Verisign Labs

Talented, Collaborative and Dedicated

The Verisign Labs team brings a tremendous breadth of expertise and talent.

Aziz Mohaisen

Aziz Mohaisen

Senior Research Scientist


Education

Ph.D. in Computer Science from the University of Minnesota - Twin Cities

Related Links

Biography

Aziz Mohaisen is a Senior Research Scientist on the Verisign Labs team. He obtained his Ph.D. in Computer Science from the University of Minnesota - Twin Cities in 2012, where he worked on several projects in the areas of systems security and data privacy. His Ph.D. dissertation was titled, "Towards trustworthy computing on social networks: measurements and new applications" and won a doctoral dissertation fellowship from the graduate school of the University of Minnesota. Before pursuing graduate studies at Minnesota, Aziz was a Member of Engineering Staff at the Electronics and Telecommunication Research Institute, a large R&D institute in South Korea. His research interests are broadly in the areas of networked systems, systems security, data privacy and measurements.

Research

Recent Publications

AV-Meter: An Evaluation of Antivirus Scans and Labels: Aziz Mohaisen and Omar Alrawi. 11th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), 2014.

Metadata-driven Threat Classification of Network Endpoints Appearing in Malware: Andrew West and Aziz Mohaisen. 11th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), 2014.

A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain: Youngbae Song, Hyoungshick Kim and Aziz Mohaisen. 11th International Conference on Trust, Privacy & Security in Digital Business (TrustBus), 2014.

Measuring the Leakage of Onion at the Root: Matt Thomas and Aziz Mohaisen. 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2014).

Characterizing Botnets-as-a-Service: Wentao Chang, An Wang, Aziz Mohaisen, and Songqing Chen. ACM SIGCOMM Conference (Poster), 2014.

Kindred Domains: Detecting and Clustering Botnet Domains Using DNS Traffic: Matt Thomas and Aziz Mohaisen. 6th Annual Workshop on Simplifying Complex Networks for Practitioners (SIMPLEX, with WWW), 2014.

Detecting Botnet Domains Using DNS Traffic: Matt Thomas and Aziz Mohaisen. The DNS Operations, Analysis, and Research Center (DNS-OARC) Workshop, 2014

Open Resolvers in the com/net Resolution: Duane Wessels and Aziz Mohaisen. The DNS Operations, Analysis, and Research Center (DNS-OARC) Workshop, 2014.

Fast and Low-Power Link Setup for IEEE 802.15.3c Multi-Gigabit/s WSN: Joongheon Kim, Aziz Mohaisen, and Jong-Kook Kim. IEEE Communication Letters, 2014.

SocialCloud: Trustworthy Distributed Computing on Social Networks: Aziz Mohaisen, Huy Tran, Abhishek Chandra, and Yongdae Kim. IEEE Transactions on Services Computing (TSC), 2014.

Chatter: Exploring Classification of Malware based on the Order of Events: Aziz Mohaisen, Omar Alrawi, Andrew West, and Allison Mankin. VeriSign Labs, Technical Report 2014.

AMAL: High-Fidelity, Behavior-based Automated Malware Analysis and Classification: Aziz Mohaisen and Omar Alrawi. VeriSign Labs, Technical Report 2014.

The Sybil Attack and Defenses: A survey: Aziz Mohaisen and Joongheon Kim. Smart Computing Review, 2013.

Keylogging-resistant Visual Authentication Protocols: DaeHun Nyang, Aziz Mohaisen, and Jeonil Kang. IEEE Transactions on Mobile Computing, 2014.

Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs: Aziz Mohaisen, Denis Foo Kune, Eugene Y. Vasserman, Myungsun Kim, Yongdae Kim. IEEE Transactions on Dependable and Secure Computing, Volume 10, pages 380-393, 2013.

A Methodical Evaluation of Antivirus Scans and Labels: Abedelaziz Mohaisen, Omar Alrawi, Matt Larson, and Danny McPherson.14th International Workshop on Information Security Applications (WISA 2013).

Improving Social Network-based Sybil Defenses by Augmenting Social Graphs: Abedelaziz Mohaisen and Scott Hollenbeck. 14th International Workshop on Information Security Applications (WISA 2013).

SocialCloud: Trustworthy Distributed Computing on Social Networks: Aziz Mohaisen, Huy Tran, Abhishek Chandra, and Yongdae Kim. IEEE Transactions on Services Computing, 2013.

ADAM: Automated Detection and Attribution of Malicious Webpages: Ahmed E. Kosba, Aziz Mohaisen, Andrew West, and Trevor Tonn. (Poster) First IEEE Conference on Communications and Network Security (CNS) -- Best poster award!

Babble: Identifying Malware by Its Dialects: Aziz Mohaisen, Omar Alrawi, Andrew West, and Allison Mankin.(Poster) First IEEE Conference on Communications and Network Security (CNS).

Characterization of the Dynamics and Interactions of Domain Names and Name Server: Mansurul Bhuiyan, Aziz Mohaisen, Yannis Labrou. (Poster) First IEEE Conference on Communications and Network Security (CNS).

The Sybil Attack and Defenses: A survey: Aziz Mohaisen, Joongheon Kim. Smart Computing Review, 2013.

