Publications

» Google Scholar » dblp « Home

2022

Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS
Mashael Al Sabah, Mohamed Nabeel, Euijin Choo, and Yazan Boshmaf
Proc. of 25th Symposium on Research in Attacks, Intrusions and Defenses
RAID ’22, Limassol, Cyprus, Oct 2022

Dizzy: Large-Scale Crawling and Analysis of Onion Services
Isuranga Perera and Yazan Boshmaf
arXiv preprint
arXiv:2209.07202, Sep 2022

2020

Deanonymizing Tor Hidden Service Users Through Bitcoin Transactions Analysis
Husam Al Jawaheri, Mashael Al Sabah, Yazan Boshmaf, and Aiman Erbad
Elsevier Computers & Security
Volume 89, Article 101684, Feb 2020

Investigating MMM Ponzi Scheme on Bitcoin
Yazan Boshmaf, Charitha Elvitigala, Husam Al Jawaheri, Primal Wijesekera, and Mashael Al Sabah
Proc. of 15th ACM Asia Conference on Computer and Communications Security
AsiaCCS ’20, Taipei, Taiwan, Oct 2020

2019

Characterizing Bitcoin Donations to Open Source Software on GitHub
Yury Zhauniarovich, Yazan Boshmaf, Husam Al Jawaheri, and Mashael Al Sabah
arXiv preprint
arXiv:1907.04002, Jul 2019

BlockTag: Design and Applications of a Tagging System for Blockchain Analysis
Yazan Boshmaf, Husam Al Jawaheri, and Mashael Al Sabah
Proc. of 34th International Conference on ICT Systems Security and Privacy Protection
IFIP SEC ’19, Lisbon, Portugal, Jun 2019

2018

Source Attribution of Cryptographic API Misuse in Android Applications
Ildar Muslukhov, Yazan Boshmaf, and Konstantin Beznosov
Proc. of 13th ACM Asia Conference on Computer and Communications Security
AsiaCCS ’18, Songdo, Incheon, Korea, Jun 2018

2016

Visualization of Actionable Knowledge to Mitigate DRDoS Attacks
Michael Aupetit, Yury Zhauniarovich, Giorgos Vasiliadis, Marc Dacier, and Yazan Boshmaf
Proc. of 2016 IEEE Symposium on Visualization for Cyber Security
VizSec ’16, Baltimore, MD, Oct 2016

Decoupling Data-at-Rest Encryption and Smartphone Locking with Wearable Devices
Ildar Muslukhov, San-Tsai Sun, Primal Wijesekera, Yazan Boshmaf, and Konstantin Beznosov
Elsevier Pervasive and Mobile Computing
Volume 32, Pages 26–34, Oct 2016

Íntegro: Leveraging Victim Prediction for Robust Fake Account Detection in Large Scale OSNs
Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Jorge Lería, Jose Lorenzo, Matei Ripeanu, Konstantin Beznosov, and Hassan Halawa
Elsevier Computers and Security
Volume 61, Pages 142–168, Aug 2016

Interacting with Large Distributed Datasets using Sketch
Mihai Budiu, Rebecca Isaacs, Derek Murray, Gordon Plotkin, Paul Barham, Samer Al-Kiswany, Yazan Boshmaf, Qingzhou Luo, and Alexandr Andoni
Proc. of 2016 Eurographics Symposium on Parallel Graphics and Visualization
EGPGV ’16, Groningen, the Netherlands, Jun 2016

Harvesting the Low-Hanging Fruits: Defending Against Automated Large-Scale Cyber-Intrusions by Focusing on the Vulnerable Population
Hassan Halawa, Konstantin Beznosov, Yazan Boshmaf, Baris Coskun, Elizeu Santos-Neto, and Matei Ripeanu
Proc. of 2016 New Security Paradigms Workshop
NSPW ’16, C Lazy U Ranc, CO, Sep 2016

2015

Thwarting Fake OSN Accounts by Predicting their Victims
Yazan Boshmaf, Matei Ripeanu, Konstantin Beznosov, and Elizeu Santos-Neto
Proc. 8th ACM Workshop on Artificial Intelligence and Security
AI-Sec ’15, Denver, CO, Oct 2015

Leveraging Victim Prediction for Robust Fake Account Detection in OSNs
Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Jorge Lería, Jose Lorenzo, Matei Ripeanu, and Konstantin Beznosov
Proc. of 2015 Network and Distributed System Security Symposium
NDSS ’15, San Diego, CA, Feb 2015

2014

To Befriend or Not? A Model of Friend Request Acceptance on Facebook
Hootan Rashtian, Yazan Boshmaf, Pooya Jaferian, and Konstantin Beznosov
Proc. of 2014 Symposium on Usable Privacy and Security
SOUPS ’14, Menlo Park, CA, July 2014

2013

Know Your Enemy: The Risk of Unauthorized Access in Smartphones by Insiders
Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester, and Konstantin Beznosov
Proc. of 15th International Conference on Human-Computer Interaction with Mobile Devices and Services
Mobile-CHI ’13, Munich, Germany, Aug 2013

Graph-based Sybil Detection in Social and Information Systems
Yazan Boshmaf, Konstantin Beznosov, and Matei Ripeanu
Proc. of 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
ASONAM ’13, Niagara Falls, Canada, August 2013 — best paper award

Adaptive Composition of Distributed Pervasive Applications in Heterogeneous Environments
Stephan Schuhmann, Klaus Herrmann, Kurt Rothermel, and Yazan Boshmaf
ACM Transactions on Autonomous and Adaptive Systems
Volume 8, Issue 2, Article No. 10, Jul 2013

2012

Key Challenges in Defending against Malicious Socialbots
Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu
Proc. of 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats
LEET ’12, San Jose, CA, April 2012

Understanding Users' Requirements for Data Protection in Smartphones
Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester, and Konstantin Beznosov
Proc. of 28th International Conference on Data Engineering Workshops
ICDEW ’12, Arlington, VA, April 2012

Design and Analysis of a Social Botnet
Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu
Elsevier Computer Networks
Volume 57 Issue 2, Pages 556-578, Feb 2013

2011

The Socialbot Network: When Bots Socialize for Fame and Money
Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu
Proc. of 27th Annual Computer Security Applications Conference
ACSAC ’11, Orlando, FL, Dec 2011 — outstanding paper award

2010

A Billion Keys, but Few Locks: The Crisis of Web Single Sign-on
San-Tsai Sun, Yazan Boshmaf, Kirstie Hawkey, and Konstantin Beznosov
Proc. of 2010 New Security Paradigms Workshop
NSPW ’10, Colonial Inn, Concord, MA, Dec 2010

2009

SIMD-Scan: Ultra Fast in-Memory Table Scan Using on-Chip Vector Processing Units
Thomas Willhalm, Nicolae Popovici, Yazan Boshmaf, Hasso Plattner, Alexander Zeier, and Jan Schaffner
Proc. of the VLDB Endowment
Volume 2, Issue 1, Pages 385-394, Aug 2009