I
am interested in all aspects of software engineering, pattern
recognition, and the theory of computation, with particular
emphasis on their applications to computer security. My current
research explores ways to use these bodies of knowledge to
develop faster, more scalable, and more accurate detectors of
mobile malware.
What
are some of the best places to publish a security paper? (also
under Mohamed R Chouchane and Mohamed Chouchane)
Research
Papers
1.
R. Chouchane, “Supporting Student Success in CS by
Building a Self-Sustaining, Diverse Team of Students”,
ACM MidSE 2016. Gatlinburg, TN, November 10-11 2016. p.87
2.
O. Horace and R. Chouchane, “Improving the Delivery and
Usability of our Data Structures Classes”, ACM MidSE
2016. Gatlinburg, TN, November 10-11 2016. p.30
H.
Fleenor, B. Alexander and R. Chouchane, “Tech Girls
Shine”. Charlotte, NC. August 14, 2015
K.
Corcoran and R. Chouchane, “Diversity In Technology: STARS
Computing Corps”, ACM MidSE 2015. Gatlinburg, TN, November
13-14 2015. p.55
R.
Chouchane, “Malicious Android Apps: Threat Assessment and
Open Problems”, ACM MidSE 2015. Gatlinburg, TN, November
13-14 2015. p.97
T.
Nguyen and R. Chouchane , “Using Unrestricted Mobile
Sensors to Infer Tapped and Traced User Inputs”, ITNG
2015. Las Vegas, NV, April 14-15 2015
T.
Nguyen and R. Chouchane , “Keystroke Inference Using
Unrestricted Mobile Sensors”, CISSE 2014. San Diego,
CA, June 16-18 2014
J.
Mobbs and R. Chouchane, “Applying Traditional Malware
Detection Methods to Detect Metamorphic, Mobile Android
Malware”, ACM MidSE 2014. Gatlinburg, TN, November 13-14
2014. p.42
R.
Chouchane, N. Stakhanova, A. Walenstein, and A. Lakhotia,
“Detecting Machine-morphed Malware Variants via Engine
Attribution”, Journal of Computer Virology and Hacking
Techniques, March 2013, DOI: 10.1007/s11416-013-0183-6
R.
Sardiñas and R. Chouchane, “Keeping up with
Modern-day Malware”, ACM MidSE 2012. Gatlinburg, TN,
November 15-16 2012. p.59
R.
Sardiñas, “Using Opaque Predicates to Obfuscate
Metamorphic Malware”, CSU Momentum Journal, Spring 2012.
(supervised by R. Chouchane)
S.
Watson and R. Chouchane, “The Challenges of Implementing a
STARS Leadership Corps Program at Columbus State University”,
ACM MidSE 2011. Gatlinburg, TN, November 10-11 2011. p.68
P.
Hill, S. Holder, R. Sardiñas, R. Chouchane. “Evaluation
of Different Feature Selection Strategies in Attributing
Morphing Malware to its Engine,” ACM MidSE 2011.
Gatlinburg, TN, November 10-11 2011. p.44
R.
Chouchane. “A Method for Detecting Machine-generated
Malware.” ACM SE 2011, Kennesaw, GA, March 24-26 2011.
M.
R. Chouchane. “Injecting Information Security in Core CS
Courses: Methods, Challenges, and Impact”. CISSE’09,
Seattle, WA, June 1-3, 2009.
M.
R. Chouchane, A. Walenstein, and A. Lakhotia. “Using
Markov Chains to Filter Machine-morphed Variants of Malicious
Programs”. MALWARE’08, Alexandria, VA, October 7-8,
2008.
A.
Walenstein, R. Mathur, M. R. Chouchane, and A. Lakhotia.
“Constructing Malware Normalizers Using Term Rewriting”.
Journal in Computer Virology 4(4): 307-322 (2008).
M.
R. Chouchane, A. Walenstein, and A. Lakhotia.“Statistical
Signatures for Fast Filtering of Instruction-substituting
Metamorphic Malware”. 5th Workshop on Recurring Malcode
(WORM 2007), Fairfax, VA, November 2007.
A.
Walenstein, R. Mathur, M. R. Chouchane, and A. Lakhotia. “The
Design Space of Metamorphic Malware”. 2nd International
Conference on i-Warfare and Security (ICIW 2007), Monterey, CA,
March 2007.
M.
R. Chouchane and A. Lakhotia. “Using Engine Signature to
Detect Metamorphic Malware”. Fourth Workshop on Recurring
Malcode (WORM 2006), Fairfax, VA, November 2006.
A.
Walenstein, R. Mathur, M. R. Chouchane, and A. Lakhotia.
“Normalizing Metamorphic Malware Using Term Rewriting”.
IEEE International Workshop on Source Code Analysis and
Manipulation (SCAM 2006), Philadelphia, PA, September 2006.
**Best Paper Award**.
M.
Venable, M. R. Chouchane, Md. E. Karim, and A. Lakhotia.
“Analyzing Memory Accesses in Obfuscated x86
Executables,”. K. Julisch and C. Kruegel (Eds.):
Conference on Detection of Intrusions and Malware &
Vulnerability Assessment (DIMVA 2005), LNCS 3548, pp. 1-18,
2005.
M.
R. Chouchane and R. Linton. “Comparative Performance of
C++ and Java Implementations of a Genetic Algorithm”. 41st
Annual Southeast ACM Conference, Savannah, Georgia, March 7-8,
2003: 202-207.
|