Skip to main content

Showing 1–28 of 28 results for author: Nyang, D

.
  1. arXiv:2311.15366  [pdf, other

    cs.CR cs.LG

    Untargeted Code Authorship Evasion with Seq2Seq Transformation

    Authors: Soohyeon Choi, Rhongho Jang, DaeHun Nyang, David Mohaisen

    Abstract: Code authorship attribution is the problem of identifying authors of programming language codes through the stylistic features in their codes, a topic that recently witnessed significant interest with outstanding performance. In this work, we present SCAE, a code authorship obfuscation technique that leverages a Seq2Seq code transformer called StructCoder. SCAE customizes StructCoder, a system des… ▽ More

    Submitted 26 November, 2023; originally announced November 2023.

    Comments: 9 pages, 1 figure, 5 tables

  2. arXiv:2304.14359  [pdf, other

    cs.CY cs.CR cs.PF

    Measuring and Modeling the Free Content Web

    Authors: Abdulrahman Alabduljabbar, Runyu Ma, Ahmed Abusnaina, Rhongho Jang, Songqing Chen, DaeHun Nyang, and David Mohaisen

    Abstract: Free content websites that provide free books, music, games, movies, etc., have existed on the Internet for many years. While it is a common belief that such websites might be different from premium websites providing the same content types, an analysis that supports this belief is lacking in the literature. In particular, it is unclear if those websites are as safe as their premium counterparts.… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

    Comments: 30 pages, 3 tables, 9 figures. Under review by Computer Networks

  3. arXiv:2304.13278  [pdf, other

    cs.CR cs.CY cs.PF

    Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study

    Authors: Mohammed Alkinoon, Abdulrahman Alabduljabbar, Hattan Althebeiti, Rhongho Jang, DaeHun Nyang, David Mohaisen

    Abstract: Using a total of 4,774 hospitals categorized as government, non-profit, and proprietary hospitals, this study provides the first measurement-based analysis of hospitals' websites and connects the findings with data breaches through a correlation analysis. We study the security attributes of three categories, collectively and in contrast, against domain name, content, and SSL certificate-level feat… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

    Comments: 10 pages, 5 tables, 10 figures

  4. arXiv:2304.13255  [pdf, other

    cs.CR cs.CY cs.LG cs.SE

    SHIELD: Thwarting Code Authorship Attribution

    Authors: Mohammed Abuhamad, Changhun Jung, David Mohaisen, DaeHun Nyang

    Abstract: Authorship attribution has become increasingly accurate, posing a serious privacy risk for programmers who wish to remain anonymous. In this paper, we introduce SHIELD to examine the robustness of different code authorship attribution approaches against adversarial code examples. We define four attacks on attribution techniques, which include targeted and non-targeted attacks, and realize them usi… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

    Comments: 12 pages, 13 figures

  5. arXiv:2210.12083  [pdf, other

    cs.CR cs.CY

    Do Content Management Systems Impact the Security of Free Content Websites? A Correlation Analysis

    Authors: Mohammed Alaqdhi, Abdulrahman Alabduljabbar, Kyle Thomas, Saeed Salem, DaeHun Nyang, David Mohaisen

    Abstract: This paper investigates the potential causes of the vulnerabilities of free content websites to address risks and maliciousness. Assembling more than 1,500 websites with free and premium content, we identify their content management system (CMS) and malicious attributes. We use frequency analysis at both the aggregate and per category of content (books, games, movies, music, and software), utilizi… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

    Comments: 7 pages, 1 figure, 6 tables

  6. arXiv:2201.00768  [pdf, other

    cs.CL cs.AI cs.CR cs.HC cs.LG

    Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions

    Authors: Marwan Omar, Soohyeon Choi, DaeHun Nyang, David Mohaisen

    Abstract: Recent natural language processing (NLP) techniques have accomplished high performance on benchmark datasets, primarily due to the significant improvement in the performance of deep learning. The advances in the research community have led to great enhancements in state-of-the-art production systems for NLP tasks, such as virtual assistants, speech recognition, and sentiment analysis. However, suc… ▽ More

    Submitted 3 January, 2022; originally announced January 2022.

    Comments: Survey; 2 figures, 4 tables

  7. arXiv:2111.02759  [pdf, other

    cs.NI

    Count-Less: A Counting Sketch for the Data Plane of High Speed Switches

    Authors: SunYoung Kim, Changhun Jung, RhongHo Jang, David Mohaisen, DaeHun Nyang

    Abstract: Demands are increasing to measure per-flow statistics in the data plane of high-speed switches. Measuring flows with exact counting is infeasible due to processing and memory constraints, but a sketch is a promising candidate for collecting approximately per-flow statistics in data plane in real-time. Among them, Count-Min sketch is a versatile tool to measure spectral density of high volume data… ▽ More

    Submitted 4 November, 2021; originally announced November 2021.

