Refereed Publications [Google Scholar|DBLP]


Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis
  Milad Nasr, Amir Houmansadr and Arya Mazumdar
  ACM CCS 2017

The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks
  Milad Nasr, Hadi Zolfaghari, and Amir Houmansadr
  ACM CCS 2017

Graphene: A New Protocol for Block Propagation Using Set Reconciliation
  Pinar Ozisik, Gavin Andresen, George Bissias, Amir Houmansadr and Brian N. Levine
  CBT 2017

Towards Provably Invisible Network Flow Fingerprints
  Ramin Soltani, Dennis Goeckel, Don Towsley, and Amir Houmansadr
  Asilomar 2017

TagIt: Tagging Network Flows using Blind Fingerprints
  Fatemeh Rezaei and Amir Houmansadr
  PETS 2017

Achieving Perfect Location Privacy in Wireless Devices Using Anonymization
  Zarrin Montazeri, Amir Houmansadr, and Hossein Pishro-Nik
  IEEE Transactions on Information Forensics and Security 2017

Limits of Location Privacy under Anonymization and Obfuscation
  Nazanin Takbiri, Amir Houmansadr, Dennis Goeckel, and Hossein Pishro-Nik
  ISIT 2017

Fundamental Limits of Location Privacy Using Anonymization
  Nazanin Takbiri, Amir Houmansadr, Dennis Goeckel, and Hossein Pishro-Nik
  CISS 2017

SWEET: Serving the Web by Exploiting Email Tunnels
  Amir Houmansadr, Wenxuan Zhou, Matthew Caesar, and Nikita Borisov
  IEEE/ACM Transactions on Networking, January 2017

Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures
  Wojciech Mazurczyk, Steffen Wendzel, Sebastian Zander, Amir Houmansadr, and Krzysztof Szczypiorski
  Wiley-IEEE Press, February 2016
(Available on Amazon)

Covert Communications on Renewal Packet Channels
  Ramin Soltani, Dennis Goeckel, Don Towsley, and Amir Houmansadr
  Allerton Conference 2016

GAME OF DECOYS: Optimal Decoy Routing Through Game Theory
  Milad Nasr and Amir Houmansadr
  ACM CCS 2016 (acceptance rate: 16% = 137/831)

Practical Censorship Evasion Leveraging Content Delivery Networks
  Hadi Zolfaghari and Amir Houmansadr
  ACM CCS 2016 (acceptance rate: 16% = 137/831)

Achieving Perfect Location Privacy in Markov Models Using Anonymization
  Zarrin Montazeri, Amir Houmansadr, and Hossein Pishro-Nik
  ISITA 2016

CovertCast: Using Live Streaming to Evade Internet Censorship
  Richard McPherson, Amir Houmansadr, and Vitaly Shmatikov
  PETS 2016

Defining Perfect Location Privacy Using Anonymization
  Zarrin Montazeri, Amir Houmansadr, and Hossein Pishro-Nik
  CISS 2016

Know Your Achilles' Heel: Automatic Detection Of Network Critical Services
  Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard Kemmerer, and Christopher Kruegel
  ACSAC 2015

CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content
  John Holowczak and Amir Houmansadr
  ACM CCS 2015 (acceptance rate: 19.8% = 128/646)
  (Media: MIT Technology Review)

Covert Communications on Poisson Packet Channels
  Ramin Soltani, Dennis Goeckel, Don Towsley, and Amir Houmansadr
  Allerton Conference 2015

CloudTransport: Using Cloud Storage for Censorship-Resistant Networking
  Chad Brubaker, Amir Houmansadr, and Vitaly Shmatikov
  PETS 2014 (acceptance rate: 18.6% = 16/86)

No Direction Home: The True Cost of Routing Around Decoys
  Amir Houmansadr, Edmund L Wong, and Vitaly Shmatikov
  NDSS 2014 (acceptance rate: 18.6%)

Non-Blind Watermarking of Network Flows
  Amir Houmansadr, Negar Kiyavash, and Nikita Borisov
  IEEE/ACM Transactions on Networking, August 2014

