Sok: Security evaluation of home-based iot deployments O Alrawi, C Lever, M Antonakakis, F Monrose 2019 IEEE symposium on security and privacy (sp), 1362-1380, 2019 | 482 | 2019 |
AMAL: high-fidelity, behavior-based automated malware analysis and classification A Mohaisen, O Alrawi, M Mohaisen computers & security 52, 251-266, 2015 | 338* | 2015 |
Av-meter: An evaluation of antivirus scans and labels A Mohaisen, O Alrawi Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014 | 139 | 2014 |
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages R Duan, O Alrawi, RP Kasturi, R Elder, B Saltaformaggio, W Lee The Network and Distributed System Security Symposium (NDSS), 2021 | 127* | 2021 |
Unveiling zeus: automated classification of malware samples A Mohaisen, O Alrawi Proceedings of the 22nd International Conference on World Wide Web, 829-832, 2013 | 114 | 2013 |
Iotfinder: Efficient large-scale identification of iot devices via passive dns traffic analysis R Perdisci, T Papastergiou, O Alrawi, M Antonakakis 2020 IEEE european symposium on security and privacy (EuroS&P), 474-489, 2020 | 104 | 2020 |
The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle O Alrawi, C Lever, K Valakuzhy, R Court, K Snow, F Monrose, ... 30th {USENIX} Security Symposium ({USENIX} Security 21), 2021 | 88 | 2021 |
Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries. R Duan, A Bijlani, Y Ji, O Alrawi, Y Xiong, M Ike, B Saltaformaggio, W Lee The Network and Distributed System Security Symposium (NDSS), 2019 | 60 | 2019 |
Chatter: Classifying malware families using system event ordering A Mohaisen, AG West, A Mankin, O Alrawi 2014 IEEE Conference on Communications and Network Security, 283-291, 2014 | 46 | 2014 |
Towards a Methodical Evaluation of Antivirus Scans and Labels: “If You’re Not Confused, You’re Not Paying Attention” A Mohaisen, O Alrawi, M Larson, D McPherson Information Security Applications: 14th International Workshop, WISA 2013 …, 2014 | 37 | 2014 |
The betrayal at cloud city: An empirical analysis of {Cloud-Based} mobile backends O Alrawi, C Zuo, R Duan, RP Kasturi, Z Lin, B Saltaformaggio 28th USENIX Security Symposium (USENIX Security 19), 551-566, 2019 | 32 | 2019 |
Forecasting Malware Capabilities From Cyber Attack Memory Images O Alrawi, M Ike, M Pruett, RP Kasturi, S Barua, T Hirani, B Hill, ... 30th {USENIX} Security Symposium ({USENIX} Security 21), 2021 | 27 | 2021 |
Chains of distrust: Towards understanding certificates used for signing malicious applications O Alrawi, A Mohaisen Proceedings of the 25th International Conference Companion on World Wide Web …, 2016 | 22 | 2016 |
TARDIS: Rolling back the clock on CMS-targeting cyber attacks RP Kasturi, Y Sun, R Duan, O Alrawi, E Asdar, V Zhu, Y Kwon, ... 2020 IEEE Symposium on Security and Privacy (SP), 1156-1171, 2020 | 21 | 2020 |
Exposing the rat in the tunnel: Using traffic analysis for tor-based malware detection P Dodia, M AlSabah, O Alrawi, T Wang Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 15 | 2022 |
Babble: Identifying malware by its dialects A Mohaisen, O Alrawi, AG West, A Mankin 2013 IEEE Conference on Communications and Network Security (CNS), 407-408, 2013 | 7 | 2013 |
Beyond The Gates: An Empirical Analysis of {HTTP-Managed} Password Stealers and Operators A Avgetidis, O Alrawi, K Valakuzhy, C Lever, P Burbage, AD Keromytis, ... 32nd USENIX security symposium (USENIX Security 23), 5307-5324, 2023 | 4 | 2023 |
View from above: exploring the malware ecosystem from the upper DNS hierarchy A Faulkenberry, A Avgetidis, Z Ma, O Alrawi, C Lever, P Kintis, F Monrose, ... Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 4 | 2022 |
Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level Y Du, O Alrawi, K Snow, M Antonakakis, F Monrose Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 3 | 2023 |
A systematic approach to prioritize vulnerabilities in iot deployments O Alrawi Ph. D. thesis, Georgia Institute of Technology, 2023 | 1 | 2023 |