Peer-reviewed Publications

All papers published before 2010 are available at DBLP. My citations are available from my Google Scholar profile.
* indicates main contributor. Acceptance rate for recent papers is provided where available.

  1. Understanding Adversarial Strategies from Bot Recruitment to Scheduling
    Wentao Chang, Aziz Mohaisen, An Wang and Songqing Chen
    SECURECOMM 2017: In Proceedings of the 2017 International Conference on Security and Privacy in Communication Networks
  2. You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones
    Si Chen *, Sixu Piao, Cong Wang, Qian Wang, Jian Weng, Lu Su, Aziz Mohaisen and Kui Ren
    ICDCS 2017: In Proceedings of the 37th International Conference on Distributed Computing Systems
  3. An Adversary-Centric Behavior Modeling of DDoS Attacks
    An Wang, Aziz Mohaisen and Songqing Chen
    ICDCS 2017: In Proceedings of the 37th International Conference on Distributed Computing Systems
  4. When Smart TV Meets CRN: Privacy-preserving Fine-grained Spectrum Access
    Chaowen Guan, Aziz Mohaisen, Zhi Sun, Fei Wei, Lu Su, Kui Ren and Yaling Yang
    ICDCS 2017: In Proceedings of the 37th International Conference on Distributed Computing Systems
  5. Android Malware Detection using Complex-Flows
    Feng Shen *, Justin Del Vecchio, Aziz Mohaisen, Steven Y. Ko and Lukasz Ziarek
    ICDCS 2017: In Proceedings of the 37th International Conference on Distributed Computing Systems
  6. Privacy Implications of DNSSEC Look-aside Validation
    Aziz Mohaisen *, Zhongshu Gu * and Kui Ren *
    ICDCS 2017: In Proceedings of the 37th International Conference on Distributed Computing Systems
  7. Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n
    Rhongho Jang, Jeonil Kang, Aziz Mohaisen and DaeHun Nyang
    ICDCS 2017: In Proceedings of the 37th International Conference on Distributed Computing Systems
  8. You’ve Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques
    Jeffrey Spaulding *, Shambhu Upadhyaya and Aziz Mohaisen
    ICDCS 2017: In Proceedings of the 37th International Conference on Distributed Computing Systems
  9. Large-scale Invisible Attack on AFC Systems with NFC-equipped Smartphones
    Fan Dang *, Pengfei Zhou, Zhenhua Li, Ennan Zhai, Aziz Mohaisen, Qingfu Wen, and Mo Li
    INFOCOM 2017: In Proceedings of the 36th IEEE International Conf. on Computer Communications
  10. SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates
    Qian Wang *, Kui Ren, Minxin Du, Qi Li, and Aziz Mohaisen
    FC 2017: Financial Cryptography and Data Security
  11. Crime Scene Reconstruction: Online Gold Farming Network Analysis
    Jiyoung Woo * and Aziz Mohaisen * and Yongdae Kim and Huy Kang Kim
    IEEE TIFS 2017: Transactions on Information Forensics and Security
  12. A Data-Driven Study of DDoS Attacks and Their Dynamics
    An Wang * and Wentao Chang and Songqing Chen and Aziz Mohaisen
    IEEE TDSC 2017: Transactions on Dependable and Secure Computing (accepted with revisions)
  13. Highly-accurate rogue access point detection using intentional channel interference: poster
    RhongHo Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang
    ACM WiSec 2017: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks
  14. Two-level network monitoring and management in WLAN using software-defined networking: poster
    RhongHo Jang, DongGyu Cho, Aziz Mohaisen, Youngtae Noh, DaeHun Nyang
    ACM WiSec 2017: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks
  15. Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures
    Aziz Mohaisen, Kui Ren
    ACM ToN 2017: IEEE/ACM Transactions on Networking
  16. Performance of Deep Learning Computation with TensorFlow Software Library in GPU-Capable Multicore Computing Platforms
    Young Jong Mo, Joongheon Kim, Jong-Kook Kim, Aziz Mohaisen, and Woojoo Lee
    IEEE ICUFN 2017: The 9th International Conference on Ubiquitous and Future Networks
  17. Rethinking Information Sharing for Actionable Threat Intelligence
    Aziz Mohaisen *, Omar Al Ibrahim *, Charles Kamhoua, Kevin Kwiat, Laurent Njilla
    Technical Report 2017: University at Buffalo and Air Force Research Lab (88ABW-2016-3801)
  18. Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence
    Omar Al Ibrahim *, Aziz Mohaisen *, Charles Kamhoua, Kevin Kwiat, Laurent Njilla
    Technical Report 2017: University at Buffalo and Air Force Research Lab (88ABW-2017-0416)
  19. You are a Game Bot!: Uncovering game bots in MMORPGs via self-similarity in the wild
    Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Aziz Mohaisen, Huy Kang Kim
    NDSS 2016: The Network and Distributed System Security Symposium
  20. The Landscape of Domain Name Typosquatting: Techniques and Countermeasures
    Jeffrey Spaulding *, Shambhu Upadhyaya and Aziz Mohaisen
    ARES 2016: The International Conference on Availability, Reliability and Security
  21. Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service
    Ah Reum Kang, Seong Hoon Jeong, Steven Y. Ko, Kui Ren, Aziz Mohaisen *
    IEEE HotWeb 2016: Hot Topics in Web Systems and Technologies
  22. Does Query Blocking Improve DNS Privacy?
