity in Users Interactions with the Mainstream Media Channels on YouTube." In the proceedings of Proceedings of the CIKM 2020 Workshops co-located with 29th ACM International Conference on Information and Knowledge Management (CIKM), Galway, Ireland, 2020.

Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation

David Mohaisen, Zhongshu Gu, Kui Ren, Zhenhua Li, Charles Kamhoua, Laurent Njilla, DaeHun Nyang, "Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation." IEEE Trans. Dependable Secur. Comput., 2020.

Measuring the Cost of Software Vulnerabilities

Afsah Anwar, Aminollah Khormali, Jinchun Choi, Hisham Alasmary, Saeed Salem, DaeHun Nyang, David Mohaisen, "Measuring the Cost of Software Vulnerabilities." EAI Endorsed Trans. Security Safety, 2020.

Multi-(chi): Identifying Multiple Authors from Source Code Files

Mohammed Abuhamad, Tamer AbuHmed, DaeHun Nyang, David Mohaisen, "Multi-(chi): Identifying Multiple Authors from Source Code Files." Proc. Priv. Enhancing Technol., 2020.

Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms

Joohyung Jeon, Junhui Kim, Joongheon Kim, Kwangsoo Kim, David Mohaisen, Jong{-}Kook Kim, "Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms." CoRR, 2020.

Reinforced Edge Selection using Deep Learning for Robust Surveillance in Unmanned Aerial Vehicles

SooHyun Park, Jeman Park, David Mohaisen, Joongheon Kim, "Reinforced Edge Selection using Deep Learning for Robust Surveillance in Unmanned Aerial Vehicles." CoRR, 2020.

Self-adaptive power control with deep reinforcement learning for millimeter-wave Internet-of-vehicles video caching

Dohyun Kwon, Joongheon Kim, David Mohaisen, Wonjun Lee, "Self-adaptive power control with deep reinforcement learning for millimeter-wave Internet-of-vehicles video caching." J. Commun. Networks, 2020.

SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event

Rhongho Jang, DaeHong Min, Seongkwang Moon, David Mohaisen, DaeHun Nyang, "SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event." In the proceedings of 39th IEEE Conference on Computer Communications, INFOCOM, Toronto, ON, Canada, 2020.

Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers

Hisham Alasmary, Ahmed Abusnaina, Rhongho Jang, Mohammed Abuhamad, Afsah Anwar, DaeHun Nyang, David Mohaisen, "Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers." In the proceedings of 40th IEEE International Conference on Distributed Computing Systems, ICDCS, Singapore, 2020.

Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection

Afsah Anwar, Hisham Alasmary, Jeman Park, An Wang, Songqing Chen, David Mohaisen, "Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection." In the proceedings of Information and Communications Security - 22nd International Conference, ICICS, Copenhagen, Denmark, 2020.

Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions

Muhammad Saad, Jinchun Choi, DaeHun Nyang, Joongheon Kim, David Mohaisen, "Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions." IEEE Syst. J., 2020.

Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications

{\"{U}}lk{\"{u}} Meteriz, Necip Yildiran, Joongheon Kim, David Mohaisen, "Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications." In the proceedings of 40th IEEE International Conference on Distributed Computing Systems, ICDCS, Singapore, 2020.

Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet

Jinchun Choi, Mohammed Abuhamad, Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Jeman Park, Daehun Nyang, David Mohaisen, "Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet." IEEE Access, 2020.

A network-independent tool-based usable authentication system for Internet of Things devices

Changhun Jung, Jinchun Choi, Rhongho Jang, David Mohaisen, DaeHun Nyang, "A network-independent tool-based usable authentication system for Internet of Things devices." Comput. Secur., 2021.

Adversarial Example Detection Using Latent Neighborhood Graph

Ahmed Abusnaina, Yuhang Wu, Sunpreet Arora, Yizhen Wang, Fei Wang, Hao Yang, David Mohaisen, "Adversarial Example Detection Using Latent Neighborhood Graph." In the proceedings of 2021 IEEE/CVF International Conference on Computer Vision, ICCV, Montreal, QC, Canada, 2021.

