Personal information

No personal information available

Activities

Education and qualifications (3)

Georgia Institute of Technology: GA, GA, US

2016-08-14 to 2023-05-01 | P.h.D (Electric and Computer Engineering)
Education
Source: Self-asserted source
Omar Alrawi

Purdue University: West Lafayette, IN, US

2007-08-01 to 2009-05-01 | M.S. (CERIAS)
Education
Source: Self-asserted source
Omar Alrawi

Purdue University: West Lafayette, IN, US

2004-05-01 to 2007-05-01 | B.S. (Computer Science)
Education
Source: Self-asserted source
Omar Alrawi

Works (20)

Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators

32nd USENIX Security Symposium (USENIX Security 23)
2023 | Conference paper
Part of ISBN: 978-1-939133-37-3
Contributors: Omar Alrawi; Athanasios Avgetidis; Kevin Valakuzhy; Charles Lever; Paul Burbage; Angelos D. Keromytis; Fabian Monrose; Manos Antonakakis
Source: Self-asserted source
Omar Alrawi

Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level

2023-11-15 | Conference paper
Contributors: Yufei Du; Omar Alrawi; Kevin Snow; Manos Antonakakis; Fabian Monrose
Source: check_circle
Crossref

Exposing the Rat in the Tunnel: Using Traffic Analysis for Tor-based Malware Detection

Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
2022 | Conference paper
Part of ISBN: 9781450394505
Contributors: Dodia, Priyanka; AlSabah, Mashael; Alrawi, Omar; Wang, Tao
Source: Self-asserted source
Omar Alrawi

View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy

2022-12-05 | Conference paper
Contributors: Aaron Faulkenberry; Athanasios Avgetidis; Zane Ma; Omar Alrawi; Charles Lever; Panagiotis Kintis; Fabian Monrose; Angelos D. Keromytis; Manos Antonakakis
Source: check_circle
Crossref

Forecasting Malware Capabilities From Cyber Attack Memory Images

30th USENIX Security Symposium USENIX Security 21)
2021 | Conference paper
Source: Self-asserted source
Omar Alrawi

Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages

The Network and Distributed System Security Symposium (NDSS)
2021 | Conference paper
Source: Self-asserted source
Omar Alrawi

The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle

USENIX Security Symposium
2021-08 | Conference paper | Conceptualization, Data curation, Investigation, Methodology, Project administration, Writing - original draft
Contributors: Omar Alrawi; Charles Lever; Kevin Valakuzhy; Ryan Court; Kevin Snow; Fabian Monrose; Manos Antonakakis
Source: Self-asserted source
Omar Alrawi

IoTFinder: Efficient Large-Scale Identification of IoT Devices via Passive DNS Traffic Analysis

2020 IEEE European Symposium on Security and Privacy (EuroS&P)
2020 | Conference paper
Source: Self-asserted source
Omar Alrawi

Tardis: Rolling back the clock on cms-targeting cyber attacks

2020 IEEE Symposium on Security and Privacy (SP)
2020 | Conference paper
Source: Self-asserted source
Omar Alrawi

Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries.

The Network and Distributed System Security Symposium (NDSS)
2019 | Conference paper
Source: Self-asserted source
Omar Alrawi

Sok: Security evaluation of home-based iot deployments

2019 IEEE symposium on security and privacy (sp)
2019 | Conference paper
Source: Self-asserted source
Omar Alrawi

The betrayal at cloud city: An empirical analysis of cloud-based mobile backends

28th ${$USENIX$}$ Security Symposium (${$USENIX$}$ Security 19)
2019 | Conference paper
Source: Self-asserted source
Omar Alrawi

Systems and methods for behavior-based automated malware analysis and classification

2017-09 | Other
Source: Self-asserted source
Omar Alrawi

Chains of distrust: Towards understanding certificates used for signing malicious applications

Proceedings of the 25th International Conference Companion on World Wide Web
2016 | Conference paper
Source: Self-asserted source
Omar Alrawi

AMAL: high-fidelity, behavior-based automated malware analysis and classification

computers & security
2015 | Journal article
Source: Self-asserted source
Omar Alrawi

Av-meter: An evaluation of antivirus scans and labels

International conference on detection of intrusions and malware, and vulnerability assessment
2014 | Conference paper
Source: Self-asserted source
Omar Alrawi

Chatter: Classifying malware families using system event ordering

2014 IEEE Conference on Communications and Network Security
2014 | Conference paper
Source: Self-asserted source
Omar Alrawi

Babble: Identifying malware by its dialects

2013 IEEE Conference on Communications and Network Security (CNS)
2013 | Conference paper
Source: Self-asserted source
Omar Alrawi

Towards a methodical evaluation of antivirus scans and labels

International Workshop on Information Security Applications
2013 | Conference paper
Source: Self-asserted source
Omar Alrawi

Unveiling zeus: automated classification of malware samples

Proceedings of the 22nd International Conference on World Wide Web
2013 | Conference paper
Source: Self-asserted source
Omar Alrawi