Publications

» Google Scholar » dblp « home

2018

BlockTag: Design and Applications of a Tagging System for Blockchain Analysis
Yazan Boshmaf, Husam Al Jawaheri, and Mashael Al Sabah
arXiv preprint
arXiv:1809.060441, Sep, 2018

Source Attribution of Cryptographic API Misuse in Android Applications
Ildar Muslukhov, Yazan Boshmaf, and Konstantin Beznosov
Proc. of 11th ACM Asia Conference on Computer and Communications Security
AsiaCCS ’18, Songdo, Incheon, Korea, Jun 2018

When A Small Leak Sinks A Great Ship: Deanonymizing Tor Hidden Service Users Through Bitcoin Transactions Analysis
Husam Al Jawaheri, Mashael Al Sabah, Yazan Boshmaf, and Aiman Erbad
arXiv preprint
arXiv:1801.07501, Jan, 2018

2016

Visualization of Actionable Knowledge to Mitigate DRDoS Attacks
Michael Aupetit, Yury Zhauniarovich, Giorgos Vasiliadis, Marc Dacier, and Yazan Boshmaf
Proc. of 2016 IEEE Symposium on Visualization for Cyber Security
VizSec ’16, Baltimore, MD, Oct 2016

Decoupling Data-at-Rest Encryption and Smartphone Locking with Wearable Devices
Ildar Muslukhov, San-Tsai Sun, Primal Wijesekera, Yazan Boshmaf, and Konstantin Beznosov
Elsevier Pervasive and Mobile Computing
Volume 32, Pages 26–34, Oct 2016

Íntegro: Leveraging Victim Prediction for Robust Fake Account Detection in Large Scale OSNs
Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Jorge Lería, Jose Lorenzo, Matei Ripeanu, Konstantin Beznosov, and Hassan Halawa
Elsevier Computers and Security
Volume 61, Pages 142–168, Aug 2016

Interacting with Large Distributed Datasets using Sketch
Mihai Budiu, Rebecca Isaacs, Derek Murray, Gordon Plotkin, Paul Barham, Samer Al-Kiswany, Yazan Boshmaf, Qingzhou Luo, and Alexandr Andoni
Proc. of 2016 Eurographics Symposium on Parallel Graphics and Visualization
EGPGV ’16, Groningen, the Netherlands, Jun 2016

Harvesting the Low-Hanging Fruits: Defending Against Automated Large-Scale Cyber-Intrusions by Focusing on the Vulnerable Population
Hassan Halawa, Konstantin Beznosov, Yazan Boshmaf, Baris Coskun, Elizeu Santos-Neto, and Matei Ripeanu
Proc. of 2016 New Security Paradigms Workshop
NSPW ’16, C Lazy U Ranc, CO, Sep 2016

2015

Thwarting Fake OSN Accounts by Predicting their Victims
Yazan Boshmaf, Matei Ripeanu, Konstantin Beznosov, and Elizeu Santos-Neto
Proc. 8th ACM Workshop on Artificial Intelligence and Security
AI-Sec ’15, Denver, CO, Oct 2015

Leveraging Victim Prediction for Robust Fake Account Detection in OSNs
Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Jorge Lería, Jose Lorenzo, Matei Ripeanu, and Konstantin Beznosov
Proc. of 2015 Network and Distributed System Security Symposium
NDSS ’15, San Diego, CA, Feb 2015

2014

To Befriend or Not? A Model of Friend Request Acceptance on Facebook
Hootan Rashtian, Yazan Boshmaf, Pooya Jaferian, and Konstantin Beznosov
Proc. of 2014 Symposium on Usable Privacy and Security
SOUPS ’14, Menlo Park, CA, July 2014

2013

Know Your Enemy: The Risk of Unauthorized Access in Smartphones by Insiders
Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester, and Konstantin Beznosov
Proc. of 15th International Conference on Human-Computer Interaction with Mobile Devices and Services
Mobile-CHI ’13, Munich, Germany, Aug 2013

Graph-based Sybil Detection in Social and Information Systems
Yazan Boshmaf, Konstantin Beznosov, and Matei Ripeanu
Proc. of 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
ASONAM ’13, Niagara Falls, Canada, August 2013 — best paper award

Adaptive Composition of Distributed Pervasive Applications in Heterogeneous Environments
Stephan Schuhmann, Klaus Herrmann, Kurt Rothermel, and Yazan Boshmaf
ACM Transactions on Autonomous and Adaptive Systems
Volume 8, Issue 2, Article No. 10, Jul 2013

2012

Key Challenges in Defending against Malicious Socialbots
Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu
Proc. of 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats
LEET ’12, San Jose, CA, April 2012

Understanding Users' Requirements for Data Protection in Smartphones
Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester, and Konstantin Beznosov
Proc. of 28th International Conference on Data Engineering Workshops
ICDEW ’12, Arlington, VA, April 2012

Design and Analysis of a Social Botnet
Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu
Elsevier Computer Networks
Volume 57 Issue 2, Pages 556-578, Feb 2013

2011

The Socialbot Network: When Bots Socialize for Fame and Money
Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu
Proc. of 27th Annual Computer Security Applications Conference
ACSAC ’11, Orlando, FL, Dec 2011 — outstanding paper award

2010

A Billion Keys, but Few Locks: The Crisis of Web Single Sign-on
San-Tsai Sun, Yazan Boshmaf, Kirstie Hawkey, and Konstantin Beznosov
Proc. of 2010 New Security Paradigms Workshop
NSPW ’10, Colonial Inn, Concord, MA, Dec 2010

2009

SIMD-Scan: Ultra Fast in-Memory Table Scan Using on-Chip Vector Processing Units
Thomas Willhalm, Nicolae Popovici, Yazan Boshmaf, Hasso Plattner, Alexander Zeier, and Jan Schaffner
Proc. of the VLDB Endowment
Volume 2, Issue 1, Pages 385-394, Aug 2009