    Comments: 16 pages, 14 figures

  8. arXiv:2108.13373  [pdf, other

    cs.CR cs.LG

    ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation

    Authors: Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, Daehun Nyang, David Mohaisen

    Abstract: The rapid growth of the Internet of Things (IoT) devices is paralleled by them being on the front-line of malicious attacks. This has led to an explosion in the number of IoT malware, with continued mutations, evolution, and sophistication. These malicious software are detected using machine learning (ML) algorithms alongside the traditional signature-based methods. Although ML-based detectors imp… ▽ More

    Submitted 30 August, 2021; originally announced August 2021.

    Comments: 11 pages

  9. arXiv:2103.14221  [pdf, other

    cs.CR

    ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation

    Authors: Hisham Alasmary, Afsah Anwar, Ahmed Abusnaina, Abdulrahman Alabduljabbar, Mohammad Abuhamad, An Wang, DaeHun Nyang, Amro Awad, David Mohaisen

    Abstract: The Linux shell is a command-line interpreter that provides users with a command interface to the operating system, allowing them to perform a variety of functions. Although very useful in building capabilities at the edge, the Linux shell can be exploited, giving adversaries a prime opportunity to use them for malicious activities. With access to IoT devices, malware authors can abuse the Linux s… ▽ More

    Submitted 25 March, 2021; originally announced March 2021.

  10. arXiv:2103.14217  [pdf, other

    cs.CR

    Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts

    Authors: Afsah Anwar, **chun Choi, Abdulrahman Alabduljabbar, Hisham Alasmary, Jeffrey Spaulding, An Wang, Songqing Chen, DaeHun Nyang, Amro Awad, David Mohaisen

    Abstract: The lack of security measures among the Internet of Things (IoT) devices and their persistent online connection gives adversaries a prime opportunity to target them or even abuse them as intermediary targets in larger attacks such as distributed denial-of-service (DDoS) campaigns. In this paper, we analyze IoT malware and focus on the endpoints reachable on the public Internet, that play an essent… ▽ More

    Submitted 25 March, 2021; originally announced March 2021.

  11. arXiv:2103.09050  [pdf, other

    cs.CY cs.LG

    Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube

    Authors: Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, Daehun Nyang, David Mohaisen

    Abstract: Social media has become an essential part of the daily routines of children and adolescents. Moreover, enormous efforts have been made to ensure the psychological and emotional well-being of young users as well as their safety when interacting with various social media platforms. In this paper, we investigate the exposure of those users to inappropriate comments posted on YouTube videos targeting… ▽ More

    Submitted 3 March, 2021; originally announced March 2021.

  12. arXiv:2101.00330  [pdf, other

    cs.CR cs.DC

    e-PoS: Making Proof-of-Stake Decentralized and Fair

    Authors: Muhammad Saad, Zhan Qin, Kui Ren, DaeHun Nyang, David Mohaisen

    Abstract: Blockchain applications that rely on the Proof-of-Work (PoW) have increasingly become energy inefficient with a staggering carbon footprint. In contrast, energy-efficient alternative consensus protocols such as Proof-of-Stake (PoS) may cause centralization and unfairness in the blockchain system. To address these challenges, we propose a modular version of PoS-based blockchain systems called epos… ▽ More

    Submitted 1 January, 2021; originally announced January 2021.

    Journal ref: IEEE Transactions on Parallel and Distributed Systems, 2021

  13. arXiv:2007.00146  [pdf, other

    cs.CV cs.LG

    Generating Adversarial Examples with an Optimized Quality

    Authors: Aminollah Khormali, DaeHun Nyang, David Mohaisen

    Abstract: Deep learning models are widely used in a range of application areas, such as computer vision, computer security, etc. However, deep learning models are vulnerable to Adversarial Examples (AEs),carefully crafted samples to deceive those models. Recent studies have introduced new adversarial attack methods, but, to the best of our knowledge, none provided guaranteed quality for the crafted examples… ▽ More

    Submitted 30 June, 2020; originally announced July 2020.

  14. arXiv:2005.07145  [pdf, other

    cs.CR

    A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification

    Authors: Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen

    Abstract: The wide acceptance of Internet of Things (IoT) for both household and industrial applications is accompanied by several security concerns. A major security concern is their probable abuse by adversaries towards their malicious intent. Understanding and analyzing IoT malicious behaviors is crucial, especially with their rapid growth and adoption in wide-range of applications. However, recent studi… ▽ More

    Submitted 15 May, 2020; v1 submitted 14 May, 2020; originally announced May 2020.