Automated Privacy Policy Annotation with Information Highlighting Made Practical Using Deep Representations

Abdulrahman Alabduljabbar, Ahmed Abusnaina, Ulku Meteriz-Yildiran, David Mohaisen, "Automated Privacy Policy Annotation with Information Highlighting Made Practical Using Deep Representations." In the proceedings of CCS: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, 2021.

Bitcoin Price Forecasting via Ensemble-based LSTM Deep Learning Networks

Myungjae Shin, David Mohaisen, Joongheon Kim, "Bitcoin Price Forecasting via Ensemble-based LSTM Deep Learning Networks." In the proceedings of International Conference on Information Networking, ICOIN, Jeju Island, South Korea, 2021.

Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses

Afsah Anwar, Ahmed Abusnaina, Songqing Chen, Frank Li, David Mohaisen, "Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses." In the proceedings of 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN, Taipei, Taiwan, Supplemental Volume, 2021.

Contra-(_ast): Mechanisms for countering spam attacks on blockchain's memory pools

Muhammad Saad, Joongheon Kim, DaeHun Nyang, David Mohaisen, "Contra-(_ast): Mechanisms for countering spam attacks on blockchain's memory pools." J. Netw. Comput. Appl., 2021.

Count-Less: A Counting Sketch for the Data Plane of High Speed Switches

Sunyoung Kim, Changhun Jung, RhongHo Jang, David Mohaisen, DaeHun Nyang, "Count-Less: A Counting Sketch for the Data Plane of High Speed Switches." CoRR, 2021.

Domain name system security and privacy: A contemporary survey

Aminollah Khormali, Jeman Park, Hisham Alasmary, Afsah Anwar, Muhammad Saad, David Mohaisen, "Domain name system security and privacy: A contemporary survey." Comput. Networks, 2021.

Empirically comparing the performance of blockchain's consensus algorithms

Ashar Ahmad, Abdulrahman Alabduljabbar, Muhammad Saad, Daehun Nyang, Joongheon Kim, David Mohaisen, "Empirically comparing the performance of blockchain's consensus algorithms." IET Blockchain, 2021.

Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube

Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, Daehun Nyang, David Mohaisen, "Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube." CoRR, 2021.

Large-scale and Robust Code Authorship Identification with Deep Feature Learning

Mohammed Abuhamad, Tamer AbuHmed, David Mohaisen, Daehun Nyang, "Large-scale and Robust Code Authorship Identification with Deep Feature Learning." ACM Trans. Priv. Secur., 2021.

ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation

Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, Daehun Nyang, David Mohaisen, "ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation." CoRR, 2021.

Measuring Healthcare Data Breaches

Mohammed Alkinoon, Sung Choi, David Mohaisen, "Measuring Healthcare Data Breaches." In the proceedings of Information Security Applications - 22nd International Conference, WISA, Jeju Island, South Korea, Revised Selected Papers, 2021.

Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems

Ashar Ahmad, Muhammad Saad, Joongheon Kim, DaeHun Nyang, David Mohaisen, "Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems." In the proceedings of International Conference on Information Networking, ICOIN, Jeju Island, South Korea, 2021.

ProMT: optimizing integrity tree updates for write-intensive pages in secure NVMs

Mazen Al{-}Wadi, David Mohaisen, Amro Awad, "ProMT: optimizing integrity tree updates for write-intensive pages in secure NVMs." In the proceedings of ICS: 2021 International Conference on Supercomputing, Virtual Event, USA, 2021.

Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality

Muhammad Saad, Afsah Anwar, Srivatsan Ravi, David Mohaisen, "Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality." In the proceedings of CCS: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, 2021.

Root Cause Analyses for the Deteriorating Bitcoin Network Synchronization

Muhammad Saad, Songqing Chen, David Mohaisen, "Root Cause Analyses for the Deteriorating Bitcoin Network Synchronization." In the proceedings of 41st IEEE International Conference on Distributed Computing Systems, ICDCS 2021, Washington DC, USA, 2021.

SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals

Ulku Meteriz-Yildiran, Necip Yildiran, David Mohaisen, "SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals." In the proceedings of WPES: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, Virtual Event, Korea, 2021.

SSD-Assisted Ransomware Detection and Data Recovery Techniques

SungHa Baek, Youngdon Jung, David Mohaisen, Sungjin Lee, DaeHun Nyang, "SSD-Assisted Ransomware Detection and Data Recovery Techniques." IEEE Trans. Computers, 2021.

Security Breaches in the Healthcare Domain: A Spatiotemporal Analysis

Mohammed Alkinoon, Marwan Omar, Manar Mohaisen, David Mohaisen, "Security Breaches in the Healthcare Domain: A Spatiotemporal Analysis." In the proceedings of Computational Data and Social Networks - 10th International Conference, CSoNet, Virtual Event, 2021.

Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey

Mohammed Abuhamad, Ahmed Abusnaina, Daehun Nyang, David Mohaisen, "Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey." IEEE Internet Things J., 2021.

SyncAttack: Double-spending in Bitcoin Without Mining Power

Muhammad Saad, Songqing Chen, David Mohaisen, "SyncAttack: Double-spending in Bitcoin Without Mining Power." In the proceedings of CCS: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, 2021.

Systemically Evaluating the Robustness of ML-based IoT Malware Detectors

Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, Rhongho Jang, DaeHun Nyang, David Mohaisen, "Systemically Evaluating the Robustness of ML-based IoT Malware Detectors." In the proceedings of 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2021, Taipei, Taiwan, Supplemental Volume, 2021 (BEST EXTENDED ABSTRACT).

TLDR: Deep Learning-Based Automated Privacy Policy Annotation with Key Policy Highlights

Abdulrahman Alabduljabbar, Ahmed Abusnaina, {\"{U}}lk{\"{u}} Meteriz{-}Yildiran, David Mohaisen, "TLDR: Deep Learning-Based Automated Privacy Policy Annotation with Key Policy Highlights." In the proceedings of WPES: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, Virtual Event, Korea, 2021.

Towards Low-Cost Mechanisms to Enable Restoration of Encrypted Non-Volatile Memories

Mao Ye, Kazi Zubair, David Mohaisen, Amro Awad, "Towards Low-Cost Mechanisms to Enable Restoration of Encrypted Non-Volatile Memories." IEEE Trans. Dependable Secur. Comput., 2021.

Towards Semantically-Rich Spatial Network Representation Learning via Automated Feature Topic Pairing

Dongjie Wang, Kunpeng Liu, David Mohaisen, Pengyang Wang, Chang{-}Tien Lu, Yanjie Fu, "Towards Semantically-Rich Spatial Network Representation Learning via Automated Feature Topic Pairing." Frontiers Big Data, 2021.

Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts

Afsah Anwar, Jinchun Choi, Abdulrahman Alabduljabbar, Hisham Alasmary, Jeffrey Spaulding, An Wang, Songqing Chen, DaeHun Nyang, Amro Awad, David Mohaisen, "Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts." CoRR, 2021.

A Scalable and Dynamic ACL System for In-Network Defense

Changhun Jung, Sian Kim, Rhongho Jang, David Mohaisen, DaeHun Nyang, "A Scalable and Dynamic ACL System for In-Network Defense." In the proceedings of Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS, Los Angeles, CA, USA, 2022.

AcousticType: Smartwatch-Enabled Cross-Device Text Entry Method Using Keyboard Acoustics

Ulku Meteriz-Yidiran, Necip Yildiran, David Mohaisen, "AcousticType: Smartwatch-Enabled Cross-Device Text Entry Method Using Keyboard Acoustics." In the proceedings of CHI: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, Extended Abstracts, 2022.

AiRType: An Air-tapping Keyboard for Augmented Reality Environments

Necip Yildiran, {\"{U}}lk{\"{u}} Meteriz{-}Yildiran, David Mohaisen, "AiRType: An Air-tapping Keyboard for Augmented Reality Environments." In the proceedings of 2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, VR Workshops, Christchurch, New Zealand, 2022.

