Publications
- Exploration of Bitflip’s Effect on DNN Accuracy in Plaintext and Ciphertext K. Thomas, M. Santriaji, D. Mohaisen and Y. Solihin IEEE Micro Magazine, 2023
- Self-Configurable Stabilized Real-Time Detection Learning for Autonomous Driving Applications W. Yun, S. Park, J. Kim, D. Mohaisen IEEE Trans. Intell. Transp. Syst., 2023
- Improving the Social Connectivity in Engineering Educational Networks and Implications M. Mohaisen, D. Mohaisen IEEE Trans. Educ., 2023
- Learning Location from Shared Elevation Profiles in Fitness Apps: A Privacy Perspective U. Meteriz-Yildiran, N. Yildiran, J. Kim, D. Mohaisen IEEE Trans. Mob. Comput., 2023
- Truthful and performance-optimal computation outsourcing for aerial surveillance platforms via learning-based auction S. Jung, J.-H. Kim, D. Mohaisen, J. Kim Comput. Networks, 2023
- Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks M. Saad and D. Mohaisen IEEE S&P, 2023
- A Robust Counting Sketch for Data Plane Intrusion Detection S. Kim, C. Jung, R. Jang, D. Mohaisen, D. Nyang ISOC NDSS, San Diego, California, USA, 2023
- Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study M. Alkinoon, A. Alabduljabbar, H. Althebeiti, R. Jang, D. Nyang, D. Mohaisen IEEE ICCCN, Honolulu, HI, USA, 2023
- Understanding the Privacy Dimension of Wearables through Machine Learning-enabled Inferences D. Mohaisen ACM SNTA (Keynote), Orlando, 2023
- Analyzing In-browser Cryptojacking
M. Saad, D. Mohaisen
CoRR, 2023. - SHIELD: Thwarting Code Authorship Attribution
M. Abuhamad, C. Jung, D. Mohaisen, D. Nyang
CoRR, 2023. - Measuring and Modeling the Free Content Web
A. Alabduljabbar, R. Ma, A. Abusnaina, R. Jang, S. Chen, D. Nyang, M. Mohaisen
CoRR, 2023. - Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions M. Omar, S. Choi, D. Nyang, D. Mohaisen CoRR, 2022
- FAT-PIM: Low-Cost Error Detection for Processing-In-Memory K. Zubair, S. Jha, D. Mohaisen, C. Hughes, A. Awad CoRR, 2022
- Cooperative Multi-Agent Deep Reinforcement Learning for Reliable Surveillance via Autonomous Multi-UAV Control W. Yun, S. Park, J. Kim, M. Shin, S. Jung, D. Mohaisen, J.-H. Kim CoRR, 2022
- RouteChain: Towards Blockchain-based secure and efficient BGP routing M. Saad, A. Anwar, A. Ahmad, H. Alasmary, M. Yuksel, D. Mohaisen Comput. Networks, 2022
- WBC image classification and generative models based on convolutional neural network C. Jung, M. Abuhamad, D. Mohaisen, K. Han, D. Nyang BMC Medical Imaging, 2022
- Understanding Internet of Things malware by analyzing endpoints in their static artifacts J. Choi, A. Anwar, A. Alabduljabbar, H. Alasmary, J. Spaulding, A. Wang, S. Chen, D. Nyang, A. Awad, D. Mohaisen Comput. Networks, 2022
- A Scalable and Dynamic ACL System for In-Network Defense
Changhun Jung, Sian Kim, Rhongho Jang, David Mohaisen, Daehun Nynang
ACM CCS 2022 - AutoDefense: Reinforcement Learning Based Autoreactive Defense Against Network Attacks
Yu Ma, David Mohaisen, An Wang
IEEE CNS 2022 - Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems
A. Abusnaina, A. Anwar, S. Alshamrani, A. Alabduljabbar, R. Jang, D. Nyang, D. Mohaisen
RAID 2022 - Hierarchical Reinforcement Learning using Gaussian Random Trajectory Generation
Won Joon Yun, David Mohaisen, Soyi Jung, Jong-Kook Kim and Joongheon Kim
ACM CIKM 2022 - A Keylogging Inference Attack on Air-Tapping Keyboards
Ulku Meteriz, Necip Fazil Yildiran, Amro Awad, and David Mohaisen
IEEE VR 2022 - AiRType: An Air-Tapping Keyboard for Augmented Reality Environments
Ulku Meteriz, Necip Fazil Yildiran, and David Mohaisen
IEEE VR 2022 - AcousticType: Smartwatch-Enabled Cross-Device Text Entry Using Keyboard Acoustics (LBW)
Ulku Meteriz, Necip Fazil Yildiran, and David Mohaisen
ACM CHI 2022 - Filesystem Encryption or Direct-Access for NVM Filesystems? Let’s Have Both
Kazi Abu Zubair, David Mohaisen, Amro Awad
IEEE HPCA 2022 - Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows
Dinh Nguyen Dao, Rhongho Jang, Changhun Jung, David Mohaisen, DaeHun Nyang
IEEE DSN 2022 - Minerva: Rethinking Secure Architectures for Fabric-Attached Memory Architectures
Mazen Alwadi, Rujia Wang, David Mohaisen, Clayton Hughes, Simon Hammond and Amro Awad
IEEE IPDPS 2022 - Understanding the Security of Free Content Websites by Analyzing their SSL Certificates