    Aziz Mohaisen *, Ah Reum Kang, and Kui Ren
    WISA 2016: The 17th Conference on Information Security Applications
  23. Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks
    An Wang *, Aziz Mohaisen, Wentao Chang, and Songqing Chen
    WISA 2016: The 17th Conference on Information Security Applications
  24. Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications
    Omar Alrawi * and Aziz Mohaisen *
    ERMIS 2016: Empirical Research Methods in Information Security @ WWW 2016
  25. Private Over-threshold Aggregation Protocols over Distributed Databases
    Myungsun Kim *, Aziz Mohaisen *, Jung Hee Cheon, Yonggdae Kim
    IEEE TKDE 2016: Transactions on Knowledge and Data Engineering
  26. Andro-Dumpsys: Anti-Malware System Based on Malware Creator and Malware Centric Information
    Jae-wook Jang *, Hyunjae Kang, Jiyoung Woo, Aziz Mohaisen *, and Huy Kang Kim
    COSE 2016: Elsevier Computers & Security.
  27. Detection and Classification of Android Malware by Similarity Matching of Behavior Profiles
    Jae-wook Jang *, Yaesung Yun, Aziz Mohaisen *, Jiyoung Woo, Huy Kang Kim
    SpringerPlus 2016
  28. Multimodal game bot detection using user behavioral characteristics
    Ah Reum Kang *, Seong Hoon Jeong, Aziz Mohaisen, Huy Kang Kim
    SpringerPlus 2016
  29. Characterizing Collaboration in Social Network-enabled Routing
    Manar Mohaisen * and Aziz Mohaisen *
    TIIS 2016: Transactions on Internet and Info Systems
  30. Towards Automatic and Lightweight Detection and Classification of Malicious Web Contents
    Aziz Mohaisen
    IEEE HotWeb 2015: Hot Topics in Web Systems and Technologies
  31. Separation of Benign and Malicious Network Events for Accurate Malware Family Classification
    Hesham Mekky *, Aziz Mohaisen *, Zhi-Li Zhang
    IEEE CNS 2015: Conference on Communications and Network Security
  32. Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis
    An Wang *, Aziz Mohaisen *, Wentao Chang *, Songqing Chen *
    IEEE DSN 2015: International Conference on Dependable Systems and Networks
  33. Revealing DDoS Attack Dynamics behind the Scenes
    An Wang *, Aziz Mohaisen *, Wentao Chang *, Songqing Chen *
    DIMVA 2015: Conference on Detection of Intrusions and Malware & Vulnerability Assessment
  34. Measuring Botnets in the Wild: Some New Trends
    Wentao Chang *, Aziz Mohaisen *, An Wang *, Songqing Chen *:
    ACM ASIA CCS 2015: ACM Symposium on Information, Computer and Communications Security
  35. Andro-AutoPsy: Anti-malware system based on similarity matching and creator-centric information
    Jae-wook Jang *, Hyunjae Kang, Jiyoung Woo, Aziz Mohaisen, Huy Kang Kim
    DI 2015: Elsevier Digital Investigation
  36. Timing Attacks on Access Privacy in ICN and Countermeasures
    Aziz Mohaisen *, Hesham Mekky, Xinwen Zhang, Haiyong Xie, and Yongdae Kim
    IEEE TDSC 2015: Transactions on Dependable and Secure Computing
  37. Behavior-based Automated Malware Analysis and Classification
    Aziz Mohaisen * and Omar Alrawi *
    COSE 2015: Elsevier Computers & Security, 2015
  38. Transaction Authentication Using Complementary Colors
    Youngjae Maeng *, Aziz Mohaisen, Daehun Nyang *
    COSE 2015: Elsevier Computers & Security
  39. Mal-Netminer: Malware Classification Approach Based on Social Network Analysis of System Call Graph
    Jae-wook Jang *, Jiyoung Woo, Aziz Mohaisen, Jaesung Yun, and Huy Kang Kim
    MPE 2015: Mathematical Problems in Engineering
  40. Interference Impacts on 60 GHz Video Streaming in Smart TV Platforms
    Joongheon Kim * and Aziz Mohaisen *
    MPA 2015: Multimedia Tools and Applications
  41. Having your cake and eating it too: Domain Name Data Networking (DNDN)
    Eric Ostweil, Craig Murray, Aziz Mohaisen
    Technical Report: Verisign Labs, 2015
  42. Measuring the Leakage of Onion at the Root
    Matt Thomas and Aziz Mohaisen
    ACM WPES 2014: Workshop on Privacy in the Electronic Society
  43. Chatter: Exploring Classification of Malware based on the Order of Events
    Aziz Mohaisen, Omar Alrawi, Andrew West, and Allison Mankin
    IEEE CNS 2014: Conference on Communications and Network Security
  44. A Private Walk in the Clouds
    Youngbae Song, Hyoungshick Kim, and Aziz Mohaisen
    TrustBus 2014: International Conference on Trust, Privacy and Security in Digital Business
  45. ADAM: Automated Detection and Attribution of Malicious Webpages
    Ahmed Kosba, Aziz Mohaisen, Andrew West, Trevor Tonn
    WISA 2014: Conference on Information Security Applications
  46. AndroTracker: Creator Information based Android Malware Classification System
    Hyun Jae Kang, Jae-wook Jang, Aziz Mohaisen, and Huy Kang Kim
    WISA 2014: Conference on Information Security Applications
  47. Name Server Switching: Anomaly Signatures, Usage, Clustering, and Prediction
    Aziz Mohaisen, Mansurul Bhuiyan, and Yannis Labrou
    WISA 2014: Conference on Information Security Applications
  48. High-Fidelity, Behavior-based Automated Malware Analysis and Classification
    Aziz Mohaisen and Omar Alrawi
    WISA 2014: Conference on Information Security Applications
  49. Measuring the Leakage of Onion at the Root
    Matt Thomas and Aziz Mohaisen
