For a complete (updated) list of publications, please visit my Google Scholar.
Vanlyssel, J., Roman, GC., and Anwar, A. Silent Subversion: Sensor Spoofing Attacks via Supply Chain Implants in Satellite Systems (In Submission) [ArXiv Link] Vulnerability Disclosure, Media Coverage: [SecurityAffairs], [SCWorld]
Vanlyssel, J., Sobrados, E., Anwar, R., Roman, GC., and Anwar, A. Trusted Software, Hidden Threats: Multi-Vector Supply Chain Attacks Using Coordinated and Independent Components in Small Satellite (In Submission) Vulnerability Disclosure, Novel Attack Vector for Satellites (SPARTA)
Wayne Wang*, Aaron Ortwein*, Enrique Sobrados*, Robert Stanley, Piyush Kumar, Afsah Anwar, and Roya Ensafi. MVPNalyzer: An Investigative Framework for the Security & Privacy Audit of Mobile VPNs. In The Network and Distributed System Security (NDSS) Symposium, 2026. (* Authors contributed equally) Multiple Vulnerability Disclosures
Abusnaina, A., Anwar, A., Saad, M., Alabduljabbar, A., Jang, R., Salem, S., & Mohaisen, D. (2025). Exposing the Limitations of Machine Learning for Malware Detection Under Concept Drift. In International Conference on Web Information Systems Engineering (pp. 273-289). Best Paper Award
A. Anwar, Y. H. Chen, R. Hodgman, T. Sellers, E. Kirda, and A. Oprea. A Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet Devices. The Annual Computer Security Applications Conference (ACSAC 2022)
A. Abusnaina*, A. Anwar*, A. Alabduljabbar, S. Alshamrani, R. Jang, D. Nyang, and D. Mohaisen. Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems. The 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022) (* Authors contributed equally)
Anwar, A., Abusnaina, A., Chen, S., Li, F. and Mohaisen, D., 2021. Cleaning the NVD: Comprehensive quality assessment, improvements, and analyses. IEEE Transactions on Dependable and Secure Computing.
Saad, M., Anwar, A., Ravi, S. and Mohaisen, D., 2021, November. Revisiting nakamoto consensus in asynchronous networks: A comprehensive analysis of bitcoin safety and chainquality. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (pp. 988-1005).
Abusnaina, A., Abuhamad, M., Alasmary, H., Anwar, A., Jang, R., Salem, S., Nyang, D. and Mohaisen, D., 2021. Dl-fhmc: Deep learning-based fine-grained hierarchical learning approach for robust malware classification. IEEE Transactions on Dependable and Secure Computing.
Abusnaina, A., Anwar, A., Alshamrani, S., Alabduljabbar, A., Jang, R., Nyang, D. and Mohaisen, D., 2021, June. Systemically Evaluating the Robustness of ML-based IoT Malware Detectors. In 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S) (pp. 3-4). IEEE.
Afsah Anwar, Hisham Alasmary, Jeman Park, An Wang, Songqing Chen, and David Mohaisen. Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection. The 22nd International Conference on Information and Communications Security (ICICS 2020)
Alasmary, H., Abusnaina, A., Jang, R., Abuhamad, M., Anwar, A., Nyang, D. and Mohaisen, D., 2020, November. Soteria: Detecting adversarial examples in control flow graph-based malware classifiers. In 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS) (pp. 888-898). IEEE.
A. Abusnaina, A. Khormali, H. Alasmary, J. Park, A. Anwar and A. Mohaisen. Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems. IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2019).
M. Saad, A. Anwar, A. Ahmad, H. Alasmary, M. Yukesl, and A. Mohaisen. RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing. IEEE International Conference on Blockchain and Cryptocurrency (IEEE ICBC 2019).
A. Anwar, A. Khormali, and A. Mohaisen: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions. International Conference on Security and Privacy in Communication Networks (SecureComm 2018).
J. Choi, A. Abusnaina, A. Anwar, A. Wang, S. Chen, D. Nyang and A. Mohaisen. Honor Among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets. The 2019 IEEE Conference on Dependable and Secure Computing (DSC 2019).
H. Alasmary, A. Khormali, A. Anwar, J. Park, J. Choi, A. Abusnaina, A. Awad, D. Nyang, A. Mohaisen. Analyzing and Detecting Emerging Internet of Things Malware: A Graph-based Approach. IEEE Internet of Things Journal (IEEE IoT Journal 2019).
J. Choi, A. Anwar, A. Alabduljabbar, H. Alasmary, J. Spaulding, A. Wang, S. Chen, D. Nyang, A. Awad, and D. Mohaisen. Understanding Internet of Things malware by analyzing endpoints in their static artifacts. Computer Networks, 206, p.108768.
For IEEE publications:
© 2000-2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or blackistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
For ACM publications:
ACM COPYRIGHT NOTICE. Copyright © 2001-2020 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honoblack. Abstracting with cblackit is permitted. To copy otherwise, to republish, to post on servers, or to blackistribute to lists, requires prior specific permission and/or a fee. Request permissions from Publications Dept., ACM, Inc., fax +1 (212) 869-0481, or permissions@acm.org.