GT Home > COE Home > ECE Home > Research > Labs > Communications Assurance and Performance Group
Georgia Tech

Publications

    Journal / Magazine Articles

  • Jie Su and Zhen Hong and Lei Ye and Tao Liu and Sizhuang Liang and Shouling Ji and Gagangeet Singh Aujla and Raheem Beyah and Zhenyu Wen. "Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices." In the IEEE Transactions on Consumer Electronics, 2023 [Download] [BibTex]
  • Ning Guo, Kevin Whitmore, Morris Cohen, Raheem Beyah, Lukas Graber. "A Non-invasive Circuit Breaker Arc Duration Measurement Method with Improved Robustness Based on Vibration-sound Fusion and Convolutional Neural Network." In the Energies, 2023 [Download] [BibTex]
  • Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah. "One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware." In the IEEE Transactions on Dependable and Secure Computing, 2023 [Download] [BibTex]
  • Zhen Hong, Lingling Lu, Dehua Zheng, Jiahui Suo, Peng Sun, Raheem Beyah, Zhenyu Wen. "Detect Insider Attacks in Industrial Cyber-Physical Systems Using Multi-Physical Features Based Fingerprinting." In the ACM Transactions on Sensor Networks, 2023 [Download] [BibTex]
  • Xirui Peng, Liang Yue, Sizhuang Liang, Stuart Montgomery, Chunliang Lu, Chieh-Min Cheng, Raheem Beyah, Ruike Zhao, and Jerry Qi. "Multi-color 3D Printing via Single-Vat Grayscale Digital Light Processing." In the Advanced Functional Materials, Vol. 32, No. 28, p. 2112329, April 2022 [Download] [BibTex]
  • Tianyu Du, Shouling Ji, Bo Wang, Sirui He, Jinfeng Li, Bo Li, Tao Wei, Yunhan Jia, Raheem Beyah, and Ting Wang. "DetectSec: Evaluating the Robustness of Object Detection Models to Adversarial Attacks." In International Journal of Intelligent Systems, Vol. 37, No. 9, pp. 6463-6492, February 2022. [Download] [BibTex]
  • Yiming Wu, Zhiyuan Xie, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Changting Lin, Shuiguang Deng, Zhoujun Jun, Ting Wang, and Raheem Beyah. "Fraud-agents Detection in Online Microfinance: A Large-scale Empirical Study." In the IEEE Transactions on Dependable and Secure Computing, February 2022. [Download] [BibTex]
  • Anni Zhou, Rishikesan Kamaleswaran, and Raheem Beyah. "OnAI-Comp: An Online AI Experts Competing Framework for Early Sepsis Detections." In the IEEE Transactions on Computational Biology and Bioinformatics, Vol. 19, No. 6, pp. 3595-3603, October 2021. [Download] [BibTex]
  • Changjiang Li, Shouling Ji, Haiqin Weng, Bo Li, Jie Shi, Raheem Beyah, Shanqing Guo, Zonghui Wang, and Ting Wang. "Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification, Applications." In the IEEE Transactions on Dependable and Secure Computing, Vol. 19, No. 6, pp. 3987-4001, September 2021. [Download] [BibTex]
  • Qinchen Gu, David Formby, Shouling Ji, Brendan Saltaformaggio, Anu Bourgeois, and Raheem Beyah. "This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems." In the IEEE Transactions on Dependable and Secure Computing, Vol. 19, No. 5, pp. 3218-3230, June 2021. [Download] [BibTex]
  • Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem Beyah, and Ting Wang. "Adversarial CAPTCHAs." In the IEEE Transactions on Cybernetics, Vol. 52, No. 7, pp. 6095-6108, May 2021 [Download] [BibTex]
  • Ayanna Howard and Charles Isbell and Raheem Beyah. "A Moonshot for Every Kid." Issues in Science and Technology, January 2021 (Invited) [Download] [BibTex]
  • Binbin Zhao, Shouling Ji, Weihan Lee, Changting Lin, Haiqin Weng, Jingzheng Wu, Pan Zhou, Liming Fang, and Raheem Beyah. "A Large-scale Empirical Study on the Vulnerability of Deployed IoT Devices". In the IEEE Transactions on Dependable and Secure Computing, Vol. 19, No. 3, pp. 1826-1840, November 2020 [Download] [BibTex]
  • Yuwei Li, Shouling Ji, Chenyang Lv, Yuan Chen, Jianhai Chen, Qinchen Gu, Chunming Wu, and Raheem Beyah. "V-Fuzz: Vulnerability Prediction Assisted EVolutionary Fuzzing for Binary Programs." In the IEEE Transactions on Cybernetics, Vol. 52, No. 5, pp. 3745-3756, September 2020 [Download] [BibTex]
  • Chengkun Wei, Qinchen Gu, Shouling Ji, Wenzhi Chen, Zonghui Wang, and Raheem Beyah. "OB-WSPES: A Uniform Evaluation System for Obfuscation-based Web Search Privacy." In the IEEE Transactions on Dependable and Secure Computing, Vol. 18, No. 6, pp. 2719-2735, December 2019 [Download] [BibTex]
  • Abbas Acar, Wenyi Liu, Raheem Beyah, Kemal Akkaya, Arif Selcuk Uluagac. "A Privacy-preserving Multi-factor Authentication System." In the Security and Privacy Journal (Wiley), Vol. 2, No. 5, p. e88, August 2019 [Download] [BibTex]
  • David Formby and Raheem Beyah. "Temporal Execution Behavior for Host Anomaly Detection in Programmable Logic Controllers." In the IEEE Transactions on Information Forensics and Security, Vol. 15, pp. 1455-1469, September 2019. [Download] [BibTex]
  • Long Cheng, Ke Tian, Danfeng (Daphne) Yao, Lui Sha, and Raheem Beyah. "Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems." In the IEEE Transactions on Dependable and Secure Computing, Vol. 18, No. 2, pp. 825-842, March 2019. [Download] [BibTex]
  • Xiaojing Liao, Sumayah Alrwais, Kan Yuan, Luyi Xing, Xiaofeng Wang, Shuang Hao, and Raheem Beyah. "Cloud repository as a malicious service: challenge, identification and implication." In the Cybersecurity, Vol. 14, No. 5, pp. 1337-1350, 2018. [Download] [BibTex]
