Omar Alrawi

Orcid: 0000-0002-4374-737X

According to our database1, Omar Alrawi authored at least 24 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SoK: An Essential Guide For Using Malware Sandboxes In Security Applications: Challenges, Pitfalls, and Lessons Learned.
CoRR, 2024

2023
Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators.
Proceedings of the 32nd USENIX Security Symposium, 2023

Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Exposing the Rat in the Tunnel: Using Traffic Analysis for Tor-based Malware Detection.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle.
Proceedings of the 30th USENIX Security Symposium, 2021

Forecasting Malware Capabilities From Cyber Attack Memory Images.
Proceedings of the 30th USENIX Security Symposium, 2021

Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
Measuring and Preventing Supply Chain Attacks on Package Managers.
CoRR, 2020

TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

IoTFinder: Efficient Large-Scale Identification of IoT Devices via Passive DNS Traffic Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

2019
The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends.
Proceedings of the 28th USENIX Security Symposium, 2019

SoK: Security Evaluation of Home-Based IoT Deployments.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering.
EAI Endorsed Trans. Security Safety, 2018

2016
Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications.
Proceedings of the 25th International Conference on World Wide Web, 2016

2015
AMAL: High-fidelity, behavior-based automated malware analysis and classification.
Comput. Secur., 2015

2014
AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

AV-Meter: An Evaluation of Antivirus Scans and Labels.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

Chatter: Classifying malware families using system event ordering.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Unveiling Zeus
CoRR, 2013

Unveiling Zeus: automated classification of malware samples.
Proceedings of the 22nd International World Wide Web Conference, 2013

Towards a Methodical Evaluation of Antivirus Scans and Labels - "If You're Not Confused, You're Not Paying Attention".
Proceedings of the Information Security Applications - 14th International Workshop, 2013

Babble: Identifying malware by its dialects.
Proceedings of the IEEE Conference on Communications and Network Security, 2013


  Loading...