International Conference Publications
- Ranjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park*, and Brendan Saltaformaggio*: “Mistrust Plugins You Must: A Large-Scale Study of Malicious Plugins in WordPress Marketplaces”, Proceedings of the 31st Usenix Security Symposium (Security 2022), Acceptance Rate: 17.2% (256/1492).
* co-corresponding authors
[PDF], [Source code]
Media: [The Hacker News], [SiliconANGLE], [Security Affairs], [The Tech Outlook], [GeorgiaTech News]
CSAW’22 Applied Research Competition Finalist.
Presented in USENIX ;login: Magazine [article]. - Afsah Anwar, Hisham Alasmary, Jeman Park, An Wang, Songqing Chen, and David Mohaisen: “Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection”, Proceedings of the 22nd International Conference on Information and Communications Security (ICICS 2020), Acceptance Rate: 23.7% (33/139).
- Jeman Park, Aminollah Khormali, Manar Mohaisen, and Aziz Mohaisen: “Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers”, Proceedings of the 49th IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE/IFIP DSN 2019), Acceptance Rate: 21.4% (54/252).
- Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, and Aziz Mohaisen: “Adversarial Learning Attacks on Graph-based IoT Malware Detection System”, Proceedings of the 39th IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2019), Acceptance Rate: 19.6% (118/602).
- Jeman Park, Aziz Mohaisen, Charles Kamhoua, Michael Weisman, Nandi Leslie, and Laurent Njilla: “Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments”, Proceedings of the 20th World Conference on Information Security Applications (WISA 2019).
- Hisham Alasmary, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, and Aziz Mohaisen: “Graph-based Comparison of IoT and Android Malware”, Proceedings of the 16th International Conference on Social Networks (CSoNet 2018).
- Jeman Park, DaeHun Nyang, and Aziz Mohaisen: “Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks”, Proceedings of the 16th International Conference on Privacy, Security and Trust (PST 2018).
- Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, and Aziz Mohaisen: “QoI: Assessing Participation in Threat Information Sharing”, Proceedings of the 43rd International Conference on Acoustics, Speech and Signal Processing (ICASSP 2018).
- Jeffrey Spaulding, Jeman Park, Joongheon Kim, and Aziz Mohaisen: “Proactive Detection of Algorithmically Generated Malicious Domains”, Proceedings of the 32nd International Conference on Information Networking (ICOIN 2018).
- Jeman Park, Jihye Kim, Seungho Kuk, Yongtae Park, and Hyogon Kim: “Exploring Smartphones as WAVE Devices”, Proceedings of the 82nd Vehicular Technology Conference (IEEE VTC-2015 Fall).
Journal Publications
- Jeman Park, Rhongho Jang, Manar Mohaisen, and David Mohaisen: “A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet”, IEEE/ACM Transactions on Networking (ToN), Vol. 30, No.1, pp. 76-89, 2021, (IF:3.56)
- Aminollah Khormali, Jeman Park, Hisham Alasmary, Afsah Anwar, Muhammad Saad, and David Mohaisen: “Domain Name System Security and Privacy: A Contemporary Survey”, Elsevier Computer Networks (COMNET), Vol. 185, 2021, (IF:4.47)
- Jeman Park, Manar Mohaisen, DaeHun Nyang, and David Mohaisen: “Assessing the Effectiveness of Pulsing Denial of Service Attacks under Realistic Network Synchronization Assumptions”, Elsevier Computer Networks (COMNET), Vol. 173, 2020, (IF:3.11)
- Jinchun Choi, Mohammed Abuhamad, Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Jeman Park, DaeHun Nyang, and David Mohaisen: “Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet”, IEEE Access, Vol. 8, 2020, (IF:3.75)
- Soohyun Park, Yeongeun Kang, Jeman Park, and Joongheon Kim: “Self-Controllable Super-Resolution Deep Learning Framework for Surveillance Drones in Security Applications”, EAI Endorsed Transactions on Security and Safety, Vol. 7, No. 23, 2020
- Jeman Park, Jinchun Choi, DaeHun Nyang, and Aziz Mohaisen: “Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service”, IEEE Transactions on Network and Service Management (TNSM), Vol. 16, No. 4, pp. 1782-1796, 2019, (IF:4.68)
- Hisham Alasmary, Amin Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, Ahmed Abusnaina, Amro Awad, DaeHun Nyang, and Aziz Mohaisen: “Analyzing and Detecting Emerging Internet of Things Malware: A Graph-based Approach”, IEEE Internet of Things Journal (IoTj), Vol. 6, No. 5, pp. 8977-8988, 2019, (IF:9.52)
- Aziz Mohaisen, Omar Alrawi, Jeman Park, Joongheon Kim, DaeHun Nyang, and Manar Mohaisen: “Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering”, EAI Endorsed Transactions on Security and Safety, Vol. 5, No. 16, 2018
- Jeffrey Spaulding, Jeman Park, Joongheon Kim, DaeHun Nyang, and Aziz Mohaisen: “Thriving on Chaos: Proactive Detection of Command and Control Domains in Internet of Things-Scale Botnets using DRIFT”, Wiley Transactions on Emerging Telecommunications Technologies, e3505, 2018, (IF:1.61)
- Song Gun Lee, Jeman Park, and Hyogon Kim: “A User-Side Energy-Saving Video Streaming Scheme for LTE Devices”, IEEE Communication Letters, Vol. 19, No. 6, pp. 965-968, 2015, (IF:1.27)