  • Shreyas Kulkarni, Qinchen Gu, Eric Myers, Szilard Liptak, Lalith Polepeddi, Raheem Beyah, and Deepak Divan. "Enabling a Decentralized Smart Grid using Autonomous Edge Control Devices." In the IEEE Internet of Things Journal, Vol. 6, No. 5, pp. 7406-7419, Oct. 2019. [Download] [BibTex]
  • Zhen Hong, Qian Shao, Xiaojing Liao, and Raheem Beyah. "A Secure Routing Protocol with Regional Partitioned Clustering and Beta Trust Management in Smart Home." In the Springer Journal of Wireless Networks, Vol. 25, No. 7, pp. 3805-3823, December 2018. [Download] [BibTex]
  • Zhen Hong, Rui Wang, Shouling Ji, and Raheem Beyah. "Attacker Location Evaluation-based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems." In IEEE Transactions on Information Forensics & Security, Vol. 14, No. 5, pp. 1337-1350, October 2018. [Download] [BibTex]
  • Qinchen Gu, David Formby, Shouling Ji, Hasan Cam, and Raheem Beyah. "Fingerprinting for Cyber Physical System Security: Device Physics Matters Too." In the IEEE Security & Privacy Magazine, Vol. 16, No. 5, September/October 2018. [Download] [BibTex]
  • Celine Irvene, Samuel Litchfield, David Formby, and Raheem Beyah. "HoneyBot: A Honeypot for Robotic Systems." In the Proceedings of the IEEE, Vol. 106, No. 1, Jan. 2018. [Download] [BibTex]
  • Shukun Yang, Shouling Ji, and Raheem Beyah. "DPPG: A Dynamic Password Policy Generation System." In the IEEE Transactions on Information Forensics and Security, Vol. 13, No. 3, August 2017. [Download] [BibTex]
  • Xiaojing Liao, Preethi Srinivasan, David Formby, and Raheem Beyah. "Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid." In the IEEE Transactions on Dependable and Secure Computing, Vol. 16, No. 6, pp. 1026-1039, 2017. [Download] [BibTex]
  • Shouling Ji, Weiqing Li, Prateek Mittal, and Raheem Beyah. "De-SAG: On the De-anonymization of Structure-Attribute Graph Data." In the IEEE Transactions on Dependable and Secure Computing, Vol. 16, No. 4, pp. 594-607, 2017. [Download] [BibTex]
  • Trey Reece, Supreeth Sathyanarayana, William H. Robinson, and Raheem Beyah. "On The Outside Looking In: Towards Detecting Counterfeit Devices Using Network Traffic Analysis." In the IEEE Transactions on Multi-Scale Computing Systems, Vol. 3, No. 1, Jan.-March 1 2017. [Download] [BibTex]
  • Shouling Ji, Prateek Mittal, and Raheem Beyah, "Graph Data Anonymization, De-anonymization Attacks, and De-anonymizability Quantification: A Survey." IEEE Communications Surveys and Tutorials (COMST), Vol. 19, No. 2, Secondquarter 2017. [Download] [BibTex]
  • Shruthi Ravichandran, Ramalingam Chandrasekar, A. Selcuk Uluagac, and Raheem Beyah. "A Simple Visualization and Programming Framework for Wireless Sensor Networks." In the Elsevier Ad Hoc Networks Journal, Vol. 15, December 2016. [Download] [BibTex]
  • Samuel Litchfield, David Formby, Jonathan Rogers, Sakis Meliopoulos, and Raheem Beyah. "Re-thinking the Honeypot for Cyber-Physical Systems." In the IEEE Internet Computing Magazine - Special Issue on Cyber-Physical Security and Privacy, Vol. 20, No. 5, Sept.-Oct. 2016. [Download] [BibTex]
  • Shouling Ji, Weiqing Li, Mudhakar Srivasta, Jing He, and Raheem Beyah. "General Graph Data De-anonymizatiQuantificationon: From Mobility Traces to Social Networks." In the ACM Transactions on Information and System Security (TISSEC), Vol. 18, No. 4, May 2016. [Download] [BibTex]
  • Shouling Ji, Weiqing Li, Mudhakar Srivasta, and Raheem Beyah. "Structural Data De-anonymization: Theory and Practice." In the IEEE/ACM Transactions on Networking, Vol. 24, No. 6, December 2016. [Download] [BibTex]
  • Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, and Raheem Beyah. "Seed based De-anonymizablity Quantification of Social Networks." In the IEEE Transactions on Information Forensics and Security, Vol. 11, No. 7, July 2016. [Download] [BibTex]
  • Shouling Ji, Shukun Yang, Xin Hu, Weili Han, Zhigong Li, and Raheem Beyah. "Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords." In the IEEE Transactions on Dependable and Secure Computing, Vol. 14, No. 5, September 2015. [Download] [BibTex]
  • Shouling Ji, Mingyuan Yan, Raheem Beyah, and Zhipeng Cai. "Semi-Structure Routing and Analytical Frameworks for Cognitive Radio Networks." In the IEEE Transactions on Mobile Computing, Vol. 15, No. 4, June 2015. [Download] [BibTex]
  • Lanier Watkins, William H. Robinson, and Raheem Beyah. "Using Network Traffic to Infer Hardware State: A Kernel-Level Investigation." In the ACM Transactions on Embedded Computing Systems. Vol. 14, No. 3, May 2015. [Download] [BibTex]
  • Jing (Selena) He, Shouling Ji, Raheem Beyah, Ying Xie, and Yingshu Li. "Constructing Load-Balanced Virtual Backbones in Probabilistic Wireless Sensor Networks via Multi-Objective Genetic Algorithm." In the Transactions on Emerging Telecommunications Technologies, Vol 26, No. 2, February 2015. [Download] [BibTex]
  • Sang Shin Jung, Marco Valero, Anu Bourgeois, and Raheem Beyah. "Attacking and Securing Beacon-Enabled 802.15.4 Networks." In the Springer Journal of Mobile Communication, Computation and Information (Wireless Networks), Vol. 21, No. 5, July 2015. [Download] [BibTex]
  • Sakthi Vignesh Radhakrishnan, A. Selcuk Uluagac, and Raheem Beyah. "GTID: A Technique for Physical Device and Device Type Fingerprinting." In the IEEE Transactions on Dependable and Secure Computing, Vol. 12, No. 5, Sept.-Oct. 2015. [Download] [BibTex]