    Comments: 15 pages

  15. arXiv:2005.04842  [pdf, other

    cs.CR

    Contra-*: Mechanisms for Countering Spam Attacks on Blockchain's Memory Pools

    Authors: Muhammad Saad, Joongheon Kim, DaeHun Nyang, David Mohaisen

    Abstract: Blockchain-based cryptocurrencies, such as Bitcoin, have seen on the rise in their popularity and value, making them a target to several forms of Denial-of-Service (DoS) attacks, and calling for a better understanding of their attack surface from both security and distributed systems standpoints. In this paper, and in the pursuit of understanding the attack surface of blockchains, we explore a new… ▽ More

    Submitted 1 January, 2021; v1 submitted 10 May, 2020; originally announced May 2020.

    Journal ref: Journal of Network and Computer Applications, 2021

  16. arXiv:2001.08578  [pdf, other

    cs.CR cs.HC cs.LG

    Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey

    Authors: Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, David Mohaisen

    Abstract: Mobile devices and technologies have become increasingly popular, offering comparable storage and computational capabilities to desktop computers allowing users to store and interact with sensitive and private information. The security and protection of such personal information are becoming more and more important since mobile devices are vulnerable to unauthorized access or theft. User authentic… ▽ More

    Submitted 10 May, 2020; v1 submitted 23 January, 2020; originally announced January 2020.

    Comments: 19 pages

  17. arXiv:1910.01091  [pdf, other

    eess.IV cs.CV q-bio.QM

    W-Net: A CNN-based Architecture for White Blood Cells Image Classification

    Authors: Changhun Jung, Mohammed Abuhamad, Jumabek Alikhanov, Aziz Mohaisen, Kyungja Han, DaeHun Nyang

    Abstract: Computer-aided methods for analyzing white blood cells (WBC) have become widely popular due to the complexity of the manual process. Recent works have shown highly accurate segmentation and detection of white blood cells from microscopic blood images. However, the classification of the observed cells is still a challenge and highly demanded as the distribution of the five types reflects on the con… ▽ More

    Submitted 2 October, 2019; originally announced October 2019.

  18. arXiv:1909.09735  [pdf, other

    cs.CR cs.LG

    COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection

    Authors: Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen

    Abstract: Despite many attempts, the state-of-the-art of adversarial machine learning on malware detection systems generally yield unexecutable samples. In this work, we set out to examine the robustness of visualization-based malware detection system against adversarial examples (AEs) that not only are able to fool the model, but also maintain the executability of the original input. As such, we first inve… ▽ More

    Submitted 20 September, 2019; originally announced September 2019.

  19. arXiv:1904.03487  [pdf, other

    cs.CR

    Exploring the Attack Surface of Blockchain: A Systematic Overview

    Authors: Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen

    Abstract: In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the attack surface to 1) the Blockchain cryptographic constructs, 2) the distributed architecture of the systems using Blockchain, and 3) the Blockchain application context. To each of those contributing factors, we ou… ▽ More

    Submitted 6 April, 2019; originally announced April 2019.

  20. arXiv:1902.04143  [pdf, other

    cs.NI

    Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table

    Authors: Rhongho Jang, Seongkwang Moon, Youngtae Noh, Aziz Mohaisen, DaeHun Nyang

    Abstract: In the zettabyte era, per-flow measurement becomes more challenging owing to the growth of both traffic volumes and the number of flows. Also, swiftness of detection of anomalies (e.g., DDoS attack, congestion, link failure, and so on) becomes paramount. For fast and accurate anomaly detection, managing an accurate working set of active flows (WSAF) from massive volumes of packet influxes at line… ▽ More

    Submitted 11 February, 2019; originally announced February 2019.

    Comments: Accepted as a poster for ISOC NDSS 2019

  21. arXiv:1902.03955  [pdf, other

    cs.CR

    Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach

    Authors: Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, **chun Choi, DaeHun Nyang, Aziz Mohaisen

    Abstract: The growth in the number of Android and Internet of Things (IoT) devices has witnessed a parallel increase in the number of malicious software (malware), calling for new analysis approaches. We represent binaries using their graph properties of the Control Flow Graph (CFG) structure and conduct an in-depth analysis of malicious graphs extracted from the Android and IoT malware to understand their… ▽ More

    Submitted 11 February, 2019; originally announced February 2019.

