Publications

Group highlights

A complete list of publications can be found on Google Scholar.

Private Links, Public Leaks: Consequences of Frictionless User Experience on the Security and Privacy Posture of SMS-Delivered URLs

Muhammad Danish, Enrique Sobrados, Priya Kaushik, Bhupendra Acharya, Muhammad Saad, Abdullah Mueen, Sazzadur Rahaman, and Afsah Anwar

Arxiv

Multiple Vulnerability Disclosures

Ars Technica and Help Net Security

Silent Subversion: Sensor Spoofing Attacks via Supply Chain Implants in Satellite Systems

Jack Vanlyssel, Catalin Roman, and Afsah Anwar

In The 47th IEEE Aerospace Conference (2026)

Multiple Vulnerability Disclosures

SpyChain: Multi-Vector Supply Chain Attacks on Small Satellite Systems

Jack Vanlyssel, Enrique Sobrados, Ramsha Anwar, Catalin Roman, and Afsah Anwar

ArXiv

Novel Attack Vector for Satellites (SPARTA)

SecurityAffairs and SCWorld

MVPNalyzer: An Investigative Framework for the Security & Privacy Audit of Mobile VPNs

Wayne Wang, Aaron Ortwein, Enrique Sobrados*, Robert Stanley, Piyush Kumar, Afsah Anwar, and Roya Ensafi

In The Network and Distributed System Security (NDSS) Symposium (2026)

Multiple Vulnerability Disclosures

Exposing the Limitations of Machine Learning for Malware Detection Under Concept Drift

Abusnaina, A., Anwar, A., Saad, M., Alabduljabbar, A., Jang, R., Salem, S., & Mohaisen, D.

In International Conference on Web Information Systems Engineering (2025)

Best Paper Award

 

Full List of publications

Private Links, Public Leaks: Consequences of Frictionless User Experience on the Security and Privacy Posture of SMS-Delivered URLs
Muhammad Danish, Enrique Sobrados, Priya Kaushik, Bhupendra Acharya, Muhammad Saad, Abdullah Mueen, Sazzadur Rahaman, and Afsah Anwar
Arxiv

Silent Subversion: Sensor Spoofing Attacks via Supply Chain Implants in Satellite Systems
Jack Vanlyssel, Catalin Roman, and Afsah Anwar
In The 47th IEEE Aerospace Conference (2026)

SpyChain: Multi-Vector Supply Chain Attacks on Small Satellite Systems
Jack Vanlyssel, Enrique Sobrados, Ramsha Anwar, Catalin Roman, and Afsah Anwar
ArXiv

MVPNalyzer: An Investigative Framework for the Security & Privacy Audit of Mobile VPNs
Wayne Wang, Aaron Ortwein, Enrique Sobrados*, Robert Stanley, Piyush Kumar, Afsah Anwar, and Roya Ensafi
In The Network and Distributed System Security (NDSS) Symposium (2026)

Exposing the Limitations of Machine Learning for Malware Detection Under Concept Drift
Abusnaina, A., Anwar, A., Saad, M., Alabduljabbar, A., Jang, R., Salem, S., & Mohaisen, D.
In International Conference on Web Information Systems Engineering (2025)

A Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet Devices
A. Anwar, Y. H. Chen, R. Hodgman, T. Sellers, E. Kirda, and A. Oprea
The Annual Computer Security Applications Conference (2022)

Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems
A. Abusnaina, A. Anwar, A. Alabduljabbar, S. Alshamrani, R. Jang, D. Nyang, and D. Mohaisen
The 25th International Symposium on Research in Attacks, Intrusions and Defenses (2022)

Cleaning the NVD: Comprehensive quality assessment, improvements, and analyses
Anwar, A., Abusnaina, A., Chen, S., Li, F. and Mohaisen, D.
IEEE Transactions on Dependable and Secure Computing (2022)

Revisiting nakamoto consensus in asynchronous networks: A comprehensive analysis of bitcoin safety and chainquality
Saad, M., Anwar, A., Ravi, S. and Mohaisen, D.
Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (2021)

Dl-fhmc: Deep learning-based fine-grained hierarchical learning approach for robust malware classification
Abusnaina, A., Abuhamad, M., Alasmary, H., Anwar, A., Jang, R., Salem, S., Nyang, D. and Mohaisen, D.
IEEE Transactions on Dependable and Secure Computing (2021)

Systemically Evaluating the Robustness of ML-based IoT Malware Detectors
Abusnaina, A., Anwar, A., Alshamrani, S., Alabduljabbar, A., Jang, R., Nyang, D. and Mohaisen, D.
IEEE/IFIP International Conference on Dependable Systems and Networks – Supplemental Volume (2021)

Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection
Afsah Anwar, Hisham Alasmary, Jeman Park, An Wang, Songqing Chen, and David Mohaisen
The 22nd International Conference on Information and Communications Security (2020)

Soteria: Detecting adversarial examples in control flow graph-based malware classifiers
Alasmary, H., Abusnaina, A., Jang, R., Abuhamad, M., Anwar, A., Nyang, D. and Mohaisen, D.
IEEE International Conference on Distributed Computing Systems (2020)

Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems
A. Abusnaina, A. Khormali, H. Alasmary, J. Park, A. Anwar and A. Mohaisen
IEEE International Conference on Distributed Computing Systems (2019)

RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing
M. Saad, A. Anwar, A. Ahmad, H. Alasmary, M. Yukesl, and A. Mohaisen
IEEE International Conference on Blockchain and Cryptocurrency (2019)

Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions
A. Anwar, A. Khormali, and A. Mohaisen
International Conference on Security and Privacy in Communication Networks (2018)

Honor Among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets
J. Choi, A. Abusnaina, A. Anwar, A. Wang, S. Chen, D. Nyang and A. Mohaisen
IEEE Conference on Dependable and Secure Computing (2019)

Analyzing and Detecting Emerging Internet of Things Malware: A Graph-based Approach
H. Alasmary, A. Khormali, A. Anwar, J. Park, J. Choi, A. Abusnaina, A. Awad, D. Nyang, A. Mohaisen
IEEE Internet of Things Journal (2019)

Understanding Internet of Things malware by analyzing endpoints in their static artifacts
J. Choi, A. Anwar, A. Alabduljabbar, H. Alasmary, J. Spaulding, A. Wang, S. Chen, D. Nyang, A. Awad, and D. Mohaisen
Computer Networks (2022)