  • Shouling Ji, Raheem Beyah, and Zhipeng Cai. "Broadcast Scheduling with Latency and Redundancy Analysis for Cognitive Radio Networks." In the IEEE Transactions on Vehicular Technology, Vol. 64, No. 7, July 2015. [Download] [BibTex]
  • Shouling Ji, Raheem Beyah, and Zhipeng Cai. "Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks." In the IEEE Transactions on Mobile Computing, Vol. 13, No. 3, March 2014. [Download] [BibTex]
  • Shouling Ji, Jing He, A. Selcuk Uluagac, Raheem Beyah, and Yingshu Li. "Cell-based Snapshot and Continuous Data Collection in Wireless Sensor Networks." In the ACM Transactions on Sensor Networks, Vol. 9, No. 4, 2013. [Download] [BibTex]
  • A. Selcuk Uluagac, Raheem A. Beyah, and John A Copeland. "Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks." In the IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 4, April 2013. [Download] [BibTex]
  • Shouling Ji, A. Selcuk Uluagac, Raheem Beyah, and Zhipeng Cai. "Practical Unicast and Convergecast Scheduling Schemes for Cognitive Radio Networks." In the Journal of Combinatorial Optimization, Vol. 26, No. 1, July 2013. [Download] [BibTex]
  • Bongkyoung Kwon, Raheem A. Beyah, Myunghwan Lee, John A. Copeland. "OFDMA Resource Allocation in Mobile Multi-hop Relay Networks Using an Adaptive Frame Structure." In the Wireless Communications and Mobile Computing Journal, Vol. 13, No. 10, July 2013. [Download] [BibTex]
  • Marco Valero, Sang Shin Jung, Anu Bourgeois, and Raheem Beyah. "An Incrementally Deployable Energy Efficient 802.15.4 MAC Protocol (DEEP)." In the Ad Hoc Networks Journal (Elsevier), Vol. 10, No. 7, September, 2012. [Download] [BibTex]
  • Telvis E. Calhoun, Jr., Xiaojun Cao, Yingshu Li, and Raheem Beyah. "An 802.11 MAC Layer Covert Channel." In the Wireless Communications and Mobile Computing Journal, Vol. 12, No. 5, April 2012. [Download] [BibTex]
  • Lanier Watkins, William H. Robinson, and Raheem Beyah. "A Passive Solution to the CPU Resource Discovery Problem in Cluster Grid Networks." In the IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No. 12, pp. 2000-2007, December 2011. [Download] [BibTex]
  • Raheem Beyah and Aravind Venkataraman. "Rogue-Access-Point Detection: Challenges, Solutions and Future Directions." In the IEEE Security & Privacy Magazine, Vol. 9, No. 5, 2011. [Download] [BibTex]
  • Yingshu Li, Chunyu Ai, Zhipeng Cai, and Raheem Beyah. "Sensor Scheduling for p-Percent Coverage in Wireless Sensor Network." In the Journal of Cluster Computing - Special Issue on Algorithm and Distributed Computing in Wireless Sensor Networks. Vol. 14, No. 1, 2011. [Download] [BibTex]
  • Yingshu Li, Yiwei Wu, Chunyu Ai, and Raheem Beyah. "On the Construction of k-Connected m-Dominating Sets in Wireless Networks." In the Journal of Combinatorial Optimization, Vol. 23, No. 1, January 2012. [Download] [BibTex]
  • Lanier Watkins, William H. Robinson, and Raheem Beyah. "A Passive Solution to the Memory Resource Discovery Problem in Computational Clusters." In the IEEE Transactions on Network and Service Management, Vol. 7, No. 2, 2010. [Download] [BibTex]
  • A. Selcuk Uluagac, Raheem Beyah, Yingshu Li, and John Copeland. "VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks." In the IEEE Transactions on Mobile Computing. Vol. 9, No. 7, 2010. [Download] [BibTex]
  • Yingshu Li, Chunyu Ai, Chinh T. Vu, Yi Pan, and Raheem Beyah. "Delay Bounded and Energy Efficient Composite Event Monitoring in Heterogeneous Wireless Sensor Networks." In the IEEE Transactions on Parallel and Distributed Systems. Vol. 21, No. 9, 2010. [Download] [BibTex]
  • Bongkyoung Kwon, Raheem A. Beyah, and John A. Copeland. "Key Challenges in Securing WiMAX Mesh Networks." In the Security and Communication Networks Journal (Wiley) - Special Issue on WiMAX Security and Applications, Vol. 2., No. 5, 2009. (Invited) [Download] [BibTex]
  • Reed Newman and Raheem Beyah. "On the Performance of Using Covert Timing Channels for Node Authentication." In the Security and Communication Networks Journal (Wiley), Vol. 2, No. 6, 2009. [Download] [BibTex]
  • Chunyu Ai, Hailong Hou, Yingshu Li, and Raheem Beyah. "Authentic Delay Bounded Event Detection in Heterogeneous Wireless Sensor Networks." In the Ad Hoc Networks Journal (Elsevier), Vol. 7, No. 3, 2009. [Download] [BibTex]
  • Lanier Watkins, Cherita Corbett, and Raheem Beyah. "Using Link RTT to Passively Detect Unapproved Wireless Nodes." In the International Journal of Security and Networks, Vol. 4., No. 3, 2009. [Download] [BibTex]
  • Cherita Corbett, Raheem Beyah, and John Copeland. "Passive Classification of Wireless NICs during Active Scanning." In the International Journal of Information Security, Vol. 7., No. 5, September 2008. [Download] [BibTex]
  • Cherita Corbett, Raheem Beyah, and John Copeland. "Passive Classification of Wireless NICs during Rate Switching." In the EURASIP Journal on Wireless Communications and Networking, Vol. 2008, Article ID 495070, 12 pages, 2008. [Download] [BibTex]
  • Raheem Beyah, Raghupathy Sivakumar, and John Copeland. "GALO: A Deployable Framework for Providing Better Than Best-Effort Quality of Service." In the Journal of Interconnection Networks, Vol. 7, No. 3, September 2006. [Download] [BibTex]

