Omar Alrawi
Orcid: 0000-0002-4374-737X
According to our database1,
Omar Alrawi
authored at least 24 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
SoK: An Essential Guide For Using Malware Sandboxes In Security Applications: Challenges, Pitfalls, and Lessons Learned.
CoRR, 2024
2023
Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators.
Proceedings of the 32nd USENIX Security Symposium, 2023
Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Exposing the Rat in the Tunnel: Using Traffic Analysis for Tor-based Malware Detection.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
IoTFinder: Efficient Large-Scale Identification of IoT Devices via Passive DNS Traffic Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
2018
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering.
EAI Endorsed Trans. Security Safety, 2018
2016
Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications.
Proceedings of the 25th International Conference on World Wide Web, 2016
2015
Comput. Secur., 2015
2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Towards a Methodical Evaluation of Antivirus Scans and Labels - "If You're Not Confused, You're Not Paying Attention".
Proceedings of the Information Security Applications - 14th International Workshop, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013