    Comments: This paper is accepted as a poster for ISOC NDSS 2019

  22. arXiv:1902.03531  [pdf, other

    cs.NI

    Analyzing Endpoints in the Internet of Things Malware

    Authors: **chun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen

    Abstract: The lack of security measures in the Internet of Things (IoT) devices and their persistent online connectivity give adversaries an opportunity to target them or abuse them as intermediary targets for larger attacks such as distributed denial-of-service (DDoS) campaigns. In this paper, we analyze IoT malware with a focus on endpoints to understand the affinity between the dropzones and their target… ▽ More

    Submitted 9 February, 2019; originally announced February 2019.

    Comments: 2 pages, 1 figure, Accepted as a poster for ISOC NDSS 2019

  23. Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering

    Authors: Aziz Mohaisen, Omar Alrawi, Jeman Park, Joongheon Kim, DaeHun Nyang, Manar Mohaisen

    Abstract: Using runtime execution artifacts to identify malware and its associated family is an established technique in the security domain. Many papers in the literature rely on explicit features derived from network, file system, or registry interaction. While effective, the use of these fine-granularity data points makes these techniques computationally expensive. Moreover, the signatures and heuristics… ▽ More

    Submitted 4 January, 2019; originally announced January 2019.

    Comments: 14 pages

    Journal ref: EAI Endorsed Transactions on Security and Safety, 5(16), 2018

  24. arXiv:1806.11263  [pdf, other

    cs.CR

    Gruut: A Fully-Decentralized P2P Public Ledger

    Authors: DaeHun Nyang

    Abstract: Owing to Satoshi Nakamoto's brilliant idea, a P2P public ledger is shown to be implementable in anonymous network. Any Internet user can then join the anonymous network and contribute to the P2P public ledger by providing their computing power or proof-of-work. The proof-of-work is a clever implementation of one-CPU-one-vote by anonymous participants, and it protects the Bitcoin ledger from illega… ▽ More

    Submitted 29 June, 2018; originally announced June 2018.

  25. arXiv:1112.2245  [pdf, ps, other

    cs.CR

    Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface

    Authors: DaeHun Nyang, Abedelaziz Mohaisen, Taekyoung Kwon, Brent Kang, Angelos Stavrou

    Abstract: The design of authentication protocols, for online banking services in particular and any service that is of sensitive nature in general, is quite challenging. Indeed, enforcing security guarantees has overhead thus imposing additional computation and design considerations that do not always meet usability and user requirements. On the other hand, relaxing assumptions and rigorous security design… ▽ More

    Submitted 9 December, 2011; originally announced December 2011.

    Comments: 15 pages, 13 figures, 5 tables

  26. Privacy in Location Based Services: Primitives Toward the Solution

    Authors: Abedelaziz Mohaisen, Dowon Hong, DaeHun Nyang

    Abstract: Location based services (LBS) are one of the most promising and innovative directions of convergence technologies resulting of emergence of several fields including database systems, mobile communication, Internet technology, and positioning systems. Although being initiated as early as middle of 1990's, it is only recently that the LBS received a systematic profound research interest due to its… ▽ More

    Submitted 15 March, 2009; originally announced March 2009.

    Comments: Appeared in proceeding of NCM 2008

  27. arXiv:0803.1111  [pdf, ps, other

    cs.CR

    Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks

    Authors: Abedelaziz Mohaisen, DaeHun Nyang, KyungHee Lee

    Abstract: The security of wireless sensor networks is an active topic of research where both symmetric and asymmetric key cryptography issues have been studied. Due to their computational feasibility on typical sensor nodes, symmetric key algorithms that use the same key to encrypt and decrypt messages have been intensively studied and perfectly deployed in such environment. Because of the wireless sensor… ▽ More

    Submitted 7 March, 2008; originally announced March 2008.

    Comments: 13 pages, 9 figures, 2 tables, to appear in the International Journal of Networks and Security

  28. arXiv:0803.0037  [pdf, ps, other

    cs.CR

    A Survey on Deep Packet Inspection for Intrusion Detection Systems

    Authors: Tamer AbuHmed, Abedelaziz Mohaisen, DaeHun Nyang

    Abstract: Deep packet inspection is widely recognized as a powerful way which is used for intrusion detection systems for inspecting, deterring and deflecting malicious attacks over the network. Fundamentally, almost intrusion detection systems have the ability to search through packets and identify contents that match with known attacks. In this paper, we survey the deep packet inspection implementations… ▽ More

    Submitted 29 February, 2008; originally announced March 2008.

    Comments: 10 pages, 7 figures, 1 table

    Journal ref: Magazine of Korea Telecommunication Society, vol. 24, No. 11, pp. 25-36, November 2007