  • Conference / Workshop / Symposium Proceedings

  • Roderick Gray and Morris Cohen and Kevin Whitmore and Lukas Graber and Ning Guo and Raheem Beyah. "LF Radio Receiver For Substation Intrusion Deterrent and Measurement Validation." In the IEEE Power & Energy Society General Meeting (PESGM 2023). [Download] [BibTex]
  • Ryan Pickren, Tohid Shekari, Saman Zonouz and Raheem Beyah. "Compromising Industrial Processes using Web-Based Programmable Logic Controller Malware." In the Proceedings of the Network and Distributed System Security Symposium (NDSS 2024).
  • Ning Guo, Kevin Whitmore, Samuel Neall, Roderick Gray, Morris Cohen, Raheem Beyah, and Lukas Graber. "Arc Duration Measurement of Vacuum Interrupter Based on Multi-sensor Fusion." In the 68th IEEE Holm Conference on Electrical Contacts (HOLM 2023). [Download] [BibTex]
  • Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, and Raheem Beyah. "SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices." In the 45th IEEE Symposium on Security and Privacy (S&P 2024). [Download]
  • Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, and Raheem Beyah. "UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware." In the 32nd USENIX Security Symposium (USENIX Security 23). [Download] [BibTex]
  • Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Peng Chen, and Raheem Beyah. "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing." In the 32nd USENIX Security Symposium (USENIX Security 23). [Download] [BibTex]
  • Ning Guo, Kevin Whitmore, Morris Cohen, Tohid Shekari, Raheem Beyah, and Lukas Graber. "Simulation and Measurement of the Magnetic Field Signature of a Vacuum Circuit Breaker and the Identification of Arcing." In the 67th IEEE Holm Conference on Electrical Contacts (HOLM 2022). [Download] [BibTex]
  • Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, and Raheem Beyah. "A Large-Scale Empirical Analysis of the Vulnerabilities Introduced by Third-party Components in IoT Firmware." In the 31st International Symposium on Software Testing and Analysis (ISSTA 2022). [Download] [BibTex]
  • Chenyang Lyu, Hong Liang, Shouling Ji, Xuhong Zhang, Binbin Zhao, Meng Han, Yun Li, Zhe Wang, Wenhai Wang, and Raheem Beyah. "SLIME: Program-sensitive Energy Allocation for Fuzzing." In the 31st International Symposium on Software Testing and Analysis (ISSTA 2022). [Download] [BibTex]
  • Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, and Ting Wang. "Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings." In the 43rd IEEE Symposium on Security and Privacy (S&P 2022). [Download] [BibTex]
  • Ning Guo, Kevin Whitmore, Morris Cohen, Tohid Shekari, Raheem Beyah, and Lukas Graber. "Magnetic Signature of Vacuum Interrupters during Load Switching." In the 40th IEEE Electrical Insulation Conference (EIC 2022). [Download] [BibTex]
  • Tohid Shekari, Alvaro Cardenas, and Raheem Beyah. "MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses." In the 31st USENIX Security Symposium, August 2022. [Download] [BibTex]
  • Sizhuang Liang, Saman Zonouz, and Raheem Beyah. "Hiding My Real Self! Protecting Intellectual Property in Additive Manufacturing Systems Against Optical Side-Channel Attacks." In the 29th Annual Network and Distributed System Security Symposium (NDSS 2022). [Download] [BibTex]
  • Chenyang Lyu, Shouling Ji, Xuhong Zhang, Hong Liang, Binbin Zhao, Kangjie Lu, and Raheem Beyah. "EMS: History-Driven Mutation for Coverage-based Fuzzing." In the 29th Annual Network and Distributed System Security Symposium (NDSS 2022). [Download] [BibTex]
  • Tuan Le, Sriharsha Etigowni, Sizhuang Liang, Xirui Peng, Jerry Qi, Mehdi Javanmard, Saman Zonouz, and Raheem Beyah. "Physical Logic Bombs in 3D Printers via Emerging 4D Techniques." In the Annual Computer Security Applications Conference (ACSAC 2021). [Download] [BibTex]
  • Peiyu Liu, Shouling Ji, Xuhong Zhang, Qinming Dai, Kangjie Lu, Lirong Fu, Wenzhi Chen, Peng Cheng, Wenhai Wang, Raheem Beyah. "iFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware." In the 36th IEEE/ACM International Conference on Automated Software Engineering (ASE 2021). [Download] [BibTex]
  • Qinying Wang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Yuhong Kan, Zhaowei Lin, Changting Lin, Shuiguang Deng, Alex X. Liu, and Raheem Beyah. "MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols." In the 30th USENIX Security Symposium, August 2021. [Download] [BibTex]
  • Tohid Shekari, Celine Irvene, Alvaro Cardenas, and Raheem Beyah. "MaMIoT: Manipulation of Energy Market Leveraging High Wattage IoT Botnets." In the ACM Conference on Computer and Communications Security (ACM CCS), 2021. [Download] [BibTex]
  • Tianyu Du, Shouling Ji, Lujia Shen, Yao Zhang, Jinfeng Li, Jie Shi, Chengfang Fang, Jianwei Yin, Raheem Beyah, and Ting Wang. "Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks." In the ACM Conference on Computer and Communications Security (ACM CCS), 2021. [Download] [BibTex]
  • Sizhuang Liang, Xirui Peng, H. Jerry Qi, Saman Zonouz, and Raheem Beyah. "A Practical Side-channel Based Intrusion Detection System for Additive Manufacturing Systems". In the International Conference on Distributed Computing Systems (ICDCS) 2021. [Download] [BibTex]
  • Sriharsha Etigowni, Sizhuang Liang, Saman Zonouz, and Raheem Beyah. "Physics-Aware Security Monitoring against Structural Integrity Attacks in 3D Printers". In the 51st IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2021). [Download] [BibTex]
  • Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang. "UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers." In the USENIX Security Symposium, August 2021. [Download] [BibTex]
  • Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Wei-Han Lee, Tao Lu, Wenzhi Chen and Raheem Beyah. "Understanding the Security Risks of Docker Hub." In the Proceedings of the European Symposium on Research in Computer Security (ESORICS), September 2020. [Download] [BibTex]
  • Chenghui Shi, Shouling Ji, Qianjun Liu, Changchang Liu, Yuefeng Chen, Yuan He, Zhe Liu, Raheem Beyah, and Ting Wang. "Text Captcha Is Dead? A Large Scale Deployment and Empirical Study." In the Proceedings of the ACM Conference on Computer and Communications Security (CCS), October 2020. [Download] [BibTex]
  • Tianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang, Raheem Beyah. "SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems." In the 15th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2020). [Download] [BibTex]
  • Shouling Ji, Qinchen Gu, Haiqin Weng, Qianjun Liu, Pan Zhou, Jing Chen, Zhao Li, Raheem Beyah, and Ting Wang, "De-Health: All Your Online Health Information Are Belong to Us." In the IEEE International Conference on Data Engineering (ICDE) 2020. [Download] [BibTex]
  • Celine Irvene, Tohid Shekari, David Formby, and Raheem Beyah. "If I Knew Then What I Know Now: On Reevaluating DNP3 Security using Power Substation Traffic." In the Fifth Industrial Control System Security (ICSS19) Workshop. [Download] [BibTex]
  • Chenyang Lv, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, and Raheem Beyah. "MOPT: Optimized Mutation Scheduling for Fuzzers". In the Proceedings of the USENIX Security Symposium, 2019. [Download] [BibTex]
  • Tohid Shekari, Christian Bayens, Morris Cohen, Lukas Graber, and Raheem Beyah. "RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid." In the Proceedings of the Network and Distributed System Security (NDSS) Symposium, February 2019. [Download] [BibTex]
