Publication
Publication
Achieving Zen: Combining Mathematical and Programmatic Deep Learning Model Representations for Attribution and Reuse
David Oygenblik, Dinko Dermendzhiev, Filippos Sofias, Mingxuan Yao, Haichuan Xu, Runze Zhang, Jeman Park, Amit Kumar Sikder, and Brendan Saltaformaggio
Accepted to appear in the 33rd Network and Distributed System Security Symposium (NDSS 2026)
Top-tier | Selected | Int'l Conference | BK21
[PDF], [Source Code] (Coming Soon!)
Lock the Door But Keep the Window Open: Extracting App-Protected Accessibility Information from Browser-Rendered Websites
Haichuan Xu, Runze Zhang, Mingxuan Yao, David Oygenblik, Yizhi Huang, Jeman Park, and Brendan Saltaformaggio
Accepted to appear in the 32nd ACM Conference on Computer and Communication Security (CCS 2025)
Top-tier | Selected | Int'l Conference | BK21
[PDF], [Source Code] (Coming Soon!)
Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code Deployment Reuse
Runze Zhang, Mingxuan Yao, Haichuan Xu, Omar Alrawi, Jeman Park*, and Brendan Saltaformaggio*
Proceedings of the 32nd Network and Distributed System Security Symposium (NDSS 2025), * co-corresponding authors
Top-tier | Selected | Int'l Conference | BK21
[PDF], [Source Code]
DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware
Haichuan Xu, Mingxuan Yao, Runze Zhang, Mohamed Moustafa Dawoud, Jeman Park*, and Brendan Saltaformaggio*
Proceedings of the 33rd Usenix Security Symposium (Security 2024), * co-corresponding authors
Top-tier | Selected | Int'l Conference | BK21
[PDF], [Source Code]
Media: [Tech Xplore], [MSN], [TechRadar], [Hackread], [Science of Security], [NY Breaking]
AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images
David Oygenblik, Carter Yagemann, Joseph Zhang, Arianna Mastali, Jeman Park*, and Brendan Saltaformaggio*
Proceedings of the 33rd Usenix Security Symposium (Security 2024), * co-corresponding authors
Top-tier | Selected | Int'l Conference | BK21
[PDF], [Source Code]
Media: [Tech Xplore], [Georgia Tech Research], [Georgia Tech]
Mistrust Plugins You Must: A Large-Scale Study of Malicious Plugins in WordPress Marketplaces
Ranjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park*, and Brendan Saltaformaggio*
Proceedings of the 31st Usenix Security Symposium (Security 2022), * co-corresponding authors
Top-tier | Selected | Int'l Conference | BK21
[PDF], [Source Code]
Media: [The Hacker News], [SiliconANGLE], [Security Affairs]
CSAW 22’ Applied Research Competition Finalist.
Featured in USENIX :login; Magazine [article].
Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection
Afsah Anwar, Hisham Alasmary, Jeman Park, An Wang, Songqing Chen, and David Mohaisen
Proceedings of the 22nd International Conference on Information and Communications Security (ICICS 2020).
Int'l Conference
Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers
Jeman Park, Aminollah Khormali, Manar Mohaisen, and Aziz Mohaisen
Proceedings of the 49th IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE/IFIP DSN 2019).
Int'l Conference | BK21 | Selected
Adversarial Learning Attacks on Graph-based IoT Malware Detection System
Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, and Aziz Mohaisen
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2019).
Int'l Conference | BK21
Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments
Jeman Park, Aziz Mohaisen, Charles Kamhoua, Michael Weisman, Nandi Leslie, and Laurent Njilla
Proceedings of the 20th World Conference on Information Security Applications (WISA 2019).
Int'l Conference
Graph-based Comparison of IoT and Android Malware
Hisham Alasmary, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, and Aziz Mohaisen
Proceedings of the 16th International Conference on Social Networks (CSoNet 2018).
Int'l Conference
Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks
Jeman Park, DaeHun Nyang, and Aziz Mohaisen
Proceedings of the 16th International Conference on Privacy, Security and Trust (PST 2018).
Int'l Conference
QoI: Assessing Participation in Threat Information Sharing
Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, and Aziz Mohaisen
Proceedings of the 43rd International Conference on Acoustics, Speech and Signal Processing (ICASSP 2018).