Secloud: A Cloud-based Comprehensive and Lightweight Security Solution for Smartphones
  Saman A. Zonouz, Amir Houmansadr, Robin Berthier, Nikita Borisov, and William Sanders
  Journal of Computers & Security, September 2013

The Need for Flow Fingerprints to Link Correlated Network Flows
  Amir Houmansadr and Nikita Borisov
  PETS 2013 (acceptance rate: 18% = 13/69)

SWEET: Serving the Web by Exploiting Email Tunnels
  Wenxuan Zhou, Amir Houmansadr, Matthew Caesar, and Nikita Borisov
  HotPETs 2013

The Parrot is Dead: Observing Unobservable Network Communications
  Amir Houmansadr, Chad Brubaker, and Vitaly Shmatikov
  IEEE S&P (Oakland) 2013 (acceptance rate: 12% = 38/315)
  (Best Practical Paper Award of the IEEE S&P)

BotMosaic: Collaborative Network Watermark for the Detection of IRC-Based Botnets
  Amir Houmansadr and Nikita Borisov
  Journal of Systems and Software, March 2013

I Want My Voice to Be Heard: IP Over Voice-over-IP for Unobservable Censorship Circumvention
  Amir Houmansadr, Thomas Riedl, Nikita Borisov, and Andrew Singer
  NDSS 2013 (acceptance rate: 18.8% = 47/250)

CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing
  Qiyan Wang, Xun Gong, Giang Nguyen, Amir Houmansadr, and Nikita Borisov
  CCS 2012 (acceptance rate: 18.9% = 80/423)

Design, Analysis, and Implementation of Effective Network flow Watermarking Schemes
  Amir Houmansadr
  Ph.D. Thesis, Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, August 2012

EliMet: Security Metric Elicitation in Power Grid Critical Infrastructures by Observing System Administrators' Responsive Behavior
  Saman A. Zonouz, Amir Houmansadr, and Parisa Haghani
  DSN 2012 (acceptance rate: 17.3%)

Nexat: A History-based Approach to Predict Attacker Actions
  Casey Cipriano, Ali Zand, Amir Houmansadr, Christopher Kruegel, and Giovanni Vigna
  ACSAC 2011 (acceptance rate: 20% = 39/195)

Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability
  Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, and Nikita Borisov
  CCS 2011 (acceptance rate: 14% = 60/429)

A Cloud-based Intrusion Detection and Response System for Mobile Phones
  Amir Houmansadr, Saman A. Zonouz, and Robin Berthier
  WRAITS 2011

CoCo: Coding-Based Covert Timing Channels for Network Flows
  Amir Houmansadr and Nikita Borisov
  IH 2011 (acceptance rate: 32% = 22/68)

Stegobot: A Covert Social Network Botnet
  Shishir Nagaraja, Amir Houmansadr, Pragya Agarwal, Vijit Kumar, Pratch Piyawongwisal, and Nikita Borisov
  IH 2011 (acceptance rate: 32% = 22/68)
  Media: [New Scientist] [msnbc] [Times of India] [Security News Daily] [Think Digit] [Criminal Wisdom] [LaptopMag] [SiliconIndia] [CSL] [NetworkSolutionTips] [...]


Towards Improving Network Flow Watermarking Using the Repeat-Accumulate Codes
  Amir Houmansadr and Nikita Borisov
  ICASSP 2011

SWIRL: A Scalable Watermark to Detect Correlated Network Flows
  Amir Houmansadr and Nikita Borisov
  NDSS 2011 (acceptance rate: 20% = 28/139)

Multi-Flow Attack Resistant Watermarks for Network Flows
  Amir Houmansadr, Negar Kiyavash, and Nikita Borisov
  ICASSP 2009

RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows
  Amir Houmansadr, Negar Kiyavash, and Nikita Borisov
  NDSS 2009 (acceptance rate: 11.7% = 20/171)