A. Alabduljabbar, Runyu Ma, Soohyeon Choi, Rhongho Jang, Songqing Chen and David Mohaisen.
ACM CySSS 2022 - Quantifying the Performance of Adversarial Training on LMs with Distribution Shifts
Marwan Omar, Soohyeon Choi, Daehun Nyang and David Mohaisen
ACM CySSS 2022 - Measuring the Privacy Dimension of Free Content Websites
Abdulrahman Alabduljabbar and David Mohaisen
ACM SocialNLP 2022 - Making Adversarially-Trained Language Models Forget with Model Retraining
Marwan Omar and David Mohaisen
ACM SocialNLP 2022 - Enriching Vulnerability Reports Through Automated and Augmented Description Summarization
Hattan Althebeiti and David Mohaisen
WISA 2022 - Exploring Partitioning Attacks on the Bitcoin Network
Muhammad Saad, Victor Cook, Lan Nguyen, My T. Thai, and David Mohaisen
IEEE/ACM Transactions on Networking, 2022 - A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet
Jeman Park, Rhongho Jang, Manar Mohaisen, David Mohaisen
IEEE/ACM Transactions on Networking, 2022 - ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation
Hisham Alasmary, Afsah Anwar, et al.
IEEE Internet of Things Journal, 2022 - HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality
Muhammad Saad, Afsah Anwar, Srivatsan Ravi, David Mohaisen ACM CCS 2021 - SyncAttack: Double-spending in Bitcoin Without Mining Power
Muhammad Saad, Songqing Chen, David Mohaisen
ACM CCS 2021 - Adversarial Example Detection Using Latent Neighborhood Graph
Ahmed Abusnaina, Yuhang Wu, Sunpreet Arora, Yizhen Wang, Fei Wang, Hao Yang, David Mohaisen.
IEEE ICCV 2021 - ProMT: Optimizing Integrity Tree Updates for Write-Intensive Pages in Secure NVMs
Mazen Alwadi, David Mohaisen, Amro Awad
ACM ICS 2021 -- best student paper award nominee - Root Cause Analyses for the Deteriorating Bitcoin Network Synchronization
Muhammad Saad, Songqing Chen, David Mohaisen
IEEE ICDCS 2021 - TLDR: Deep Learning-Based Automated Privacy Policy Annotation with Key Policy Highlights
Abdulrahman Alabduljabbar, Ahmed Abusnaina, Ulku Meteriz, David Mohaisen
ACM WPES 2021 - SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals
Ulku Meteriz, Necip Fazil Yildiran, David Mohaisen
ACM WPES 2021 - Automated Feature-Topic Pairing: Aligning Semantic and Embedding Spaces in Spatial Representation Learning
Dongjie Wang, Kunpeng Liu, David Mohaisen, Pengyang Wang, Chang-Tien Lu, Yanjie Fu
ACM SIGSPATIAL 2021 - Extended Abstract: Systemically Evaluating the Robustness of ML-based IoT Malware Detectors
Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, A. Alabduljabbar, Rhongho Jang, David Mohaisen
IEEE/IFIP DSN 2021 -- best extended abstract award - Extended Abstract: Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses
Afsah Anwar, Ahmed Abusnaina, Songqing Chen, Frank Li, David Mohaisen
IEEE/IFIP DSN 2021 - Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, Daehun Nyang, David Mohaisen
SocialNLP 2021 - Measuring Healthcare Data Breaches
Mohammed Alkinoon, Sung J. Choi, David Mohaisen
WISA 2021 - SSD-assisted Ransomware Detection and Data Recovery Techniques.