Int'l Conference
Mujaz: A Summarization-based Approach for Normalized Vulnerability Detection
Hattan Althebeiti, Brett Fazio, William Chen, Jeman Park, and David Mohaisen
IEEE Transactions on Dependable and Secure Computing (TDSC)
Selected | SCI/E Journal | JCR Top5%
[PDF], [Source Code] (Coming Soon!)
A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet
Jeman Park, Rhongho Jang, Manar Mohaisen, and David Mohaisen
IEEE/ACM Transactions on Networking (ToN), Vol. 30, No. 1, pp. 76-89, Aug. 2021.
SCI/E Journal | Selected | JCR Q1
Domain Name System Security and Privacy: A Contemporary Survey
Aminollah Khormali, Jeman Park, Hisham Alasmary, Afsah Anwar, Muhammad Saad, and David Mohaisen
Elsevier Computer Networks (COMNET), Vol. 185, 2021.
SCI/E Journal | JCR Q1
Assessing the Effectiveness of Pulsing Denial of Service Attacks under Realistic Network Synchronization Assumptions
Jeman Park, Manar Mohaisen, DaeHun Nyang, and David Mohaisen
Elsevier Computer Networks (COMNET), Vol. 173, 2020.
SCI/E Journal | JCR Q1
Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet
Jinchun Choi, Mohammed Abuhamad, Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Jeman Park, DaeHun Nyang, and David Mohaisen
IEEE Access, Vol. 8, 2020.
SCI/E Journal | JCR Q1
Self-Controllable Super-Resolution Deep Learning Framework for Surveillance Drones in Security Applications
Soohyun Park, Yeongeun Kang, Jeman Park, and Joongheon Kim
EAI Endorsed Transactions on Security and Safety, Vol. 7, No. 23, 2020.
Int'l Journal
Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service
Jeman Park, Jinchun Choi, DaeHun Nyang, and Aziz Mohaisen
IEEE Transactions on Network and Service Management (TNSM), Vol. 16, No. 4, pp. 1782-1796, 2019.
SCI/E Journal | JCR Top10%
Analyzing and Detecting Emerging Internet of Things Malware: A Graph-based Approach
Hisham Alasmary, Amin Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, Ahmed Abusnaina, Amro Awad, DaeHun Nyang, and Aziz Mohaisen
IEEE Internet of Things Journal (IoTj), Vol. 6, No. 5, pp. 8977-8988, 2019.
SCI/E Journal | JCR Top5%
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering
Aziz Mohaisen, Omar Alrawi, Jeman Park, Joongheon Kim, DaeHun Nyang, and Manar Mohaisen
EAI Endorsed Transactions on Security and Safety, Vol. 5, No. 16, 2018.
Int'l Journal
Thriving on Chaos: Proactive Detection of Command and Control Domains in Internet of Things-Scale Botnets using DRIFT
Jeffrey Spaulding, Jeman Park, Joongheon Kim, DaeHun Nyang, and Aziz Mohaisen
Wiley Transactions on Emerging Telecommunications Technologies, e3505, 2018.
SCI/E Journal
Detecting Malicious Behaviors in Chrome Extensions: Verification through Contextual Permission Matching and Static Analysis
Minhyuk Hong, Himchan Choo, Jeman Park
Korea Computer Congress, 2025
Minhyuk Hong
Exploring the Potential Abuse of Commercial LLMs for Phishing Content Generation
Jinwoo Park, Jeman Park
Korea Computer Congress, 2025
Jinwoo Park
Analysis of Phishing Evasion Techniques via Google Translate and Detection of Phishing URLs Using translate.goog
Doyeon Kim, Jeman Park
Korea Computer Congress, 2025
Doyeon Kim
Early Detection of Phishing Domains using Machine Learning: Evaluation using CZDS Datasets and Challenges
Doyeon Kim, Jeman Park
Korea Software Congress, 2024
Doyeon Kim
A Comparative Study of WordPress Plugin Behaviors in Legitimate and Nulled Marketplaces
Taehyung Kim, Jeman Park
Korea Computer Congress, 2024
Taehyung Kim