Radhouane Chouchane Online

Contact me anytime at chouchane_radhouane@columbusstate.edu

HOME

TEACHING

RESEARCH

ADVISING

I am interested in all aspects of software engineering, pattern recognition, and the theory of computation, with particular emphasis on their applications to computer security. My current research explores ways to use these bodies of knowledge to develop faster, more scalable, and more accurate detectors of mobile malware.


What are some of the best places to publish a security paper?
(also under Mohamed R Chouchane and Mohamed Chouchane)

Research Papers

  1. 1. R. Chouchane, “Supporting Student Success in CS by Building a Self-Sustaining, Diverse
    Team of Students”, ACM MidSE 2016. Gatlinburg, TN, November 10-11 2016. p.87

  2. 2. O. Horace and R. Chouchane, “Improving the Delivery and Usability of our Data
    Structures Classes”, ACM MidSE 2016. Gatlinburg, TN, November 10-11 2016. p.30

  3. H. Fleenor, B. Alexander and R. Chouchane, “Tech Girls Shine”. Charlotte, NC. August
    14, 2015

  4. K. Corcoran and R. Chouchane, “Diversity In Technology: STARS Computing Corps”, ACM MidSE 2015. Gatlinburg, TN, November 13-14 2015. p.55

  5. R. Chouchane, “Malicious Android Apps: Threat Assessment and Open Problems”, ACM MidSE 2015. Gatlinburg, TN, November 13-14 2015. p.97

  6. T. Nguyen and R. Chouchane , “Using Unrestricted Mobile Sensors to Infer Tapped and Traced User Inputs”, ITNG 2015. Las Vegas, NV, April 14-15 2015

  7. T. Nguyen and R. Chouchane , “Keystroke Inference Using Unrestricted Mobile
    Sensors”, CISSE 2014. San Diego, CA, June 16-18 2014

  8. J. Mobbs and R. Chouchane, “Applying Traditional Malware Detection Methods to Detect Metamorphic, Mobile Android Malware”, ACM MidSE 2014. Gatlinburg, TN, November 13-14 2014. p.42

  9. R. Chouchane, N. Stakhanova, A. Walenstein, and A. Lakhotia, “Detecting Machine-morphed Malware Variants via Engine Attribution”, Journal of Computer Virology and Hacking Techniques, March 2013, DOI: 10.1007/s11416-013-0183-6

  10. R. Sardiñas and R. Chouchane, “Keeping up with Modern-day Malware”, ACM MidSE 2012. Gatlinburg, TN, November 15-16 2012. p.59

  11. R. Sardiñas, “Using Opaque Predicates to Obfuscate Metamorphic Malware”, CSU Momentum Journal, Spring 2012. (supervised by R. Chouchane)

  12. S. Watson and R. Chouchane, “The Challenges of Implementing a STARS Leadership Corps Program at Columbus State University”, ACM MidSE 2011. Gatlinburg, TN, November 10-11 2011. p.68

  13. P. Hill, S. Holder, R. Sardiñas, R. Chouchane. “Evaluation of Different Feature Selection Strategies in Attributing Morphing Malware to its Engine,” ACM MidSE 2011. Gatlinburg, TN, November 10-11 2011. p.44

  14. R. Chouchane. “A Method for Detecting Machine-generated Malware.” ACM SE 2011, Kennesaw, GA, March 24-26 2011.

  15. M. R. Chouchane. “Injecting Information Security in Core CS Courses: Methods, Challenges, and Impact”. CISSE’09, Seattle, WA, June 1-3, 2009.

  16. M. R. Chouchane, A. Walenstein, and A. Lakhotia. “Using Markov Chains to Filter Machine-morphed Variants of Malicious Programs”. MALWARE’08, Alexandria, VA, October 7-8, 2008.

  17. A. Walenstein, R. Mathur, M. R. Chouchane, and A. Lakhotia. “Constructing Malware Normalizers Using Term Rewriting”. Journal in Computer Virology 4(4): 307-322 (2008).

  18. M. R. Chouchane, A. Walenstein, and A. Lakhotia.“Statistical Signatures for Fast Filtering of Instruction-substituting Metamorphic Malware”. 5th Workshop on Recurring Malcode (WORM 2007), Fairfax, VA, November 2007.

  19. A. Walenstein, R. Mathur, M. R. Chouchane, and A. Lakhotia. “The Design Space of Metamorphic Malware”. 2nd International Conference on i-Warfare and Security (ICIW 2007), Monterey, CA, March 2007.

  20. M. R. Chouchane and A. Lakhotia. “Using Engine Signature to Detect Metamorphic Malware”. Fourth Workshop on Recurring Malcode (WORM 2006), Fairfax, VA, November 2006.

  21. A. Walenstein, R. Mathur, M. R. Chouchane, and A. Lakhotia. “Normalizing Metamorphic Malware Using Term Rewriting”. IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), Philadelphia, PA, September 2006. **Best Paper Award**.

  22. M. Venable, M. R. Chouchane, Md. E. Karim, and A. Lakhotia. “Analyzing Memory Accesses in Obfuscated x86 Executables,”. K. Julisch and C. Kruegel (Eds.): Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2005), LNCS 3548, pp. 1-18, 2005.

  23. M. R. Chouchane and R. Linton. “Comparative Performance of C++ and Java Implementations of a Genetic Algorithm”. 41st Annual Southeast ACM Conference, Savannah, Georgia, March 7-8, 2003: 202-207.