Sungha Baek, Youngdon Jung, David Mohaisen, Sungjin Lee and Daehun Nyang:
IEEE Transactions on Computers, 2021
Media Coverage: The Register, Tech Explore, Tech Radar, Nordic Hardware - Large-Scale and Robust Code Authorship Identification with Deep Feature Learning
Mohammed Abuhamad, Tamer Abuhamad, David Mohaisen, DaeHun Nyang
ACM Transactions on Privacy and Security (ACM TOPS), 2021 - e-PoS: Making Proof-of-Stake Decentralized and Fair
Muhammad Saad, Z Qin, K Ren, DaeHun Nyang, David Mohaisen
IEEE Transactions on Parallel and Distributed Systems, 2021 -
Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification
Ahmed Abusnaina et al.
IEEE Transactions on Dependable and Secure Computing, 2021 - A One-Page Text Entry Method Optimized for Rectangle Smartwatches
Rhongho Jang, Changhun Jung, David Mohaisen, K Lee, DaeHun Nyang
IEEE Transactions on Mobile Computing, 2021 - Domain name system security and privacy: A contemporary survey
A Khormali, J Park, H Alasmary, A Anwar, Muhammad Saad, David Mohaisen
Computer Networks, 2021 - Empirically comparing the performance of blockchain's consensus algorithms
A Ahmad, A Alabduljabbar, Muhammad Saad, DaeHun Nyang, J Kim, David Mohaisen
IET Blockchain, 2021 - Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey
M Abuhamad, A Abusnaina, DaeHun Nyang, David Mohaisen
IEEE Internet of Things Journal, 2021 - Contra-*: Mechanisms for Countering Spam Attacks on Blockchain Memory Pools
Muhammad Saad, J Kim, DaeHun Nyang, David Mohaisen
Journal of Networks and Computer Applications, 2021 - A Network-independent Tool-based Usable Authentication System for Internet of Things Devices
Changhun Jung, Jinchun Choi, Rhongho Jang, David Mohaisen, DaeHun Nyang
Computers & Security, 2021 - BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails
Ashar Ahmed, Muhammad Saad, Mohammed Alghamdy, DaeHun Nyang, and David Mohaisen
IEEE Systems Journal, 2021 - SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event.
Rhongho Jang, Daehong Min, Seongkwang Moon, David Mohaisen, and DaeHun Nyang:
IEEE INFOCOM 2020 - DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting.
Ahmed Abusnaina, Rhongho Jang, Aminollah Khormali, DeaHun Nyang, and David Mohaisen:
IEEE INFOCOM 2020 - Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers.
H. Alasmary, A. Abusnaina, Rhongho Jang, M. Abuhamad, A. Anwar, DaeHun Nyang, and David Mohaisen:
IEEE ICDCS 2020 - Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications.
Ulku Meteriz, Necip Fazil Yıldıran, Joongheon Kim, and David Mohaisen:
IEEE ICDCS 2020 - Multi-χ: Identifying Multiple Authors from Source Code Files.
Mohammed Abuhamad, Tamer Abuhmed, DaeHun Nyang, and David Mohaisen:
PoPETS 2020 - Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection.
Afsah Anwar, Hisham Alasmary, Jeman Park, An Wang, Songqing Chen and David Mohaisen:
ICICS 2020. - From Blue-Sky to Practical Adversarial Learning
A Khormali, A Abusnaina, S Chen, DaeHun Nyang, David Mohaisen
IEEE TPS 2020 - Hiding in Plain Sight: A Measurement and Analysis of Kids' Exposure to Malicious URLs on YouTube
S Alshamrani, A Abusnaina, David Mohaisen HotWoT @ ACM SEC 2020 - Exploring the Attack Surface of Blockchain: A Systematic Overview.