Multi-flow Attacks Against Network Flow Watermarking Schemes
  Negar Kiyavash, Amir Houmansadr, and Nikita Borisov
  USENIX Security 2008 (acceptance rate: 15.9% = 27/170)

A Collusion-Resistant Video Watermarking Scheme
  Amir Houmansadr and Shahrokh Ghaemmaghami
  IH 2006

Robust Content-based Video Watermarking Exploiting Motion Entropy Masking Effect
  Amir Houmansadr, Hamed Pirsiavash, and Shahrokh Ghaemmaghami
  SIGMAP 2006

A Novel Video Watermarking Method Using Visual Cryptography
  Amir Houmansadr and Shahrokh Ghaemmaghami
  ICEIS 2006

Entropy Video Watermarking Using HVS Models
  Amir Houmansadr
  M.Sc. Thesis, Electrical Engineering Department, Sharif University of Technology, 2005

Robustness Enhancement of Content Based Watermarks using Entropy Masking Effect
  Amir Houmansadr and Shahrokh Ghaemmaghami
  IWDW 2005

A Digital Image Watermarking Scheme Based on Visual Secret Sharing
  Amir Houmansadr and Shahrokh Ghaemmaghami
  IST 2005

Synchronization Methods in PSK Modulation
  Amir Houmansadr
  B.Sc. Thesis, Electrical Engineering Department, Sharif University of Technology, 2003


Technical Reports


A Secure, Efficient, and Transparent Network Architecture for Bitcoin
  A. Pinar Ozisik, Gavin Andresen, George Bissias, Amir Houmansadr, Brian Levine
  University of Massachusetts Amherst Tech Report UM-CS-2016-006, October 2016.

Covert Communications on Renewal Packet Channels
  Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr
  Computing Research Repository arXiv, arXiv:1610.00368, 2016.

Covert Communications on Poisson Packet Channels
  Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr
  Computing Research Repository arXiv, arXiv:1610.00381, 2016.

SWEET: Serving the Web by Exploiting Email Tunnels
  Amir Houmansadr, Wenxuan Zhou, Matthew Caesar, and Nikita Borisov
  Computing Research Repository arXiv, arXiv:1211.3191, 2012.

IP over Voice-over-IP for censorship circumvention
  Amir Houmansadr, Thomas Riedl, Nikita Borisov, and Andrew Singer
  Computing Research Repository arXiv, arXiv:1207.2683v1, 2012.

Non-blind watermarking of network flows
  Amir Houmansadr, Negar Kiyavash, and Nikita Borisov
  Computing Research Repository arXiv, arXiv:1203.2273v1, 2012.

BotMosaic: Multi-Flow Watermark for Live Botmaster Traceback
  Amir Houmansadr and Nikita Borisov
  Computing Research Repository arXiv, arXiv:1203.1568v1, 2012.

Multi-Flow Attacks Against Network Flow Watermarks: Analysis and Countermeasures
  Negar Kiyavash, Amir Houmansadr, and Nikita Borisov
  Computing Research Repository arXiv, arXiv:1203.1390v1, 2012.

Stegobot: A Covert Social Network Botnet
  Shishir Nagaraja, Amir Houmansadr, Pragya Agarwal, Vijit Kumar, Pratch Piyawongwisal, and Nikita Borisov
  IIIT-Delhi technical report, 2011.


Selected Workshops/Posters


On the Channel Capacity of Network Flow Watermarking
  Amir Houmansadr, Siva Gorantla, Todd Coleman, Negar Kiyavash, and Nikita Borisov
  Poster at CCS 2009

Breaking Through Anonymous Networks: An Invisible and Blind Network Watermark
  Amir Houmansadr and Nikita Borisov
  HotPETs 2009

Multi-flow attacks on watermarks
  Amir Houmansadr, Negar Kiyavash, and Nikita Borisov
  ITI Workshop on Dependability and Security, 2007

Towards Efficient Detection of Stepping Stone Attacks With Spread-Spectrum Watermarks
  Amir Houmansadr, Negar Kiyavash, and Nikita Borisov
  Midwest Security Workshop 2006