Research affiliate and former group member (MS, 2013; Ph.D., 2017).
Now at Supernova Lending.
Publications with the Performability Engineering Research Group
Understanding the Role of Automated Response Actions in Improving AMI Resiliency.
A. Fawaz, R. Berthier, W. H. Sanders, and P. Pal. (12FAW01)
Proceedings of the NIST Cybersecurity for Cyber-Physical Systems Workshop, Gaithersburg, Maryland, Apr. 23-24, 2012, http://www.nist.gov/itl/csd/cyberphysical-workshop.cfm.
Cost Modeling of Response Actions for Automated Response and Recovery in AMI.
A. Fawaz, R. Berthier, and W. H. Sanders. (12FAW02)
Proceedings of the 3rd IEEE International Conference on Smart Grid Communications (SmartGridComm), Tainan City, Taiwan, Nov. 5-8, 2012, pp. 348-353. [IEEE Xplore entry]
A Response Taxonomy and Cost Model for Advanced Metering Infrastructures.
A. M. Fawaz. (13FAW01)
Master’s Thesis, University of Illinois at Urbana-Champaign, 2013.
A Response Cost Model for Advanced Metering Infrastructures.
A. Fawaz, R. Berthier, and W. H. Sanders. (13FAW02)
IEEE Transactions on Smart Grid, vol. 7, no. 2, March 2016, pp. 543-553. [IEEE Xplore entry]
Lateral Movement Detection Using Distributed Data Fusion.
A. Fawaz, A. Bohara, C. Cheh, and W. H. Sanders. (16FAW02)
Proceedings of the 2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS), Budapest, Hungary, Sept. 26-29, 2016, pp. 21-30. [IEEE Xplore entry]
A Game-Theoretic Approach to Respond to Attacker Lateral Movement.
M. A. Noureddine, A. Fawaz, W. H. Sanders, and T. Başar. (16NOU02)
Proceedings of the 7th International Conference on Decision and Game Theory for Security (GameSec 2016), New York, New York, November 2-4, 2016, Lecture Notes in Computer Science vol. 9996, Springer, 2016, pp. 294-313. [The final publication is available at link.springer.com: Springer Link entry]
Learning Process Behavioral Baselines for Anomaly Detection.
A. M. Fawaz and W. H. Sanders. (16FAW03)
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2017), Christchurch, New Zealand, January 22-25, 2017, pp. 145-154. [IEEE Xplore entry]
Achieving Cyber Resiliency against Lateral Movement through Detection and Response.
A. M. Fawaz. (17FAW01)
Ph.D. Dissertation, University of Illinois at Urbana-Champaign, 2017.
An Unsupervised Multi-Detector Approach for Identifying Malicious Lateral Movement.
A. Bohara, M. A. Noureddine, A. Fawaz, and W. H. Sanders. (17BOH01)
Proceedings of the 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS 2017), Hong Kong, China, September 26-29, 2017, pp. 224-233. [IEEE Xplore entry]
Poster: Detecting Monitor Compromise Using Evidential Reasoning.
U. Thakore, A. Fawaz, and W. H. Sanders. (18THA01)
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security (HotSoS ’18), Raleigh, North Carolina, April 10-11, 2018, article no. 16. [ACM DOI: https://doi.org/10.1145/3190619.3191693]
PowerAlert: Integrity Checking Using Power Measurement and a Game-Theoretic Strategy.
A. M. Fawaz, M. A. Noureddine, and W. H. Sanders. (17FAW02)
Proceedings of the 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Luxembourg City, Luxembourg, June 25-28, 2018, pp. 514-525. [IEEE Xplore entry]
Modeling Humans: A General Agent Model for the Evaluation of Security.
M. Rausch, A. Fawaz, K. Keefe, and W. H. Sanders. (18RAU01)
Proceedings of the 15th International Conference on Quantitative Evaluation of SysTems (QEST 2018), Beijing, China, Sept. 4-7, 2018 (A. McIver and A. Horvath, Eds.), pp. 373-388. Lecture Notes in Computer Science, vol. 11024. Cham: Springer, 2018. [The final publication is available at link.springer.com: Springer Link entry]
Peer-to-Peer Detection of DoS Attacks on City-Scale IoT Mesh Networks.
M. J. Rausch, V. Badrinath Krishna, P. Gu, R. Chandra, B. Feddersen, A. Fawaz, and W. H. Sanders. (18RAU02)
Proceedings of the 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (IEEE SmartGridComm), Aalborg, Denmark, October 29-31, 2018, pp. 1-6. [IEEE Xplore entry]
Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems.
C. Cheh, A. Fawaz, M. A. Noureddine, B. Chen, W. G. Temple, and W. H. Sanders. (18CHE02)
Proceedings of the 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC 2018), Taipei, Taiwan, December 4-7, 2018, pp. 125-134. [IEEE Xplore entry]
Data-Driven Model-Based Detection of Malicious Insiders via Physical Access Logs.
C. Cheh, U. Thakore, A. Fawaz, B. Chen, W. G. Temple, and W. H. Sanders. (18CHE01)
ACM Transactions on Modeling and Computer Simulation,vol. 29, no. 4, December 2019, article no. 26. [ACM: https://doi.org/10.1145/3309540]
Revisiting Client Puzzles for State Exhaustion Attacks Resilience.
M. A. Noureddine, A. M. Fawaz, A. Hsu, C. Guldner, S. Vijay, T. Basar, and W. H. Sanders. (18NOU01)
Proceedings of the 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2019), Portland, Oregon, USA, June 24-27, 2019, pp. 617-629. [IEEE Xplore entry]
COPYRIGHT NOTICES: The above electronic files are presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
The following copyright notice applies to all of the above items that appear in IEEE publications: “Personal use of this material is permitted. However, permission to reprint/publish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from IEEE.”
With respect to items published by the ACM: Items are © by the authors listed and by the ACM, in the year listed on each item. The files posted here are the authors’ versions of the work. They are posted here for your personal use and are not for redistribution. The definitive Version of Record was published as indicated in the bibliographic citations provided, and is available from the ACM Digital Library from the ACM Digital Object Identifier listed for each publication.