Publications
2022
A. Anwar, Y. H. Chen, R. Hodgman, T. Sellers, E. Kirda, and A. Oprea. A Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet Devices. The Annual Computer Security Applications Conference (ACSAC 2022)
A. Abusnaina*, A. Anwar*, A. Alabduljabbar, S. Alshamrani, R. Jang, D. Nyang, and D. Mohaisen. Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems. The 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022)
J. Choi, A. Anwar, A. Alabduljabbar, H. Alasmary, J. Spaulding, A. Wang, S. Chen, D. Nyang, A. Awad, and D. Mohaisen. Understanding Internet of Things malware by analyzing endpoints in their static artifacts. Computer Networks, 206, p.108768.
2021
Anwar, A., Abusnaina, A., Chen, S., Li, F. and Mohaisen, D., 2021. Cleaning the NVD: Comprehensive quality assessment, improvements, and analyses. IEEE Transactions on Dependable and Secure Computing.
Khormali, A., Park, J., Alasmary, H., Anwar, A., Saad, M. and Mohaisen, D., 2021. Domain name system security and privacy: A contemporary survey. Computer Networks, 185, p.107699.
Alasmary, H., Anwar, A., Abusnaina, A., Alabduljabbar, A., Abuhamad, M., Wang, A., Nyang, D., Awad, A. and Mohaisen, D., 2021. SHELLCORE: Automating Malicious IoT Software Detection Using Shell Commands Representation. IEEE Internet of Things Journal, 9(4), pp.2485-2496.
Abusnaina, A., Anwar, A., Alshamrani, S., Alabduljabbar, A., Jang, R., Nyang, D. and Mohaisen, D., 2021, June. Systemically Evaluating the Robustness of ML-based IoT Malware Detectors. In 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S) (pp. 3-4). IEEE.
Abusnaina, A., Abuhamad, M., Alasmary, H., Anwar, A., Jang, R., Salem, S., Nyang, D. and Mohaisen, D., 2021. Dl-fhmc: Deep learning-based fine-grained hierarchical learning approach for robust malware classification. IEEE Transactions on Dependable and Secure Computing.
Saad, M., Anwar, A., Ravi, S. and Mohaisen, D., 2021, November. Revisiting nakamoto consensus in asynchronous networks: A comprehensive analysis of bitcoin safety and chainquality. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (pp. 988-1005).
2020
Afsah Anwar, Hisham Alasmary, Jeman Park, An Wang, Songqing Chen, and David Mohaisen. Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection. The 22nd International Conference on Information and Communications Security (ICICS 2020)
Alasmary, H., Abusnaina, A., Jang, R., Abuhamad, M., Anwar, A., Nyang, D. and Mohaisen, D., 2020, November. Soteria: Detecting adversarial examples in control flow graph-based malware classifiers. In 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS) (pp. 888-898). IEEE.
Alasmary, H., Anwar, A., Njilla, L.L., Kamhoua, C.A. and Mohaisen, A., 2020. Addressing Polymorphic Advanced Threats in Internet of Things Networks by Cross‐Layer Profiling. Modeling and Design of Secure Internet of Things, pp.249-272.
Choi, J., Abuhamad, M., Abusnaina, A., Anwar, A., Alshamrani, S., Park, J., Nyang, D. and Mohaisen, D., 2020. Understanding the proxy ecosystem: A comparative analysis of residential and open proxies on the internet. IEEE Access, 8, pp.111368-111380.
2019
J. Choi, A. Abusnaina, A. Anwar, A. Wang, S. Chen, D. Nyang and A. Mohaisen. Honor Among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets. The 2019 IEEE Conference on Dependable and Secure Computing (DSC 2019).
A. Abusnaina, A. Khormali, H. Alasmary, J. Park, A. Anwar and A. Mohaisen. Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems. IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2019).
M. Saad, A. Anwar, A. Ahmad, H. Alasmary, M. Yukesl, and A. Mohaisen. RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing. IEEE International Conference on Blockchain and Cryptocurrency (IEEE ICBC 2019).
H. Alasmary, A. Khormali, A. Anwar, J. Park, J. Choi, A. Abusnaina, A. Awad, D. Nyang, A. Mohaisen. Analyzing and Detecting Emerging Internet of Things Malware: A Graph-based Approach. IEEE Internet of Things Journal (IEEE IoT Journal 2019).
A. Abusnaina, A. Khormali, H. Alasmary, J. Park, A. Anwar, U. Meteriz and A. Mohaisen. Poster: Examining Adversarial Learning against Graph-based IoT Malware Detection Systems. ISOC Network and Distributed System Security Symposium (NDSS 2019).
J. Choi, A. Anwar, H. Alasmary, J. Spaulding, D. Nyang and A. Mohaisen. Poster: Analyzing Endpoints in the Internet of Things Malware. ISOC Network and Distributed System Security Symposium (NDSS 2019).
H. Alasmary, A. Khormali, A. Anwar, J. Park, J. Choi, D. Nyang and A. Mohaisen. Poster: Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach. ISOC Network and Distributed System Security Symposium (NDSS 2019).
2018
A. Anwar, A. Khormali, and A. Mohaisen: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions. International Conference on Security and Privacy in Communication Networks (SecureComm 2018).
H. Alasmary, A. Anwar, J. Park, J. Choi, D. Nyang, and A. Mohaisen: Graph-based Comparison of IoT and Android Malware. International Conference on Computational Data and Social Networks (CSoNet 2018).
Talks
Paper presentation of Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection at The 22nd International Conference on Information and Communications Security, ICICS 2020
Paper presentation of Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions at 14th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2018.
Poster presentation of Examining Adversarial Learning against Graph-based IoT Malware Detection Systems at The Network and Distributed System Security Symposium (NDSS 2019), San Diego, CA, US, Feb 23-27, 2019
Poster presentation on Investigating Run-time Memory Towards Defeating IoT Malware Obfuscation at The 28th USENIX Security Symposium (Usenix Security 2019), Santa Clara, CA, US, August 14-16, 2019
Poster presentation on Analyzing and Detecting Emerging Internet of Things Malware: A Graph-based Approach at The 28th USENIX Security Symposium (Usenix Security 2019), Santa Clara, CA, US, August 14-16, 2019
Poster presentation on Analyzing Endpoints in Internet of Things Malware at The Network and Distributed System Security Symposium (NDSS 2019), San Diego, CA, US, Feb 23-27, 2019
Poster presentation on Understanding the Hidden Costs of Software Vulnerabilities at The 13th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2018), Incheon, Korea, June 4-8, 2018
Copyrights
For IEEE publications:
© 2000-2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or blackistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
For ACM publications:
ACM COPYRIGHT NOTICE. Copyright © 2001-2020 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honoblack. Abstracting with cblackit is permitted. To copy otherwise, to republish, to post on servers, or to blackistribute to lists, requires prior specific permission and/or a fee. Request permissions from Publications Dept., ACM, Inc., fax +1 (212) 869-0481, or permissions@acm.org.