Muhammad Saad, Jeffrey Spaulding, L. Njilla, C. A. Kamhoua, S. Shetty, DaeHun Nyang, David Mohaisen:
IEEE Communication Surveys and Tutorials, 2020 - Towards Characterizing Blockchain-based Cryptocurrencies for Highly-Accurate Predictions
Muhammad Saad, J. Choi, J. Kim, DaeHun Nyang, David Mohaisen:
IEEE Systems Journal, 2020 -- Best Paper Award - AUToSen: Deep Learning-based Implicit Continuous Authentication Using Smartphone Sensors
Mohammed Abuhamad, Tamer Abuhmed, David Mohaisen, and DaeHun Nyang
IEEE Internet of Things Journal, 2020 - Power Control with Deep Reinforcement Learning for Millimeter-Wave Internet-of-Vehicles Video Caching
Dohyun Kwon, Joongheon Kim, David Mohaisen, and Wonjun Lee.
Journal of Communications and Networks, 2020 - Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM
M Alwadi, K Zubair, David Mohaisen, A Awad IEEE Transactions on Dependable and Secure Computing, 2020 - Insights into Attacks’ Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks
A Abusnaina, M Abuhamad, DaeHun Nyang, S Chen, A Wang, David Mohaisen
WISA 2020 - Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking
Muhammad Saad, Aminollah Khormali, David Mohaisen
eCrime 2019
-
W-Net: A CNN-based Architecture for White Blood Cells Image Classification
Changhun Jung, Jumabek Alikhanov, Mohammed Abuhamad, David Mohaisen, Kyungja Han, DaeHun Nyang AAAI Symposium on AI for Social Good 2019
-
Honor Among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets
Jinchun Choi, Ahmed Abusnaina, Afsah Anwar, An Wang, Songqing Chen, Daehun Nyang and David Mohaisen
IEEE DSC 2019
-
Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks
Ahmed Abusnaina, Aminollah Khormali, Daehun Nyang, Murat Yuksel and David Mohaisen IEEE DSC 2019 -- Best Paper Award -- Runner Up -
Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems.
A. Abusnaina, A. Khormali, H. Alasmary, J. Park, A. Anwar and David Mohaisen.
IEEE ICDCS 2019 -
InstaMeasure: Instant Per-flow Detection UsingLarge In-DRAM Working Set of Active Flows.
Rhongho Jang, S. Moon, Y. Noh, David Mohaisen and DaeHun Nyang.
IEEE ICDCS 2019 -
Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network.
-
XLF: A Cross-layer Framework to Secure the Internet of Things (IoT).
An Wang, David Mohaisen and Songqing Chen.
IEEE ICDCS 2019 -
Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers.
J. Park, A. Khormali, M. Mohaisen, David Mohaisen.
IEEE DSN 2019 -
Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms
J. Jeon, J. Kim, J. Kim, K. Kim, David Mohaisen, J. Kim.
IEEE DSN 2019 -
Mempool Optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems.
Muhammad Saad, L. Njilla, C. Kamhoua, J. Kim, DaeHun Nyang, and David Mohaisen:
IEEE ICBC 2019 -
RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing.
Muhammad Saad, A. Anwar, A. Ahmad, H. Alasmary, M. Yukesl, and David Mohaisen.
IEEE ICBC 2019 -
BlockTrail: A Scalable Multichain Solution for Blockchain-based Audit Trails.
A. Ahmad, Muhammad Saad, L. Njilla, C. Kamhoua, M. Bassiouni, and David Mohaisen:
IEEE ICC 2019 -
Countering Selfish Mining in Blockchains
Muhammad Saad, L. Njilla, C. Kamhoua, and David Mohaisen
ICNC 2019 -
Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference
Rhongho Jang, Jeonil Kang, David Mohaisen, DaeHun Nyang.
IEEE Transactions on Mobile Computing, 2019 -
Two-Stage IoT Device Scheduling with Dynamic Programming for Energy Internet Systems
L. Park, C. Lee, J. Kim, David Mohaisen, and S. Cho IEEE Internet of Things Journal, 2019 -
Analyzing and Detecting Emerging Internet of Things Malware: A Graph-based Approach
H. Alasmary, A. Khormali, A. Anwar, J. Park, J. Choi, A. Abusnaina, A. Awad, DaeHun Nyang, David Mohaisen IEEE Internet of Things Journal, 2019 -
Personalized Online Live Video Streaming Using Softmax-Based Multinomial Classification
Kyeongseon Kim, Dohyun Kwon, Joongheon Kim, and David Mohaisen
Applied Science, 2019 -
Secure and Transparent Audit Logs with BlockAudit
Ashar Ahmed, Muhammad Saad, David Mohaisen.