    HotPETS 2014: Hot Topics in Privacy Enhancing Technologies
  50. AV-Meter: An Evaluation of Antivirus Scans and Labels
    Aziz Mohaisen and Omar Alrawi
    DIMVA 2014: Conference on Detection of Intrusions and Malware & Vulnerability Assessment
  51. Metadata-driven Threat Classification of Network Endpoints Appearing in Malware
    Andrew G. West and Aziz Mohaisen
    DIMVA 2014: Conference on Detection of Intrusions and Malware & Vulnerability Assessment
  52. Kindred Domains: Detecting and Clustering Botnet Domains Using DNS Traffic
    Matt Thomas and Aziz Mohaisen
    WWW Workshops 2014
  53. Keylogging-resistant Visual Authentication Protocols
    DaeHun Nyang, Aziz Mohaisen, and Jeonil Kang
    IEEE TMC 2014: Transactions on Mobile Computing (appendix).
  54. Fast and Low-Power Link Setup for IEEE 802.15.3c Multi-Gigabit/s Wireless Sensor Networks
    Joongheon Kim, Aziz Mohaisen
    IEEE CL 2014: Communication Letters
  55. SocialCloud: Trustworthy Distributed Computing on Social Networks
    Aziz Mohaisen, Huy Tran, Abhishek Chandra, and Yongdae Kim
    IEEE TSC 2014: Transactions on Services Computing
  56. A Methodical Evaluation of Antivirus Scans and Labels
    Aziz Mohaisen, Omar Alrawi, Matt Larson, and Danny McPherson
    WISA 2013: Conference on Information Security Applications
  57. Improving Social Network-based Sybil Defenses by Augmenting Social Graphs
    Aziz Mohaisen and Scott Hollenbeck
    WISA 2013: Conference on Information Security Applications
  58. Unveiling Zeus: Automated Classification of Malware Samples
    Aziz Mohaisen and Omar Alrawi
    WWW Workshop 2013
  59. Protecting Access Privacy of Cached Contents in Information Centric Networks
    Aziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim
    ACM ASIA CCS 2013: ACM Symposium on Information, Computer and Communications Security
  60. Trustworthy Distributed Computing on Social Networks
    Aziz Mohaisen, Huy Tran, Abhishek Chandra, and Yongdae Kim
    ACM ASIA CCS 2013: ACM Symposium on Information, Computer and Communications Security
  61. Dynamix: Anonymity on Dynamic Social Structures
    Aziz Mohaisen and Yongdae Kim
    ACM ASIA CCS 2013: ACM Symposium on Information, Computer and Communications Security
  62. Secure encounter-based social networks: Requirements, challenges, and designs
    Aziz Mohaisen, Denis Foo Kune, Eugene Vasserman, Myungsun Kim, and Yongdae Kim
    IEEE TDSC 2013: Transactions on Dependable and Secure Computing
  63. Trading Optimality for Scalability in Large-scale Opportunistic Routing
    Yanhua Li, Aziz Mohaisen, and Zhi-Li Zhang
    IEEE TVT 2013: Transactions on Vehicular Technology
  64. Private Top-k Aggregation Protocols
    Myungsun Kim and Aziz Mohaisen and Jung Hee Cheon and Yongdae Kim
    ICISC 2012: International Conference on Information Security and Cryptology
  65. Measuring Bias in the Mixing Time of Social Graphs due to Graph Sampling
    Aziz Mohaisen, Pengkui Luo, Yanhua Li, Yongdae Kim, Zhi-Li Zhang
    IEEE MILCOM 2012: International Conference for Military Communications
  66. On the Mixing Time of Directed Social Graphs and Security Implications
    Aziz Mohaisen, Huy Tran, Nicholas Hopper, and Yongdae Kim
    ACM ASIA CCS 2012: ACM Symposium on Information, Computer and Communications Security
  67. Collaboration in Social Network-based Information Dissemination
    Aziz Mohaisen, Tamer AbuHmed, Ting Zhu, Manar Mohaisen
    IEEE ICC 2012: International Conference on Communications
  68. DEOS: Dynamic Energy-Oriented Scheduling for Sustainable Wireless Sensor Networks
    Ting Zhu, Aziz Mohaisen, Yi Ping, Don Towsley
    IEEE INFOCOM 2012: International Conference on Computer Communications
  69. Protecting Access Privacy of Cached Contents in Information Centric Networks
    Aziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim
    ACM CCS 2012: Conference on Computer and Communications Security (poster)
  70. Incorporating trust into social network-based Sybil defenses
    Aziz Mohaisen, Nicholas Hopper, Yongdae Kim
    IEEE INFOCOM 2011: International Conference on Computer Communications
  71. Understanding social networks properties for trustworthy computing
    Aziz Mohaisen, Huy Tran, Nicholas Hopper, and Yongdae Kim
    IEEE ICDCS Workshops 2011
  72. Parallel QRD-M Encoder for Decentralized Multi-User MIMO Systems
    Manar Mohaisen and Aziz Mohaisen
    IEEE ICC 2011: IEEE International Conference on Communications
  73. Losing control of the Internet: Using the data plane to attack the control plane
    Max Schuchard, E Vasserman, A Mohaisen, D Foo Kune, N Hopper, Y Kim
    ISOC NDSS 2011: The Network and Distributed System Security Symposium
  74. An analysis of a social network-based Sybil defense in mobile networks
    Aziz Mohaisen, Tamer AbuHmed, Hun Jeong Kang, Daehun Nyang, Yongdae Kim
    ACM IMCOM 2011: International Conference on Ubiquitous Information Management and Communication
  75. Measuring the mixing time of social graphs
    Aziz Mohaisen, Aaram Yun, Yongdae Kim:
    ACM IMC 2010: Internet Measurements Conference
  76. Posters (lightly reviewed or peer unreviewed)