AutoDefense: Reinforcement Learning Based Autoreactive Defense Against Network Attacks

Yu Mi, David Mohaisen, An Wang, "AutoDefense: Reinforcement Learning Based Autoreactive Defense Against Network Attacks." In the proceedings of 10th IEEE Conference on Communications and Network Security, CNS, Austin, TX, USA, 2022.

Do Content Management Systems Impact the Security of Free Content Websites?

Mohamed Alqadhi, Abdulrahman Alabduljabbar, Kyle Thomas, Saeed Salem, DaeHun Nyang, David Mohaisen, "Do Content Management Systems Impact the Security of Free Content Websites?." In the proceedings of 11th International Conference Computational Data and Social Networks, CSoNet, Virtual Event, 2022.

Enriching Vulnerability Reports Through Automated and Augmented Description Summarization

Hattan Althebeiti, David Mohaisen, "Enriching Vulnerability Reports Through Automated and Augmented Description Summarization." WISA, 2022.

Filesystem Encryption or Direct-Access for NVM Filesystems? Let's Have Both!

Kazi Zubair, David Mohaisen, Amro Awad, "Filesystem Encryption or Direct-Access for NVM Filesystems? Let's Have Both!." In the proceedings of IEEE International Symposium on High-Performance Computer Architecture, HPCA 2022, Seoul, South Korea, 2022.

Hierarchical Reinforcement Learning using Gaussian Random Trajectory Generation in Autonomous Furniture Assembly

Won Yun, David Mohaisen, Soyi Jung, Jong-Kook Kim, Joongheon Kim, "Hierarchical Reinforcement Learning using Gaussian Random Trajectory Generation in Autonomous Furniture Assembly." In the proceedings of Proceedings of the 31st ACM International Conference on Information & Knowledge Management (CIKM), Atlanta, GA, USA, 2022.

Making Adversarially-Trained Language Models Forget with Model Retraining: A Case Study on Hate Speech Detection

Marwan Omar, David Mohaisen, "Making Adversarially-Trained Language Models Forget with Model Retraining: A Case Study on Hate Speech Detection." In the proceedings of Companion of The Web Conference 2022, Virtual Event / Lyon, France, 2022.

Measuring Cryptocurrency Mining in Public Cloud Services: A Security Perspective

Ayodeji Adeniran, David Mohaisen, "Measuring Cryptocurrency Mining in Public Cloud Services: A Security Perspective." In Proceedings of the 11th International Conference of Computational Data and Social Networks, CSoNet, Virtual Event, 2022.

Measuring the Privacy Dimension of Free Content Websites through Automated Privacy Policy Analysis and Annotation

Abdulrahman Alabduljabbar, David Mohaisen, "Measuring the Privacy Dimension of Free Content Websites through Automated Privacy Policy Analysis and Annotation." In the proceedings of Companion of The Web Conference, Virtual Event / Lyon, France, 2022.

Miners in the Cloud: Measuring and Analyzing Cryptocurrency Mining in Public Clouds

Ayodeji Adeniran, David Mohaisen, "Miners in the Cloud: Measuring and Analyzing Cryptocurrency Mining in Public Clouds." CSoNet, 2022.

Minerva: Rethinking Secure Architectures for the Era of Fabric-Attached Memory Architectures

Mazen Al-Wadi, Rujia Wang, David Mohaisen, Clayton Hughes, Simon Hammond, Amro Awad, "Minerva: Rethinking Secure Architectures for the Era of Fabric-Attached Memory Architectures." In the proceedings of 2022 IEEE International Parallel and Distributed Processing Symposium, IPDPS, Lyon, France, 2022.

Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows

Dinhnguyen Dao, Rhongho Jang, Changhun Jung, David Mohaisen, DaeHun Nyang, "Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows." In the proceedings of 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN, Baltimore, MD, USA, 2022.

Quantifying the Performance of Adversarial Training on Language Models with Distribution Shifts

Marwan Omar, Soohyeon Choi, Daehun Nyang, David Mohaisen, "Quantifying the Performance of Adversarial Training on Language Models with Distribution Shifts." In Proceedings of the 1st Workshop on Cybersecurity and Social Sciences (CySSS@AsiaCCS), Nagasaki, Japan, 2022.

Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems

Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, DaeHun Nyang, David Mohaisen, Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems." In the proceedings of 25th International Symposium on Research in Attacks, Intrusions and Defenses, RAID, Limassol, Cyprus, 2022.

Understanding the Security of Free Content Websites by Analyzing their SSL Certificates: A Comparative Study

Abdulrahman Alabduljabbar, Runyu Ma, Soohyeon Choi, Rhongho Jang, Songqing Chen, David Mohaisen, "Understanding the Security of Free Content Websites by Analyzing their SSL Certificates: A Comparative Study". In Proceedings of the 1st Workshop on Cybersecurity and Social Sciences (CySSS@AsiaCCS), Nagasaki, 2022.

A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments

Ulku Meteriz-Yildiran, Necip Yildiran, Amro Awad, David Mohaisen, "A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments." In the proceedings of IEEE Conference on Virtual Reality and 3D User Interfaces, VR, Christchurch, New Zealand, 2022.

A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet

Jeman Park, Rhongho Jang, Manar Mohaisen, David Mohaisen, "A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet." IEEE/ACM Trans. Netw., 2022.

A One-Page Text Entry Method Optimized for Rectangle Smartwatches

Rhongho Jang, Changhun Jung, David Mohaisen, KyungHee Lee, DaeHun Nyang, "A One-Page Text Entry Method Optimized for Rectangle Smartwatches." IEEE Trans. Mob. Comput., 2022.

BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails

Ashar Ahmad, Muhammad Saad, Mohammed AlGhamdi, DaeHun Nyang, David Mohaisen, "BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails." IEEE Syst. J., 2022.

Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses

Afsah Anwar, Ahmed Abusnaina, Songqing Chen, Frank Li, David Mohaisen, "Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses." IEEE Trans. Dependable Secur. Comput., 2022.

Cooperative Multiagent Deep Reinforcement Learning for Reliable Surveillance via Autonomous Multi-UAV Control

Won Yun, Soohyun Park, Joongheon Kim, Myungjae Shin, Soyi Jung, David Mohaisen, Jae{-}Hyun Kim, "Cooperative Multiagent Deep Reinforcement Learning for Reliable Surveillance via Autonomous Multi-UAV Control." IEEE Trans. Ind. Informatics, 2022.

DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification

Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen, "DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification." IEEE Trans. Dependable Secur. Comput., 2022.

Exploring Partitioning Attacks on the Bitcoin Network

Muhammad Saad, Victor Cook, Lan Nguyen, My Thai, David Mohaisen, "Exploring Partitioning Attacks on the Bitcoin Network." IEEE/ACM Trans. Netw., 2022.

GraphShield: Dynamic Large Graphs for Secure Queries With Forward Privacy

Minxin Du, Shuangke Wu, Qian Wang, Dian Chen, Peipei Jiang, David Mohaisen, "GraphShield: Dynamic Large Graphs for Secure Queries With Forward Privacy." IEEE Trans. Knowl. Data Eng., 2022.

Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches

Jumabek Alikhanov, Rhongho Jang, Mohammed Abuhamad, David Mohaisen, Daehun Nyang, Youngtae Noh, "Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches." IEEE Access, 2022.

Learning Location from Shared Elevation Profiles in Fitness Apps: A Privacy Perspective

Ulku Meteriz-Yildiran, Necip Yildiran, Joongheon Kim, David Mohaisen, "Learning Location from Shared Elevation Profiles in Fitness Apps: A Privacy Perspective." IEEE TMC, 2022.

Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM

Mazen Al-Wadi, Kazi Zubair, David Mohaisen, Amro Awad, "Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM." IEEE Trans. Dependable Secur. Comput., 2022.

ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation

Hisham Alasmary, Afsah Anwar, Ahmed Abusnaina, Abdulrahman Alabduljabbar, Mohammed Abuhamad, An Wang, Daehun Nyang, Amro Awad, David Mohaisen, "ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation." IEEE Internet Things J., 2022.