Journal of Network and Computer Applications, 2019 -
Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service
Jeman Park, Jinchun Choi, DaeHun Nyang, and David Mohaisen.
IEEE Transactions on Network and Service Management, 2019 -
Towards Low-Cost Mechanisms to Enable Restoration of Encrypted Non-Volatile Memories
Mao Ye, Kazi Abu Zubair, David Mohaisen, and Amro Awad
IEEE Transactions on Dependable Computing, 2019 -
Poster: DL-CAIS: Deep Learning-based Code Authorship Identification System.
M. Abuhamad, T. Abuhmed, David Mohaisen and DaeHun Nyang:
NDSS 2019 -
Poster: Examining Adversarial Learning against Graph-based IoT Malware Detection Systems.
A. Abusnaina, A. Khormali, H. Alasmary, J. Park, A. Anwar, U. Meteriz and David Mohaisen.
NDSS 2019 -
Poster: Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table.
Rhongho Jang, S. Moon, Y. Noh, David Mohaisen and DaeHun Nyang.
NDSS 2019 -
Poster: Analyzing Endpoints in the Internet of Things Malware.
J. Choi, A. Anwar, H. Alasmary, Jeffrey Spaulding, DaeHun Nyang and David Mohaisen.
NDSS 2019 -
Poster: Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network.
Muhammad Saad, V. Cook, L. Nguyen, M. Thai and David Mohaisen.
NDSS 2019 -
Poster: Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach
H. Alasmary, A. Khormali, A. Anwar, J. Park, J. Choi, DaeHun Nyang and David Mohaisen.
NDSS 2019 -
A Privacy-Preserving Longevity Study of Tor's Hidden Services
Amirali Sanatinia, Jeman Park, Erik-Oliver Blass, David Mohaisen, Guevara Noubir: CoRR, 2019 -
COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, David Mohaisen:
CoRR, 2019 -
Large-Scale and Language-Oblivious Code Authorship Identification.
M. Abuhamed, T. Abuhamed, David Mohaisen, DaeHun Nyang:
ACM CCS 2018 -
ABC: Enabling Smartphone Authentication with Built-in Camera.
Z. Ba, S. Piao, X. Fu, D. Koutsonikolas, David Mohaisen, Kui Ren:
ISOC NDSS 2018 -
SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery.
S. Baek, Y. Jung, David Mohaisen, S. Lee and DaeHun Nyang.
IEEE ICDCS 2018 -
ShmCaffe: A Distributed Deep Learning Platform with Shablack Memory.
S. Ahn, J. Kim, E. Lim, W. Choi, David Mohaisen and S. Kang.
IEEE ICDCS 2018 -
Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Pblackictions.
A. Anwar, A. Khormali, and David Mohaisen.
SecureComm 2018 -
QOI: Assessing Participation in Threat Information Sharing.
J. Park, H. Alasmary, O. Al-Ibrahim, C. Kamhoua, K. Kwiat, L. Njilla, David Mohaisen.
IEEE ICASSP 2018 -
DIGITALSEAL: A Transaction Authentication Tool for Online and Offline Transactions
Changhun Jung, Jeonil Kang, David Mohaisen, DaeHun Nyang.
IEEE ICASSP 2018 -
Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks.
