Conference and Workshop Publications


Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage

Mohammad Taha Khan, Christopher Tran, Shubham Singh, Dimitri Vasilkov, Chris Kanich, Blase Ur, Elena Zheleva.

Proceedings of the USENIX Security Symposium, Vancouver, B.C., Canada, August 2021.
[PDF] | [Slides]

Blind In/On-Path Attacks and Applications to VPNs

William J. Tolley, Beau Kujath, Mohammad Taha Khan, Narseo Vallina-Rodriguez, Jedidiah R. Crandall.

Proceedings of the USENIX Security Symposium, Vancouver, B.C., Canada, August 2021.
[PDF] | [Slides]

Early Research Scholars Program at UIC

Renata A. Revelo, Joseph Hummel, Mohammad Taha Khan.

Proceedings American Society for Engineering Education (ASEE) Annual Conference, July 2020.
[PDF] | [Slides]

Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media

Mainack Mondal, Günce Su Yılmaz, Noah Hirsch, Mohammad Taha Khan, Michael Tang, Christopher Tran, Chris Kanich, Blase Ur, Elena Zheleva.

Proceedings of the ACM Conference on Computer and Communications Security (CCS). London, UK, November 2019.
[PDF] | [Slides]

An Empirical Analysis of the Commercial VPN Ecosystem

Mohammad Taha Khan, Joe DeBlasio, Geoffrey M. Voelker, Alex C. Snoeren, Chris Kanich, Narseo Rodriguez.

Proceedings of the ACM Internet Measurement Conference (IMC). Boston, MA, November 2018.
[PDF] | [Slides]

Making Retrospective Data Management Usable

Noah Hirsch, Chris Kanich, Mohammad Taha Khan, Xuefeng Liu, Mainack Mondal, Michael Tang, Christopher Tran, Blase Ur, William Wang, Günce Su Yilmaz, Elena Zheleva.

Proceedings of the Symposium On Usable Privacy and Security (SOUPS). Baltimore, MD, August 2018.
[PDF] | [Poster]

Integrating Ethics in Cybersecurity Education

Mohammad Taha Khan, Chris Kanich, Cynthia Taylor.

In Proceedings of the New Approaches to Cybersecurity Education (NACE 18), New Orleans, LA, June 2018.
[PDF]

Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage

Mohammad Taha Khan, Maria Hyun, Chris Kanich, Blase Ur.

Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI). Montreal, QC, Canada, April 2018.
[PDF] | [Slides]

Old is Still Gold: A Comparison of Cyber and Regular Fraud in the United States

Mohammad Taha Khan, Chris Kanich.

Proceedings of the Workshop on Technology and Consumer Protection (ConPro). San Jose, CA, May 2017.
[PDF] | [Slides]

Sneak-Peek: High Speed Covert Channels in Data-Center Networks

Rashid Tahir, Mohammad Taha Khan, Xun Gong, Adnan Ahmed, AmirEmad Ghassami, Hasanat Kazmi, Matthew Caesar, Fareed Zaffar, Negar Kiyavash.

Proceedings of the IEEE Conference on Computer Communications (INFOCOM). San Francisco, CA, April 2016.
[PDF] | [Slides] | [Poster]

High Fidelity, High Risk, High Reward: Using High-Fidelity Networking Data in Ethically Sound Research

Mohammad Taha Khan, Chris Kanich.

Proceedings of the ACM SIGCOMM Workshop on Ethics in Networked Systems (NSEthics). London, UK, August 2015.
[PDF] | [Slides]

A Classification Based Framework to Predict Viral Threads

Hashim Sharif, Saad Ismail, Shehroze Farooqi, Mohammad Taha Khan, Muhammad Ali Gulzar, Hasnain Lakhani, Fareed Zaffar, Ahmed Abbasi.

Proceedings of the Pacific Asia Conference on Information Systems (PACIS). Singapore, July 2015.
[PDF]

Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting

Mohammad Taha Khan, Xiang Huo, Zhou Li, Chris Kanich.

Proceedings of the IEEE Symposium on Security and Privacy (S&P / “Oakland”). San Jose, CA, May 2015.
[PDF] | [Slides] | [Poster]

Efficient Relaying Strategy Selection and Signal Combining using Error Estimation Codes

Mohammad Taha Khan, Talha Anwar, Muhammad Kumail Haider, Momin Uppal.

Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC). Istanbul, Turkey, April 2014.
[PDF] | [Slides]

Technical Reports


Enabling Retrospective Management of Data in the Cloud

Mohammad Taha Khan.

PhD Thesis, University of Illinois, Chicago, 2020.
[PDF] | [Slides]

Packets Lost in the Wild: An Analysis of Empirical Approaches to Measure Internet Censorship

Mohammad Taha Khan.

PhD Qualifier Report, April 2017.
[PDF] | [Slides]