Private Top-k Aggregation Protocols: Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon and Yongdae Kim. In the 15th Annual International Conference on Information Security and Cryptology (ICISC 2012).

Protecting Access Privacy of Cached Contents in Information Centric Networks: Abedelaziz Mohaisen, X. Zhang, M. Schuchard, H. Xie, Y. Kim, In ACM Conference on Computer and Communications Security (CCS 2012, Abstract)

Measuring Bias in the Mixing Time of Social Graphs due to Graph Sampling: Abedelaziz Mohaisen, Pengkui Luo, Yanhua Li, Yongdae Kim, Zhi-Li Zhang, In the 2012 Military Communications Conference (MILCOM 2012)

On the Mixing Time of Directed Social Graphs and Security Implications: Abedelaziz Mohaisen, Huy Tran, Nicholas Hopper, and Yongdae Kim, In The 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012)

Collaboration in Social Network-based Information Dissemination: Abedelaziz Mohaisen, Tamer AbuHmed, Ting Zhu, Manar Mohaisen, In The 28th IEEE International Conference on Communications (ICC 2012)

DEOS: Dynamic Energy-Oriented Scheduling for Sustainable Wireless Sensor Networks: Ting Zhu, Abedelaziz Mohaisen, Yi Ping, Don Towsley, The 31st IEEE Conference on Computer Communications (INFOCOM 2012)

Keep your friends close: Incorporating trust into social network-based Sybil defenses: Mohaisen, Nicholas Hopper, Yongdae Kim, In The 30th IEEE Conference on Computer Communications (INFOCOM 2011)

Losing control of the Internet: Using the data plane to attack the control plane: Max Schuchard, Eugene Y. Vasserman, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim,In The 18th ISOC Network and Distributed System Security Symposium (NDSS 2011)

Media: New Scientist, Slashdot, The Register

Measuring the mixing time of social graphs: Abedelaziz Mohaisen, Aaram Yun, Yongdae Kim, In The 10th ACM Internet Measurement Conference (IMC 2010)

SocialCloud: Using Social Networks for Building Distributed Computing Services: Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, and Yongdae Kim, Technical Report, CS Department, University of Minnesota (also in arXiv:1112.2254

Media: MIT Technology Review, The Verge, MSN.COM (French), DataNews (Dutch)

Unveiling Zeus: Automated Classification of Malware Samples: Abedelaziz Mohaisen and Omar Alrawi In SIMPLEX 2013 (held with WWW 2013), Rio de Janeiro, Brazil, May 2013 Also available as a Technical Report VRSN-TR-2013002, Verisign Labs, 2013

Protecting Access Privacy of Cached Contents in Information Centric Network: Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013) A shorter version appeared in ACM CCS 2012 (Poster). Also available as a Tech Report

Trustworthy Distributed Computing on Social Network: Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, and Yongdae Kim 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013) Also see media coverage in MIT TR, The Verge, MSN.COM, Data News

Dynamix: Anonymity on Dynamic Social Structures: Abedelaziz Mohaisen and Yongdae Kim 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)

Secure encounter-based social networks: Requirements, challenges, and designs: Abedelaziz Mohaisen, Denis Foo Kune, Eugene Vasserman, Myungsun Kim, and Yongdae Kim IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2013 Also appeared as an abstract and a poster in ACM CCS 2010

Trading Optimality for Scalability in Large-scale Opportunistic Routing: Yanhua Li, Abedelaziz Mohaisen, and Zhi-Li Zhang IEEE Transactions on Vehicular Technology (IEEE TVT), to appear, 2013

Parallel QRD-M encoder for multi-user MIMO systems: Manar Mohaisen, Abedelaziz Mohaisen, Merouane Debbah Springer's Telecommunication Systems Journal, 2013

Improving Social Network-based Sybil Defenses by Augmenting Social Graphs: Abedelaziz Mohaisen and Scott Hollenbeck Technical Report VRSN-TR-2013001, Verisign Labs, 2013

Recent Services

TPC Member, ICDCS 2013, July 8-11, 2013, Philadelphia, USA

TPC Member, HotPOST 2013 (with ICDCS 2013), July 8, 2013, Philadelphia, USA

TPC Member, CPNS 2013 (with ICDCS 2013), July 8, 2013, Philadelphia, USA

TPC Member, IWCMC 2013, July 1-5, 2013, Cagliari (Sardinia), Italy

TPC Member, TRUST 2013, June 17-19, 2013, London, UK

TPC Member, Networking 2013, May 22-24, 2013, Brooklyn, New York, USA

TPC Member, SIMPLEX 2013 (with WWW 2013), May 13-17, 2013, Rio de Janeiro, Brazil. (co-chair)

TPC Member, WiNMee 2013 (with WiOPT 2013), May 13-17, 2013, Tsukuba Science City, Japan

TPC Member, SCC 2013 (with ASIACCS 2013), May 8-10, 2013 Hangzhou, China.

TPC Member, ICISC 2012, Nov, 28-30, 2012 Seoul, Korea

TPC Member, ACM STC 2012, Oct, 16, 2012, Raleigh, NC, USA

FAITES CONNAISSANCE AVEC NOTRE ÉQUIPE