J. Park, DaeHun Nyang, and David Mohaisen.
IEEE PST 2018 -
Graph-based Comparison of IoT and Android Malware
H. Alasmary, A. Anwar, J. Park, J. Choi, DaeHun Nyang, and David Mohaisen
CSoNet 2018 -
Towards Blockchain-Driven, Secure and Transparent Audit Logs
A. Ahmad, Muhammad Saad, M. Bassiouni, and David Mohaisen
ACM DLoT @ MobiQuitous 2018
Best Paper Award -
Neural Network Syntax Analyzer for Embedded Standardized Deep Learning
M. Shin, J. Kim, David Mohaisen, J. Park, K. Lee.
EMDL18 @ ACM MobiSys 2018. -
Proactive detection of command and control domains in internet of things‐scale botnets using DRIFT
Jeffrey Spaulding, J. Park, J. Kim, DaeHun Nyang, David Mohaisen
Transactions on Emerging Telecommunications Technologies, 2018 -
Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-aside Validation
David Mohaisen, Z. Gu, and Kui Ren, Z. Li, C. Kamhoua, L. Njilla, DaeHun Nyang
IEEE Transactions on Dependable and Secure Computing, 2018 -
A Data-Driven Study of DDoS Attacks and Their Dynamics
An Wang, Wentao Chang, Songqing Chen, and David Mohaisen
IEEE Transactions on Dependable and Secure Computing, 2018 -
Delving Into Internet DDoS Attacks by Botnets: Characterization and Analysis
An Wang, Wentao Chang, Songqing Chen, and David Mohaisen
IEEE/ACM Transactions on Networking, 2018 -
Android Malware Detection using Multi-Flows and API Patterns
F. Shen, J. Del Vecchio, David Mohaisen, Steven Ko and L. Ziarek
IEEE Transactions on Mobile Computing, 2018 -
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks
DaeHun Nyang, Huy Kang Kim, W. Lee, S. Kang, G. Cho, M. Lee, David Mohaisen
Elsevier Computers & Security, 2018 -
Network-based analysis and classification of malware using behavioral artifacts ordering
David Mohaisen, Omar Alrawi, J. Park, J. Kim, DaeHun Nyang, M. Mohaisen
ICST Transactions on Security Safety, 2018 -
Understanding Adversarial Strategies from Bot Recruitment to Scheduling
Wentao Chang, David Mohaisen, An Wang and Songqing Chen:
SECURECOMM 2017 -
Rethinking Information Sharing for Actionable Threat Intelligence
David Mohaisen, O. Al Ibrahim, C. Kamhoua, K. A. Kwiat, L. Njilla:
ACM/IEEE HotWeb 2017 -
Understanding the Effectiveness of Typosquatting Techniques
Jeffrey Spaulding, DaeHun Nyang, David Mohaisen:
ACM/IEEE HotWeb 2017 -
Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures
David Mohaisen, Kui Ren:
ACM/IEEE Transactions on Networking, 2018 -
You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones
Songqing Chen, S. Piao, C. Wang, Q. Wang, J. Weng, L. Su, Kui Ren, and David Mohaisen:
IEEE ICDCS 2017
--Best Paper Award -
An Adversary-Centric Behavior Modeling of DDoS Attacks.
An Wang, David Mohaisen and Songqing Chen:
IEEE ICDCS 2017 -
When Smart TV Meets CRN: Privacy-preserving Fine-grained Spectrum Access.
C. Guan, David Mohaisen, Z. Sun, F. Wei, L. Su, Kui Ren and Y. Yang:
IEEE ICDCS 2017 -
Android Malware Detection using Complex-Flows
F. Shen, J. Del Vecchio, David Mohaisen, Steven Ko and L. Ziarek:
IEEE ICDCS 2017 -
Privacy Implications of DNSSEC Look-aside Validation
David Mohaisen, Z. Gu and Kui Ren:
IEEE ICDCS 2017 -
Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n
Rhongho Jang, Jeonil Kang, David Mohaisen and DaeHun Nyang:
IEEE ICDCS 2017 -
You’ve Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques.
Jeffrey Spaulding, S. Upadhyaya and David Mohaisen:
IEEE ICDCS 2017 -
Large-scale Invisible Attack on AFC Systems with NFC-equipped Smartphones.
F. Dang, P. Zhou, Z. Li, E. Zhai, David Mohaisen, Q. Wen, and M. Li:
IEEE INFOCOM 2017 -
SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates.
Q. Wang, Kui Ren, M. Du, Q. Li, and David Mohaisen:
FC 2017 -
Crime Scene Reconstruction: Online Gold Farming Network Analysis
J. Woo and David Mohaisen and Yongdae Kim and Huy Kang Kim:
IEEE Transactions on Information Forensics and Security, 2017 -
You are a Game Bot!: Uncovering game bots in MMORPGs via self-similarity in the wild.
E. Lee, J. Woo, H. Kim, David Mohaisen, Huy Kang Kim:
ISOC NDSS 2016 -
The Landscape of Domain Name Typosquatting: Techniques and Countermeasures.
Jeffrey Spaulding, S. Upadhyaya and David Mohaisen:
ARES 2016 -
Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service.
Ahreum Kang, Steven Ko, Kui Ren, David Mohaisen:
ACM/IEEE HotWeb 2016 -
Does Query Blocking Improve DNS Privacy?.
David Mohaisen, Ahreum Kang, and Kui Ren:
WISA 2016 -
Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks.