  • Binbin Zhao, Haiqin Weng, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He, and Raheem Beyah. "Towards Evaluating the Security of Image CAPTCHA in the Wild." In the ACM Workshop on Artificial Intelligence and Security (AiSec), Toronto, Canada, October 2018. [Download] [BibTex]
  • Halim Burak Yesilyurt, Hidayet Aksu, Selcuk Uluagac, and Raheem Beyah. "SOTA: Secure Over-the-Air Programming of IoT Devices." In the Proceedings of the IEEE Military Communications Conference (MILCOM), Los Angeles, California, October 2018. [Download] [BibTex]
  • David Formby, Milad Rad, and Raheem Beyah. "Lowering the Barriers to Industrial Control System Security with GRFICS." USENIX Workshop on Advances in Security Education (ASE), Baltimore, Maryland, August 2018. [Download] [BibTex]
  • Shouling Ji, Tianyu Du, Zhen Hong, Ting Wang, and Raheem Beyah. "Quantifying Graph Anonymity, Utility, and De-anonymity." In the Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Honolulu, Hawaii, April 2018. [Download] [BibTex]
  • Peng Wang, Xianghang Mi, Xiaojing Liao, Xiaofeng Wang, Kan Yuan, Feng Qian, and Raheem Beyah. "Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations." In the Proceedings of the Network and Distributed System Security (NDSS) Symposium, February 2018. [Download] [BibTex]
  • Xurong Li, Chunming Wu, Shouling Ji, Qinchen Gu and Raheem Beyah. "HSTS Measurement and A New Stripping Attack Against HTTPS." In the Proceedings of the International ICST Conference on Security and Privacy in Communication Networks (SecureComm), Niagra Falls, Canada, October 2017. [Download] [BibTex]
  • Christian Bayens, Tuan Le, Luis Garcia, Raheem Beyah, Mehdi Javanmard, Saman Zonouz. "See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing." Usenix Security Conference, 2017. [Download] [BibTex]
  • Sumayah Alrwais, Xiaojing Liao, Xianghang Mi, Peng Wang, XiaoFeng Wang, Feng Qian, Raheem Beyah, and Damon McCoy. "Under the Shadow of Sunshine: Understanding and Detecting BulletProof Hosting on Legitimate Service Provider Networks." IEEE Security and Privacy Symposium (Oakland), 2017. [Download] [BibTex]
  • David Formby, Anwar Walid, and Raheem Beyah. "A Case Study in Power Substation Network Dynamics." In the ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS), June 2017. [Download] [BibTex]
  • Shouling Ji, Shukun Yang, Anupam Das, Xin Hu, and Raheem Beyah. "Password Correlation: Quantification, Evaluation and Application." In the Proceedings of IEEE International Conference on Computer Communications (INFOCOM), May 2017. [Download] [BibTex]
  • Xiaojing Liao, Sumach Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, Shuang Hao, and Raheem Beyah. "Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service." In the Proceedings of the ACM Conference on Computer and Communications Security (CCS), October 2016. [Download] [BibTex]
  • Xiaojing Liao, Kan Yuan, XiaoFeng Wang, Zhou Li, Luyi Xing, and Raheem Beyah. "Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence." In the Proceedings of the ACM Conference on Computer and Communications Security (CCS), October 2016. [Download] [BibTex]
  • Xiaojing Liao, Kan Yuan, Xiaofeng Wang, Zhongyu Pei, Hao Yang, Jianjun Chen, Haixin Duan, Kun Du, Eihal Alowaisheq, Sumayah Alrwais, Luyi Xing, and Raheem Beyah. "Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search." In the proceedings of the IEEE Symposium on Security & Privacy (Oakland), May 2016. [Download] [BibTex]
  • Xiaojing Liao, Chang Liu, Damon Mccoy, Elaine Shi, Shuang Hao, and Raheem Beyah. "Characterizing Long-tail SEO Spam on Cloud Web Hosting Services." In the Proceedings of the International World Wide Web (WWW) Conference, April 2016. [Download] [BibTex]
  • Shouling Ji, Weiqing Li, Shukun Yang, Prateek Mittal, and Raheem Beyah. "On the Relative De-anonymizability of Graph Data: Quantification and Evaluation." In the Proceedings of IEEE International Conference on Computer Communications (INFOCOM), April 2016. [Download] [BibTex]
  • David Formby, Preethi Srinivasan, Andrew Leonard, Jonathan Rogers, and Raheem Beyah. "Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems." In the Proceedings of the Network and Distributed System Security (NDSS) Symposium, February 2016. [Download] [BibTex]
  • Shouling Ji, Shukun Yang, Ting Wang, Changchang Liu, Wei-Han Lee, and Raheem Beyah. "PARS: A Uniform and Open-source Password Analysis and Research System." In the Proceedings of Annual Computer Security Applications Conference (ACSAC), December 2015. [Download] [BibTex]
  • Chris Wampler, A. Selcuk Uluagac, Raheem Beyah. "Information Leakage in Encrypted IP Video Traffic." In the Proceedings of the IEEE Global Communications Conference (GLOBECOM), December 2015. [Download] [BibTex]
  • Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu, and Raheem Beyah. "SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization." In the Proceedings of USENIX Security (Security) Symposium, August 2015. [Download] [BibTex]
  • Shouling Ji, Zhipeng Cai, Jing (Selena) He, and Raheem Beyah. "Primary Social Behavior aware Routing and Scheduling for Cognitive Radio Networks." In the IEEE International Conference on Sensing, Communication, and Networking (SECON), June 2015. [Download] [BibTex]
  • Shouling Ji, Meng Han, Raheem Beyah, and Zhipeng Cai. "Whitespace Measurement and Virtual Backbone Construction for Cognitive Radio Networks: From the Social Perspective." In the IEEE International Conference on Sensing, Communication, and Networking (SECON), June 2015. [Download] [BibTex]
  • Troy Nunnally, A. Selcuk Uluagac, and Raheem Beyah. "InterSec: An Interaction System for Network Security Applications." In the IEEE International Conference on Communications (ICC), June 2015. [Download] [BibTex]
  • Shouling Ji, Weiqing Li, Neil Z. Gong, Prateek Mittal, and Raheem Beyah. "On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge." In the Proceedings of the Network and Distributed System Security (NDSS) Symposium, February 2015. [Download] [BibTex]
  • Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing Selena He, and Raheem Beyah. "Structure based Data De-anonymization of Social Networks and Mobility Traces." In the Proceedings of the Information Security Conference (ISC), October 2014. [Download] [BibTex]
  • Shouling Ji, Weiqing Li, Mudhakar Srivatsa, and Raheem Beyah. "Structural Data De-anonymization: Quantification, Practice, and Implications." In the Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2014. [Download] [BibTex]
  • David Formby, Sang Shin Jung, John Copeland, and Raheem Beyah. "An Empirical Study of TCP Vulnerabilities in Critical Power System Devices." In the Smart Energy Grid Security (SEGS) workshop, Scottsdale, Arizona, November 2014. [Download] [BibTex]
  • David Formby, Sang Shin Jung, Seth Walters, and Raheem Beyah. "A Physical Overlay Framework for Insider Threat Mitigation of Power System Devices." In the Proceedings of the IEEE Conference on Smart Grid Communications (SmartGridComm), November 2014. [Download] [BibTex]
  • Sang Shin Jung, David Formby, Carson Day, and Raheem Beyah. "A First Look at Machine-to-Machine Power Grid Network Traffic." In the Proceedings of the IEEE Conference on Smart Grid Communications (SmartGridComm), November 2014. [Download] [BibTex]
  • A. Selcuk Uluagac, Venkatachalam Subramanian, and Raheem Beyah. "Sensory Channel Threats to Cyber Physical Systems: A Wake-up Call." In the Proceedings of the IEEE Conference on Communications and Network Security (CNS), October 2014. [Download] [BibTex]