    * indicates main contriburtors. (SIGCOMM and CNS: 2 pages each; CCS: 3 pages each.)
  77. A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure
    Seong Hoon Jeong, Ah Reum Kang, Joongheon Kim, Huy Kang Kim, and Aziz Mohaisen *
    ACM SGICOMM 2016 (~38%)
  78. Assessing DNS Privacy under Partial Deployment of Special-Use Domain Names
    Ah Reum Kang *, Aziz Mohaisen *
    In IEEE CNS, 2016 (~100%)
  79. Transparency of the new gTLD's Centralized Zone Data Service: A Measurement Study
    Ah Reum Kang, Aziz Mohaisen *
    In IEEE CNS, 2016. (~100%)
  80. Automatic Alerts Annotation for Improving DDoS Mitigation Systems
    Ah Reum Kang, Aziz Mohaisen *
    In IEEE CNS, 2016. (~100%)
  81. A User Study of the Effectiveness of Typosquatting Techniques
    Jeffrey Spaulding *, Ah Reum Kang, Shambhu Upadhyaya, Aziz Mohaisen
    In IEEE CNS, 2016. (~100%)
  82. WHAP: Web-Hacking Profiling Using Case-Based Reasoning
    Mee Lan Han *, Hee Chan Han, Ah Reum Kang, Byung Il Kwak, Aziz Mohaisen, Huy Kang Kim
    In IEEE CNS, 2016. (~100%)
  83. Characterizing Botnets-as-a-Service
    Wentao Chang *, An Wang *, Aziz Mohaisen, and Songqing Chen
    ACM SGICOMM 2014 (38%)
  84. Separating Benign and Malware Events for Accurate Malware Classification
    Hesham Z. Mekky *, Aziz Mohaisen, and Zhi-Li Zhang
    ACM CCS 2014 (~60%)
  85. How Distributed Are Today's DDoS Attacks?
    An Wang *, Wentao Chang *, Aziz Mohaisen, and Songqing Chen
    ACM CCS 2014 (~60%)
  86. Characterization of the Dynamics and Interactions of Domain Names and Name Server
    Mansurul Bhuiyan *, Aziz Mohaisen, Yannis Labrou
    IEEE CNS 2013 (~100%)
  87. ADAM: Automated Detection and Attribution of Malicious Webpages
    Ahmed E. Kosba *, Aziz Mohaisen, Andrew West, and Trevor Tonn
    IEEE CNS 2013 (~100%)
  88. Babble: Identifying Malware by Its Dialects
    Aziz Mohaisen *, Omar Alrawi *, Andrew West, and Allison Mankin
    IEEE CNS 2013 (~100%)
  89. Designs to account for trust in social network-based Sybil defenses
    Aziz Mohaisen, Nicholas Hopper, Yongdae Kim:
    ACM CCS 2010 (~60%)
  90. Secure encounter-based social networks: Requirements, challenges, and designs.
    Aziz Mohaisen, Eugene Vasserman, Max Schuchard, Denis Foo Kune, Yongdae Kim:
    ACM CCS 2010 (~60%)
  91. Losing control of the Internet: Using the data plane to attack the control plane
    Max Schuchard, A Mohaisen, E Vasserman, D Foo Kune, N Hopper, Y Kim:
    ACM CCS 2010 (~60%)