An Wang, David Mohaisen, Wentao Chang, and Songqing Chen:
WISA 2016 -
Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications.
Omar Alrawi and David Mohaisen:
ERIS @ WWW 2016 -
Private Over-threshold Aggregation Protocols over Distributed Databases.
Myungsun Kim, David Mohaisen, Jung Hee Cheon, Yongdae Kim:
IEEE Transactions on Knowledge and Data Engineering, 2016 -
Andro-Dumpsys: Anti-Malware System Based on Malware Creator and Malware Centric Information.
J. Jang, Hyunjae Kang, J. Woo, David Mohaisen, and Huy Kang Kim:
Elsevier Computers & Security, 2016 -
Towards Automatic and Lightweight Detection and Classification of Malicious Web Contents.
David Mohaisen:
ACM/IEEE HotWeb 2015 -
Separation of Benign and Malicious Network Events for Accurate Malware Family Classification.
H. Mekky, David Mohaisen, Z. Zhang:
IEEE CNS 2015 -
Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis.
An Wang, David Mohaisen, Wentao Chang, Songqing Chen:
IEEE DSN 2015 -
Revealing DDoS Attack Dynamics behind the Scenes.
An Wang, David Mohaisen, Wentao Chang, Songqing Chen:
DIMVA 2015 -
Measuring Botnets in the Wild: Some New Trends.
Wentao Chang, David Mohaisen, An Wang, Songqing Chen:
ACM ASIACCS 2015 -
Andro-AutoPsy: Anti-malware system based on similarity matching and creator-centric information.
J. Jang, H. Kang, J. Woo, David Mohaisen, Huy Kang Kim:
Elsevier Digital Investigation, 2015 -
Timing Attacks on Access Privacy in ICN and Countermeasures.
David Mohaisen, H. Mekky, X. Zhang, H. Xie, and Yongdae Kim:
IEEE Transactions on Dependable and Secure Computing, 2015 -
Behavior-based Automated Malware Analysis and Classification.
David Mohaisen, Omar Alrawi, M. Mohaisen:
Elsevier Computers & Security, 2015 -
Transaction Authentication Using Complementary Colors.
Y. Maeng, David Mohaisen, DaeHun Nyang:
Elsevier Computers & Security, 2015 -
Measuring the Leakage of Onion at the Root.
M. Thomas and David Mohaisen:
ACM WPES 2014 -
Chatter: Exploring Classification of Malware based on the Order of Events.
David Mohaisen, Omar Alrawi, A. West, and A. Mankin:
IEEE CNS 2014 -
A Private Walk in the Clouds.
Y. Song, Huy Kang Kim, and David Mohaisen:
TrustBus 2014 -
ADAM: Automated Detection and Attribution of Malicious Webpages.
A. Kosba, David Mohaisen, A. West, T. Tonn:
WISA 2014 -
AndroTracker: Creator Information based Android Malware Classification System.
H. Kang, J. Jang, David Mohaisen, and Huy Kang Kim:
WISA 2014 -
Name Server Switching: Anomaly Signatures, Usage, Clustering, and Pblackiction.
David Mohaisen, M. Bhuiyan, and Y. Labrou:
WISA 2014 -
High-Fidelity, Behavior-based Automated Malware Analysis and Classification
David Mohaisen and Omar Alrawi:
WISA 2014 -- Best Paper Award -
Measuring the Leakage of Onion at the Root.
M. Thomas and David Mohaisen:
HotPETS 2014 -
AV-Meter: An Evaluation of Antivirus Scans and Labels.
David Mohaisen and Omar Alrawi:
DIMVA 2014 -
Metadata-driven Threat Classification of Network Endpoints Appearing in Malware.
A. West and David Mohaisen:
DIMVA 2014 -
Kindblack Domains: Detecting and Clustering Botnet Domains Using DNS Traffic.
M. Thomas and David Mohaisen:
WWW Workshops 2014 -
Keylogging-resistant Visual Authentication Protocols
DaeHun Nyang, David Mohaisen, and Jeonil Kang:
IEEE Transactions on Mobile Computing, 2014 -
A Methodical Evaluation of Antivirus Scans and Labels.
David Mohaisen, Omar Alrawi, M. Larson, and D. McPherson:
WISA 2013 -
Improving Social Network-based Sybil Defenses by Augmenting Social Graphs.