Understanding Internet of Things malware by analyzing endpoints in their static artifacts

Jinchun Choi, Afsah Anwar, Abdulrahman Alabduljabbar, Hisham Alasmary, Jeffrey Spaulding, An Wang, Songqing Chen, DaeHun Nyang, Amro Awad, David Mohaisen, "Understanding Internet of Things malware by analyzing endpoints in their static artifacts". Comput. Networks, 2022.

WBC image classification and generative models based on convolutional neural network

Changhun Jung, Mohammed Abuhamad, David Mohaisen, Kyungja Han, DaeHun Nyang, "WBC image classification and generative models based on convolutional neural network." BMC Medical Imaging, 2022.

RouteChain: Towards Blockchain-based secure and efficient BGP routing

Muhammad Saad, Afsah Anwar, Ashar Ahmad, Hisham Alasmary, Murat Yuksel, David Mohaisen, "RouteChain: Towards Blockchain-based secure and efficient BGP routing". Comput. Networks, 2022.

Cooperative Multi-Agent Deep Reinforcement Learning for Reliable Surveillance via Autonomous Multi-UAV Control

Won Yun, Soohyun Park, Joongheon Kim, Myungjae Shin, Soyi Jung, David Mohaisen, Jae{-}Hyun Kim, "Cooperative Multi-Agent Deep Reinforcement Learning for Reliable Surveillance via Autonomous Multi-UAV Control." CoRR, 2022.

FAT-PIM: Low-Cost Error Detection for Processing-In-Memory

Kazi Zubair, Sumit Jha, David Mohaisen, Clayton Hughes, Amro Awad, "FAT-PIM: Low-Cost Error Detection for Processing-In-Memory." CoRR, 2022.

Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions

Marwan Omar, Soohyeon Choi, DaeHun Nyang, David Mohaisen, "Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions." CoRR, 2022.

Self-Configurable Stabilized Real-Time Detection Learning for Autonomous Driving Applications

Won Yun, Soohyun Park, Joongheon Kim, David Mohaisen, "Self-Configurable Stabilized Real-Time Detection Learning for Autonomous Driving Applications." CoRR, 2022.

A Robust Counting Sketch for Data Plane Intrusion Detection

Sian Kim, Changhun Jung, RhongHo Jang, David Mohaisen, DaeHun Nyang, "A Robust Counting Sketch for Data Plane Intrusion Detection" In the proceedings of 30th Annual Network and Distributed System Security Symposium, NDSS, San Diego, California, USA, 2023.

Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks

Muhammad Saad and David Mohaisen, "Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks," IEEE Symposium on Security and Privacy (SP) 2023.

Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study

Mohammed Alkinoon, Abdulrahman Alabduljabbar, Hattan Althebeiti, Rhongho Jang, DaeHun Nyang, David Mohaisen, "Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study". The 32nd International Conference on Computer Communications and Networks, ICCCN, Honolulu, HI, USA, 2023.

Improving the Social Connectivity in Engineering Educational Networks and Implications

Manar Mohaisen, David Mohaisen, "Improving the Social Connectivity in Engineering Educational Networks and Implications." IEEE Trans. Educ., 2023.

Self-Configurable Stabilized Real-Time Detection Learning for Autonomous Driving Applications

Won Yun, Soohyun Park, Joongheon Kim, David Mohaisen, "Self-Configurable Stabilized Real-Time Detection Learning for Autonomous Driving Applications." IEEE Trans. Intell. Transp. Syst., 2023.

Truthful and performance-optimal computation outsourcing for aerial surveillance platforms via learning-based auction

Soyi Jung, Jae-Hyun Kim, David Mohaisen, Joongheon Kim, "Truthful and performance-optimal computation outsourcing for aerial surveillance platforms via learning-based auction." Comput. Networks, 2023.

Exploration of Bitflip’s Effect on DNN Accuracy in Plaintext and Ciphertext

Kyle Thomas, Muhammad Santriaji, David Mohaisen and Yan Solihin, "Exploration of Bitflip’s Effect on DNN Accuracy in Plaintext and Ciphertext," in IEEE Micro Magazine, 2023.