  • Jing (Selena) He, Shouling Ji, Raheem Beyah, and Zhipeng Cai. "Minimum-sized Influential Node Set Selection for Social Networks under the Independent Cascade Model." In the Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), August 2014. [Download] [BibTex]
  • Xiaojing Liao, David Formby, Carson Day and Raheem Beyah. "Towards Secure Meter Data Analysis via Distributed Differential Privacy." In the International Workshop on Trustworthiness of Smart Grids (ToSG), June 2014. [Download] [BibTex]
  • Xiaojing Liao, Selcuk Uluagac, and Raheem A. Beyah. "S-MATCH: Verifiable Privacy-preserving Profile Matching for Mobile Social Services." In the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2014. [Download] [BibTex]
  • Wenyi Liu, A. Selcuk Uluagac, Raheem Beyah. "MACA: A Privacy-Preserving Multi-factor Cloud Authentication System Utilizing Big Data." In the IEEE International Conference on Computer Communications (INFOCOM) 2014 Workshop on Security and Privacy in Big Data (BigSecurity), April 2014. [Download] [BibTex]
  • Albert Brzeczko Jr., A. Selcuk Uluagac, Raheem Beyah, John A. Copeland. "Active Deception Model for Securing Cloud Infrastructure." In the IEEE International Conference on Computer Communications (INFOCOM) 2014 Workshop on Security and Privacy in Big Data (BigSecurity), April 2014. [Download] [BibTex]
  • Jing (Selena) He, Shouling Ji, Xiaojing Liao, Hisham Haddad, and Raheem Beyah. "Minimum-sized Positive Influential Node Set Selection for Social Networks: Considering Both Positive and Negative Influences." In the IEEE International Performance, Computing, and Communication Conference (IPCCC), December 2013. [Download] [BibTex]
  • Troy Nunnally, Kulsoom Abdullah, A. Selcuk Uluagac, John A. Copeland and Raheem Beyah. "NAVSEC: A Recommender System for 3D Network Security." In the Proceedings of the Visualization for Cyber Security Workshop (VizSec), October 2013. [Download] [BibTex]
  • Supreeth Sathyanarayana, William H. Robinson, and Raheem Beyah. "A Network-based Approach to Counterfeit Detection." In the IEEE International Conference on Technologies for Homeland Security (HST), November 2013. [Download] [BibTex]
  • Shouling Ji, Mingyuan Yan, Raheem Beyah, and Zhipeng Cai. "Semi-Structure Routing and Performance Analysis for Cognitive Radio Networks." In the Proceedings of the IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), October 2013. (short paper) [Download] [BibTex]
  • Ramalingam Chandrasekar, Selcuk Uluagac, and Raheem Beyah. "PROVIZ: An Integrated Visualization and Programming Framework for WSNs." In the Proceedings of the IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp), October 2013. (short paper) [Download] [BibTex]
  • Sakthi Vignesh Radhakrishnan, Selcuk Uluagac, and Raheem Beyah. "Realizing an 802.11-based Covert Timing Channel Using Off-The-Shelf Wireless Cards." In the Proceedings of the IEEE Global Communications Conference (GLOBECOM), December 2013. [Download] [BibTex]
  • Jing (Selena) He, Shouling Ji, Raheem Beyah, and Yingshu Li. "A Multi-Objective Genetic Algorithm for Constructing Load-Balanced Virtual Backbones in Probabilistic Wireless Sensor Networks." In the Proceedings of in the IEEE Global Communications Conference (GLOBECOM), December 2013. [Download] [BibTex]
  • Selcuk Uluagac, Sakthi Vignesh Radhakrishnan, Cherita L. Corbett, Raheem Beyah. "A Passive Technique for Fingerprinting Wireless Devices with Wired-side Observations." In the Proceedings of the IEEE Conference on Communications and Network Security (CNS), October 2013. [Download] [BibTex]
  • Shouling Ji, Raheem Beyah, and Zhipeng Cai. "Minimum-Latency Broadcast Scheduling for Cognitive Radio Networks." In the Proceedings of the IEEE International Conference on Sensing, Communication, and Networking (SECON), June 2013. [Download] [BibTex]
  • Laura Heath, Henry Owen, Raheem Beyah, Radu State. "CLIP: Content Labeling in IPv6, a Layer 3 Protocol for Information Centric Networking." In the Proceedings of the IEEE International Conference on Communications (ICC), June 2013. [Download] [BibTex]
  • Troy Nunnally, Penyen Chi, Kulsoom Abdullah, A. Selcuk Uluagac, John A. Copeland, Raheem Beyah. "P3D: A Parallel 3D Coordinate Visualization for Advanced Network Scans." In the Proceedings of the IEEE International Conference on Communications (ICC), June 2013. [Download] [BibTex]
  • Venkatachalam Subramanian, Selcuk Uluagac, Hasan Cam, and Raheem Beyah. "Examining the Characteristics and Implications of Sensor Side Channels." In the Proceedings of the IEEE International Conference on Communications (ICC), June 2013. [Download] [BibTex]
  • Marco Valero, A. Selcuk Uluagac, Venkatachalam Subramanian, Ramalingam Chandrasekar, and Raheem Beyah. "The Monitoring Core: A Framework for Sensor Security Application Development." In the Proceedings of the IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), October 2012. [Download] [BibTex]
  • Aaron Goldman, Arif Selcuk Uluagac, Raheem Beyah, and John A. Copeland. "Plugging the Leaks without Unplugging Your Network in the Midst of Disaster." In the Proceedings of the IEEE Local Computer Networks Conference (LCN), October 2012. (short paper) [Download] [BibTex]
  • Troy Nunnally, Arif Selcuk Uluagac, John A. Copeland, and Raheem Beyah. "3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for Network Security." In the Proceedings of the IEEE Local Computer Networks Conference (LCN), October 2012. [Download] [BibTex]
  • Ramalingam Chandrasekar, Venkatachalam Subramanian, Arif Selcuk Uluagac, and Raheem Beyah. "SIMAGE: Secure and Link-Quality Cognizant Image Distribution for Wireless Sensor Networks." In the Proceedings of the IEEE Global Communications Conference (GLOBECOM), December 2012. [Download] [BibTex]
  • Marco Valero, Mingsen Xu, Nicholas A Mancuso, Wen-Zhan Song, and Raheem Beyah. "EDR2: A Sink Failure Resilient Approach for WSNs." In the Proceedings of the IEEE International Communications Conference (ICC), June 2012. [Download] [BibTex]
  • Marco Valero, Sang Shin Jung, Arif Selcuk Uluagac, Yingshu Li, and Raheem Beyah. "Di-Sec: A Distributed Security Framework for Heterogeneous Wireless Sensor Networks." In the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), March 2012. [Download] [BibTex]
  • Shouling Ji, Raheem A. Beyah, and Zhipeng Cai. "Snapshot/Continuous Data Collection Capacity for Large-Scale Probabilistic Wireless Sensor Networks." In the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), March 2012. [Download] [BibTex]
  • Russell Holloway and Raheem Beyah. "Covert DCF: A DCF-Based Covert Timing Channel in 802.11 Networks." In the Proceedings of the IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), October 2011. [Download] [BibTex]
  • Shouling Ji, Raheem A. Beyah, and Yingshu Li. "Continuous Data Collection Capacity of Wireless Sensor Networks Under Physical Interference Model." In the Proceedings of the IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), October 2011. [Download] [BibTex]
  • Jing Selena He, Zhipeng Cai, Shouling Ji, Raheem Beyah and Yi Pan. "A Genetic Algorithm for Constructing a Reliable MCDS in Probabilistic Wireless Networks." In the Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications (WASA 2011), August 2011. [Download] [BibTex]
  • Longjiang Guo, Raheem A. Beyah, and Yingshu Li. "SMITE: A Stochastic Compressive Data Collection Protocol for Mobile Wireless Sensor Networks" In the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), April 2011. [Download] [BibTex]