David Mohaisen and S. Hollenbeck:
WISA 2013 -
Unveiling Zeus: Automated Classification of Malware Samples.
David Mohaisen and Omar Alrawi:
WWW Workshop 2013 -
ADAM: Automated detection and attribution of malicious webpages (poster).
Ahmed E. Kosba, David Mohaisen, Andrew G. West, Trevor Tonn
IEEE CNS 2013 -- Best Poster Award -
Protecting Access Privacy of Cached Contents in Information Centric Networks.
David Mohaisen, X. Zhang, Max Schuchard, H. Xie, Yongdae Kim:
ACM ASIACCS 2013 -
Trustworthy Distributed Computing on Social Networks.
David Mohaisen, Huy Tran, A. Chandra, and Yongdae Kim:
ACM ASIACCS 2013 -
Dynamix: Anonymity on Dynamic Social Structures.
David Mohaisen and Yongdae Kim:
ACM ASIACCS 2013 -
Secure encounter-based social networks: Requirements, challenges, and designs.
David Mohaisen, D. Foo Kune, E. Vasserman, M. Kim, and Yongdae Kim:
IEEE Transactions on Dependable and Secure Computing, 2013 -
Trading Optimality for Scalability in Large-scale Opportunistic Routing.
Y. Li, David Mohaisen, and Z. Zhang:
IEEE Transactions on Vehicular Technology, 2013 -
Private Top-k Aggregation Protocols.
Myungsun Kim and David Mohaisen and Jung Hee Cheon and Yongdae Kim:
ICISC 2012 -
On the Mixing Time of Directed Social Graphs and Security Implications.
David Mohaisen, Huy Tran, Nick Hopper, and Yongdae Kim:
ACM ASIACCS 2012 -
DEOS: Dynamic Energy-Oriented Scheduling for Sustainable Wireless Sensor Networks.
Ting Zhu, David Mohaisen, Y. Ping, D. Towsley:
IEEE INFOCOM 2012 -
Incorporating trust into social network-based Sybil defenses.
David Mohaisen, Nick Hopper, Yongdae Kim:
INFOCOM 2011 -
Losing control of the Internet: Using the data plane to attack the control plane.
Max Schuchard, E Vasserman, David Mohaisen, Denise Foo Kune, Nick Hopper, Yongdae Kim:
ISOC NDSS 2011 -
Measuring the mixing time of social graphs.
David Mohaisen, Aaram Yun, Yongdae Kim:
ACM IMC 2010 - 10,171,415: Characterization of domain names based on changes of authoritative name servers
- 10,038,706: Systems, devices, and methods for separating malware and background events
- 9,779,238: Classifying malware by order of network behavior artifacts
- 9,769,189: Systems and methods for behavior-based automated malware analysis and classification
- 9,578,125: Systems, devices, and methods for protecting access privacy of cached content
- 9,489,514: Classifying malware by order of network behavior artifacts
- 8,745,696: Apparatus and method for privacy protection in association rule mining
- 8,112,386: Rotation based transformation method and apparatus for preserving data privacy
- Outreach: This work was presented at the DNS-OARC workshop held during Fall 2014 in Los Angeles, CA. DNS-OARC workshop is a gathering of DNS operators, admininistrators, and researchers.
- Impact: Findings in the work were incorporated in RFC 7686. As a result, .onion leakage is blocked in the most recent unbound release (1.5.8)
Selected Patents
Media Coverage
Our work on measuring the leakage of .onion in the public domain name system infrastructure has been coveblack by a post in the DeepDotWeb. The work was presented at ACM WPES and was jointly done with Matt Thomas.
Our work on Social Clouds, a design of a trustworthy social computing system bootstrapped by social networks, was coveblack by several news stories and posts, including posts at MIT Technology Review, The Verge, Data News, Atelier, msn.com. This work was published in IEEE Transactions on Service Computing and was jointly done with Huy Tran (undergraduate student; now at Microsoft), Abhishek Chandra and Yongdae Kim.
Our work on DDoS attacks has been coveblack by several news stories in the New Scientist, CBS News, Info Packets, Infosec Island, Minnesota Daily, Slashdot, METRO, The Register, Gizmodo, Geekosystem, ISSSource, among others. This work was published at ISOC NDSS, and was jointly done with Max Schuchard, Eugene Vasserman, Denis Foo Kune, Nick Hopper, and Yongdae Kim.
Website last updated on 04/28/2019