# Standard and Industry Work

  1. Privacy Implications of DNSSEC Look-aside Validation
    Aziz Mohaisen
    DNS OARC Workhsop, 2016 (oral presentation)
  2. Detecting Botnet Domains Using DNS Traffic
    Matt Thomas and Aziz Mohaisen
    DNS OARC Workshop 2014
  3. Open resolvers in the com/net resolution
    Duane Wessels and Aziz Mohaisen
    DNS OARC Workshop 2014
  4. XMSS: Extended Hash-Based Signatures
    Andreas Huelsing et al.
    Internet Draft (IRTF, CFRG), 2016
  5. Evaluation of Privacy for DNS Private Exchange
    Aziz Mohaisen and Allison Mankin
    Internet Draft, 2015 (source)
  6. Opportunistic Encryption with DANE Semantics and IPsec: IPSECA
    Eric Osterweil et al.
    Internet Draft, 2015

# Patents

# Talks

# Media Coverage

Our work on measuring the leakage of .onion in the public domain name system infrastructure has been covered by a post in the DeepDotWeb. The work was presented at ACM WPES and was jointly done with Matt Thomas.

Our work on Social Clouds, a design of a trustworthy social computing system bootstrapped by social networks, was covered by several news stories and posts, including posts at MIT Technology Review, The Verge, Data News, Atelier, msn.com. This work was published in IEEE Transactions on Service Computing and was jointly done with Huy Tran (undergraduate student; now at Microsoft), Abhishek Chandra and Yongdae Kim.

Our work on DDoS attacks has been covered by several news stories in the New Scientist, CBS News, Info Packets, Infosec Island, Minnesota Daily, Slashdot, METRO, The Register, Gizmodo, Geekosystem, ISSSource, among others. This work was published at ISOC NDSS, and was jointly done with Max Schuchard, Eugene Vasserman, Denis Foo Kune, Nick Hopper, and Yongdae Kim.

Copyrights

For IEEE publications:
© 2000-2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

For ACM publications:
ACM COPYRIGHT NOTICE. Copyright © 2001-2016 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Publications Dept., ACM, Inc., fax +1 (212) 869-0481, or permissions@acm.org.