Follow
Omar Alrawi
Title
Cited by
Cited by
Year
Sok: Security evaluation of home-based iot deployments
O Alrawi, C Lever, M Antonakakis, F Monrose
2019 IEEE symposium on security and privacy (sp), 1362-1380, 2019
2862019
AMAL: high-fidelity, behavior-based automated malware analysis and classification
A Mohaisen, O Alrawi, M Mohaisen
computers & security 52, 251-266, 2015
2302015
Av-meter: An evaluation of antivirus scans and labels
A Mohaisen, O Alrawi
International conference on detection of intrusions and malware, and …, 2014
1202014
Unveiling zeus: automated classification of malware samples
A Mohaisen, O Alrawi
Proceedings of the 22nd International Conference on World Wide Web, 829-832, 2013
882013
Chatter: Classifying malware families using system event ordering
A Mohaisen, AG West, A Mankin, O Alrawi
2014 IEEE Conference on Communications and Network Security, 283-291, 2014
412014
Iotfinder: Efficient large-scale identification of iot devices via passive dns traffic analysis
R Perdisci, T Papastergiou, O Alrawi, M Antonakakis
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 474-489, 2020
362020
Systems and methods for behavior-based automated malware analysis and classification
A Mohaisen, O Alrawi, M Larson
US Patent 9,769,189, 2017
362017
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages
R Duan, O Alrawi, RP Kasturi, R Elder, B Saltaformaggio, W Lee
The Network and Distributed System Security Symposium (NDSS), 2021
35*2021
Towards a methodical evaluation of antivirus scans and labels
A Mohaisen, O Alrawi, M Larson, D McPherson
International Workshop on Information Security Applications, 231-241, 2013
342013
Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries.
R Duan, A Bijlani, Y Ji, O Alrawi, Y Xiong, M Ike, B Saltaformaggio, W Lee
The Network and Distributed System Security Symposium (NDSS), 2019
312019
The Betrayal At Cloud City: An Empirical Analysis Of {Cloud-Based} Mobile Backends
O Alrawi, C Zuo, R Duan, RP Kasturi, Z Lin, B Saltaformaggio
28th USENIX Security Symposium (USENIX Security 19), 551-566, 2019
202019
The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle
O Alrawi, C Lever, K Valakuzhy, R Court, K Snow, F Monrose, ...
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
152021
Chains of distrust: Towards understanding certificates used for signing malicious applications
O Alrawi, A Mohaisen
Proceedings of the 25th International Conference Companion on World Wide Web …, 2016
142016
Forecasting Malware Capabilities From Cyber Attack Memory Images
O Alrawi, M Ike, M Pruett, RP Kasturi, S Barua, T Hirani, B Hill, ...
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
82021
TARDIS: Rolling back the clock on CMS-targeting cyber attacks
RP Kasturi, Y Sun, R Duan, O Alrawi, E Asdar, V Zhu, Y Kwon, ...
2020 IEEE Symposium on Security and Privacy (SP), 1156-1171, 2020
82020
Babble: Identifying malware by its dialects
A Mohaisen, O Alrawi, AG West, A Mankin
2013 IEEE Conference on Communications and Network Security (CNS), 407-408, 2013
62013
The system can't perform the operation now. Try again later.
Articles 1–16