RC-NVM: Recovery-Aware Reliability-Security Co-Design for Non-Volatile Memories

Kazi Abu Zubair, Rahaf Abdullah, David Mohaisen, and Amro Awad "RC-NVM: Recovery-Aware Reliability-Security Co-Design for Non-Volatile Memories," in IEEE Transactions on Dependable and Secure Computing, 2023.

Analyzing In-browser Cryptojacking

Muhammad Saad, David Mohaisen, "Analyzing In-browser Cryptojacking." CoRR, 2023.

Measuring and Modeling the Free Content Web

Abdulrahman Alabduljabbar, Runyu Ma, Ahmed Abusnaina, Rhongho Jang, Songqing Chen, DaeHun Nyang, David Mohaisen, "Measuring and Modeling the Free Content Web." CoRR, 2023.

SHIELD: Thwarting Code Authorship Attribution

Mohammed Abuhamad, Changhun Jung, David Mohaisen, DaeHun Nyang, "SHIELD: Thwarting Code Authorship Attribution." CoRR, 2023.

talks

teaching

CAP 5150: Foundations of Computer Security and Privacy

Graduate course, University of Central Florida, Department of Computer Science, 2023

Developed and offered as part of the M.Sc. in Computer Security, covering foundations of applied cryptography and computer security. The course focuses on the rigor required for reasoning about properties of modern cryptographic protocols and primitives, and combines a lecture-based and a project-based approaches on modern cryptography and computer security. Topics covered include computational cryptography and security, pseudorandomness, CPA-security, CCA-security, message authentication codes and hash functions, pseudorandom permutations, cryptoanalysis, public key cryptography, public key encryption, and digital signatures. The second part of the course is focused on applied computer security, including transport security, network attacks and defenses, application security (bugs, shellcodes, viruses, spyware), web security (cookies, tracking, XSS, SQL injection, and defenses), advanced threats (including cyber warfare and APTs), and privacy enhancing technologies (TOR, OTR, GPG, anticensorship, social networks and privacy).

CAP 6133: Advanced Topics in Computer Security and Computer Forensic

Graduate course, University of Central Florida, Department of Computer Science, 2023

This course tracks advances in computer security and forensics in the recent years. Topics included cover a range of emerging threats, attacks, and defenses. Topical scope of this includes malware, botnets, smartphone security, transport security, security economics, social networks security, and web security. A substantial part of the course is a semester-long project on one of the topics taught in the course.

CAP 6640: Computer Understanding of Natural Language

Graduate course, University of Central Florida, Department of Computer Science, 2023

This is an advanced course of natural language processing, and covers recent advances on the subject, including the following: introduction to word vectors, word vectors and word senses, backpropagation, neural networks, linguistic structures and dependency parsing, recurrent neural networks for language models, vanishing gradient and fancy RNNs, machine translation, seq2seq, and attention mechanisms, CNNs for NLP, subword models, contextual representation and pretraininng, neural natural language generation, coreference resolution, multi-task learning, safety, bias, fairness, and ethics.

CIS 4361: Secure Operating Systems and Administration

Undergraduate course, University of Central Florida, Department of Computer Science, 2023

This is an undergraduate course of operating system security, mainly focusing on the Linux Operating System, and will cover the following: running linux in virtual environment, securing user accounts, securing servers using firewalls (including a dive into iptables and nftables), encrypting and ssh hardening (including key management), and access control. We will cover those aspects of operating system securtiy in both Ubuntu and CentOS. Some knowledge of operating systems is required for this course.

CIS 4615: Secure Software Development and Assurance

Undergraduate course, University of Central Florida, Department of Computer Science, 2023

The course covers software security, terms, and definitions, including threat modeling, secure software development lifecycle and touchpoints, risk management frameworks, and their incorporation into the secure software development lifecycle, common criteria and why they are needed, common bad software development practices and how to avoid them, and instances of bad practices that would result in actual threats due to buffer overflow, dangling pointers, memory leakage, etc. As applications areas, the course will also cover software security for the web, networks, and cryptographic tools, associated attack vectors, and the corresponding secure software development practices associated with them.