  • A. Selcuk Uluagac, Raheem A. Beyah, and John Copeland. "TIme-Based Dynamic Keying and En-route Filtering (TICK) for Wireless Sensor Networks." In the Proceedings of the IEEE Global Communications Conference (GLOBECOM), December 2010. [Download] [BibTex]
  • Sang Shin Jung, Marco Valero, Anu Bourgeois, and Raheem Beyah. "Attacking Beacon-Enabled 802.15.4 Networks." In the Proceedings of the International Conference on Security and Privacy in Communication Networks (SecureComm), September 2010. [Download] [BibTex]
  • Himali Saxena, Chunyu Ai, Marco Valero, Yingshu Li, and Raheem Beyah. "DSF - A Distributed Security Framework for Heterogeneous Wireless Sensor Networks." In the Proceedings of the IEEE Military Communications Conference (MILCOM), October 2010. (Invited) [Download] [BibTex]
  • Ke Gao, Cherita L. Corbett, and Raheem A. Beyah. "A Passive Approach to Wireless Device Fingerprinting." In the Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2010. [Download] [BibTex]
  • Marco Valero, Raheem A. Beyah, and Anu Bourgeois. "DEEP: A Deployable Energy Efficient 802.15.4 MAC Protocol for Sensor Networks." In the Proceedings of the IEEE International Communications Conference (ICC), May 2010. [Download] [BibTex]
  • Aravind Venkataraman, Cherita L. Corbett, and Raheem A. Beyah. "A Wired-side Approach to MAC Misbehavior Detection." In the Proceedings of the IEEE International Communications Conference (ICC), May 2010. [Download] [BibTex]
  • Arif Selcuk Uluagac, Raheem A. Beyah, Roma Kane, Siddharth Joshi, and John A. Copeland. "Analysis of Varying AS Path Lengths from the Edge of the Network." In the Proceedings of the IEEE International Communications Conference (ICC), May 2010. [Download] [BibTex]
  • Aravind Venkataraman and Raheem Beyah. "Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC." In the Proceedings of the International ICST Conference on Security and Privacy in Communication Networks (SecureComm), September 2009. [Download] [BibTex]
  • Xuan Chaoting, John Copeland, and Raheem Beyah. "Toward Revealing Kernel Malware Behavior in Virtual Execution Environments." In the Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), September 2009. [Download] [BibTex]
  • Xuan Chaoting, John Copeland, and Raheem Beyah. "Shepherding Loadable Kernel Module through On-demand Emulation." In the Proceedings of the SIG SIDAR Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), 2009. [Download] [BibTex]
  • Telvis Calhoun, Reed Newman and Raheem Beyah. "Authentication in 802.11 LANs using a Covert Side Channel." In the Proceedings of the IEEE International Conference on Communications (ICC), June 2009. [Download] [BibTex]
  • Hailong Hou, Yan Chen, Raheem Beyah, and Yanqing Zhang. "Filtering Spam by Using Factors Hyperbolic Trees." In the Proceedings of the IEEE Global Communications Conference (GLOBECOM), December 2008. [Download] [BibTex]
  • A. Selcuk Uluagac, Christopher P. Lee, Raheem Beyah, and John A. Copeland. "Designing Secure Protocols for Wireless Sensor Networks." In the Proceedings of the International Conference on Wireless Algorithms, Systems and Applications (WASA), October 2008. [Download] [BibTex]
  • Reed Newman and Raheem Beyah. "A Performance Analysis of Authentication Using Covert Timing Channels." In the Proceedings of the IFIP/TC6 Networking 2008 (Networking), May 2008. - also published in LNCS, Vol. 4982, pp. 149-161, 2008. [Download] [BibTex]
  • Lanier Watkins, Raheem Beyah, and Cherita Corbett. "Passive Identification of Under Utilized CPUs in High Performance cluster Grid Networks." In the Proceedings of the IEEE International Conference on Communications (ICC), May 2008. [Download] [BibTex]
  • Kulsoom Abdullah, Greg Conti, and Raheem Beyah. "A Visualization Framework for Self-monitoring of Web-based Information Disclosure." In the Proceedings of the IEEE International Conference on Communications (ICC), May 2008. [Download] [BibTex]
  • Hailong Hou, Cherita Corbett, Yingshu Li, and Raheem Beyah. "Dynamic Energy-based Encoding and Filtering in Sensor Networks." In the Proceedings of the IEEE Military Communications Conference (MILCOM), October 2007. [Download] [BibTex]
  • Lanier Watkins, Raheem Beyah, and Cherita Corbett. "Using Network Traffic to Passively Detect Under Utilized Resources in High-Performance Cluster Grid Computing Environments." In the Proceedings of the International Conference on Networks for Grid Applications (GRIDNETS), October 2007. [Download] [BibTex]
  • Lanier Watkins, Raheem Beyah, and Cherita Corbett. "A Passive Approach to Rogue Access Point Detection." In the Proceedings of the IEEE Global Communications Conference (GLOBECOM), December 2007. [Download] [BibTex]
  • Chinh Vu, Raheem Beyah, and Yingshu Li. "A Composite Event Detection in Wireless Sensor Networks." In the Proceedings of the IEEE International Performance Computing and Communications Conference (IPCCC), April 2007. [Download] [BibTex]
  • Vaibhav Gupta, Raheem Beyah, and Cherita Corbett. "A Characterization of Wireless NIC Active Scanning Algorithms." In the Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), March 2007. [Download] [BibTex]
  • Cherita Corbett, Raheem Beyah, and John Copeland. "Using Active Scanning to Identify Wireless NICs." In the Proceedings of the IEEE Information Assurance Workshop (IAW), June 2006. [Download] [BibTex]
  • Cherita Corbett, Raheem Beyah, and John Copeland. "A Passive Approach to Wireless NIC Identification." In the Proceedings of the IEEE International Conference on Communications (ICC), June 2006. [Download] [BibTex]
  • Raheem Beyah, Cherita Corbett, and John Copeland. "The Case for Collaborative Distributed Wireless Intrusion Detection Systems." In the Proceedings of the IEEE International Conference on Granular Computing (GrC), May 2006. [Download] [BibTex]
  • Chris Lee, Jason Trost, Nicholas Gibbs, Raheem Beyah, and John Copeland. "Visual Firewall: Real-time Network Security Monitor." In the Proceedings of the IEEE Workshop on Visualization for Computer Security (VizSEC), October 2005. [Download] [BibTex]
  • Raheem Beyah, Shantanu Kangude, George Yu, Brian Strickland, and John Copeland. "Rogue Access Point Detection using Temporal Traffic Characteristics." In the Proceedings of the IEEE Global Communications Conference (GLOBECOM), December 2004. [Download] [BibTex]
  • Raheem Beyah, Raghupathy Sivakumar, and John Copeland. "Application Layer Switching: A Deployable Technique for Providing Quality of Service." In the Proceedings of the IEEE Global Communications Conference (GLOBECOM), December 2003. [Download] [BibTex]
  • Raheem Beyah, Raghupathy Sivakumar, and John Copeland. "Application Layer Striping: A Deployable Technique for Providing Quality of Service." In the Proceedings of the IEEE International Workshop on IP Operations and Management (IPOM), October 2003. [Download] [BibTex]
  • Jian Liu, Raheem Beyah, and John Copeland. "Implementation of an Efficient Transport Scheme for Real-Time Game Applications on HFC Cable Networks." In the Proceedings of the IEEE International Conference on Communications (ICC), May 2003. [Download] [BibTex]
  • Raheem Beyah, Corey S. Turner, Cherita Corbett, and John Copeland. "A Mobility Enhancement for Switched Wireless Ethernet with Soft Handoff." In the Proceedings of the IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), August 2002. [Download] [BibTex]
  • Raheem Beyah, Mike Holloway, and John Copeland. "Invisible Trojan: A Design and Implementation." In the Proceedings of the IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), August 2002. [Download] [BibTex]

  • Demos and Posters

  • Samuel Litchfield, David Formby, Sakis Meliopoulos, Jonathan Rogers, and Raheem Beyah. "Re-thinking the Honeypot for Cyber-Physical Systems." IEEE Symposium on Security & Privacy(IEEE Posters), May 2016. (Poster) [Download]
  • Qinchen Gu, Shouling Ji, and Raheem Beyah. "Towards Understanding Health Information Leakage through Social Networks." IEEE Symposium on Security & Privacy(IEEE Posters), May 2016. (Poster) [Download]
  • Weiqing Li, Shouling Ji, and Raheem Beyah. "ShareSafe the Complete Collection of Tools for Graph Data Privacy Analysis." The Annual Computer Security Applications Conference (ACSAC Posters), December 2015. (Poster)
  • Shukun Yang, Shouling Ji, Xin Hu, and Raheem Beyah. "Effectiveness and Soundness of Commercial Password Strength Meters." The Network and Distributed System Security (NDSS) Symposium (NDSS Posters), February 2015. (Poster)
  • Wenyi Liu, A. Selcuk Uluagac, and Raheem Beyah. "A Multi-factor Re-authentication Framework with User Privacy." The IEEE Conference on Communications and Network Security (CNS Posters), October 2014. (Poster)
  • Shouling Ji, Shukun Yang, Weiqing Li, Xiaojing Liao, and Raheem Beyah. "Password Cracking: A Large-Scale Empirical Study." Usenix Security Conference (USENIX Security Posters), August 2014.
  • Shouling Ji, Weiqing Li, Jing S. He, Mudhakar Srivatsa, Raheem Beyah. "Optimization based Data De-anonymization." The IEEE Symposium on Security & Privacy (Oakland Poster), May 2014.
  • Xiaojing Liao, David Formby, Carson Day, Raheem A. Beyah. "Di-PriDA: A Privacy-preserving Meter Querying System for Smart Grid Load Balancing." The IEEE Symposium on Security & Privacy (Oakland Poster), May 2014.
  • Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing (Selena) He, and Raheem Beyah. "De-anonymizing Mobility Traces and Social Data using Social Auxiliary Information." Network and Distributed System Security (NDSS) Symposium (NDSS Poster), February 2014. (Poster)
  • Xiaojing Liao, Arif Selcuk Uluagac, and Raheem Beyah. "S-Match: An Efficient Privacy-preserving Profile Matching Scheme." The IEEE Conference on Communications and Network Security (CNS Poster), October 2013. (Poster) [Download] [BibTex]
  • Shouling Ji, Mingyuan Yan, Yueming Duan, Jing He, Raheem Beyah, and Zhipeng Cai. "Broadcast Scheduling for Cognitive Radio Networks." The International Conference on Computer Communications Posters (INFOCOM Posters), April 2013. (Poster)
  • Sakthi Vignesh Radhakrishnan, Arif Selcuk Uluagac, Raheem Beyah. "A DCF-Based Covert Timing Channel for IEEE 802.11 with Off-The-Shelf Wireless Cards." The USENIX Security Symposium Posters (USENIX Security Posters), August 2012. (Poster) [Download] [BibTex]
  • Marco Valero, Sang Shin Jung, Arif Selcuk Uluagac, Yingshu Li, and Raheem Beyah. "The Monitoring Core (M-Core): Toward Fully Securing Heterogeneous Wireless Sensor Networks." The Annual Computer Security Applications Conference Posters (ACSAC Posters), December 2011. (Poster) [Download] [BibTex]
  • Marco Valero, Sang Shin Jung, Arif Selcuk Uluagac, Yingshu Li, and Raheem Beyah. "Di-Sec: A Distributed Security Framework for Heterogeneous Wireless Sensor Networks." The International Conference on Mobile Computing and Networking (MobiCom Demo), September 2011. (Demo) [Download]

  • Books

  • Raheem Beyah, Janise McNair, and Cherita Corbett (book editors), Security in Ad Hoc and Sensor Networks, World Scientific Publishing, Inc. In Press [Buy]

  • Book Chapters

  • Cherita Corbett, Raheem Beyah, and John Copeland. Securing Wireless Networks using Device Type Identification. In Security in Distributed and Networking Systems, (edited by Y. Xiao, and Y. Pan), World Scientific, 2007. [Buy]
  • Cherita Corbett, Raheem Beyah, and John Copeland. A Passive Approach to Unauthorized Sensor Node Identification. In Wireless Sensor Networks and Applications, (edited by Y. Li, M. Thai, and W. Wu), Chapter 17, Springer, 2005. [Buy]

  • Security Advisories

  • Vulnerability# ICS-VU-255987. Advisory (ICSA-17-089-02) - Schneider Electric Modicon M221, M241, and M251 Programmable Logic Controllers (PLCs) TCP Predictability Vulnerability, Insufficiently Random/Shared Session Numbers Vulnerability, and Insufficiently Protected Credentials Vulnerability. March 2017. [Link]
  • Vulnerability# ICS-VU-794684. Advisory (ICSA-16-070-01) - Schneider Electric Telvent RTU Improper Ethernet Frame Padding Vulnerability. March 2016. [Link]
  • Vulnerability# ICS-VU-130124. Advisory (ICSA-15-300-01) - Siemens RuggedCom Improper Ethernet Frame Padding Vulnerability. October 2015. [Link]
  • Vulnerability# ICS-VU-435619. Advisory (ICSA-15-006-01) - Eaton's Cooper Power Series Form 6 Control and Idea/IdeaPLUS Relays with Ethernet Vulnerability. July 2015. [Link]
  • Vulnerability# ICS-VU-532813. Advisory (ICSA-15-169-01) - Wind River VxWorks TCP Predictability Vulnerability in ICS Devices. Vendor: Wind River (vendors affected - Schneider Electric). June 2015. [Link]
  • Vulnerability# ICS-VU-643387. Advisory (ICSA-15-153-01) - Beckwith Electric TCP Initial Sequence Vulnerability. Vendor: Beckwith Electric. June 2015. [Link]
  • Vulnerability# ICS-VU-219288. Advisory (ICSA-15-041-02) - GE Hydran M2 Predictable TCP Initial Sequence Vulnerability. March 2015. [Link]

  • Patents

  • David Formby and Raheem Beyah. "Systems and Methods for SCADA and ICS Fingerprinting." US #11,228,517. Awarded 01/28/2022.
  • David Formby and Raheem Beyah. "Systems and Methods for Detecting Anomalous Software on a Programmable Logic Controller." Utility Patent #10,986,107. Awarded 04/20/2021.
  • Xiaofeng Wang, Kan Yuan, Xiaojing Liao, and Raheem A. Beyah. "Systems and methods for detection of infected websites." Utility Patent #10,880,330. Awarded 12/29/2020.
  • Raheem Beyah and Cherita Corbett. "Systems and Methods for Fingerprinting Physical Devices and Device Types Based on Network Traffic." Utility Patent #9,225,732. Awarded 12/29/2015. [Details]