Students

Graduate Advisees
Sana Habib → Visiting Assistant Professor at Washington and Lee University
Undergraduate Advisees
Sarah Lathrop → Engineer at John Hopkins Applied Physics Lab
Mohamed Soliman Elhussiny → AI Software Engineer at TradeEngage
Jack Bosco → Master's Student at Columbia University
William Tobin → Solutions Analyst at Deloitte
William Xue → Software Engineer at Microsoft


Publications

How Accurately Do Large Language Models Understand Code? PDF

Sabaat Haroon, Ahmad Faraz Khan, Ahmad Humayun, Waris Gill, Haddi Amjad, Ali R. Butt, Mohammad Taha Khan, Muhammad Ali Gulzar.

arXiv preprint arXiv:2504.04372, April 2025.

Examining Leading Pakistani Mobile Apps PDFSlides

Sana Habib, Mohammad Taha Khan, Jedidiah R. Crandall.

Proceedings of Free and Open Communications on the Internet (FOCI), Washington, D.C., USA, June 2025.

An Empirical Evaluation of Method Signature Similarity in Java Codebases PDFSlides

Mohammad Taha Khan, Mohamed Elhussiny, William Tobin, Muhammad Ali Gulzar.

Proceedings of the ACM Asia Service Sciences and Software Engineering Conference (ASSE), Tokyo, Japan, September 2024.

Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage PDFSlides

Mohammad Taha Khan, Christopher Tran, Shubham Singh, Dimitri Vasilkov, Chris Kanich, Blase Ur, Elena Zheleva.

Proceedings of the USENIX Security Symposium, Vancouver, B.C., Canada, August 2021.

Blind In/On-Path Attacks and Applications to VPNs PDFSlides

William J. Tolley, Beau Kujath, Mohammad Taha Khan, Narseo Vallina-Rodriguez, Jedidiah R. Crandall.

Proceedings of the USENIX Security Symposium, Vancouver, B.C., Canada, August 2021.

Early Research Scholars Program at UIC PDFSlides

Renata A. Revelo, Joseph Hummel, Mohammad Taha Khan.

Proceedings of the American Society for Engineering Education (ASEE) Annual Conference, July 2020.

Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media PDFSlides

Mainack Mondal, Günce Su Yılmaz, Noah Hirsch, Mohammad Taha Khan, Michael Tang, Christopher Tran, Chris Kanich, Blase Ur, Elena Zheleva.

Proceedings of the ACM Conference on Computer and Communications Security (CCS), London, UK, November 2019.

An Empirical Analysis of the Commercial VPN Ecosystem PDFSlides

Mohammad Taha Khan, Joe DeBlasio, Geoffrey M. Voelker, Alex C. Snoeren, Chris Kanich, Narseo Rodriguez.

Proceedings of the ACM Internet Measurement Conference (IMC), Boston, MA, November 2018.

Making Retrospective Data Management Usable PDFPoster

Noah Hirsch, Chris Kanich, Mohammad Taha Khan, Xuefeng Liu, Mainack Mondal, Michael Tang, Christopher Tran, Blase Ur, William Wang, Günce Su Yilmaz, Elena Zheleva.

Proceedings of the Symposium On Usable Privacy and Security (SOUPS), Baltimore, MD, August 2018.

Integrating Ethics in Cybersecurity Education PDF

Mohammad Taha Khan, Chris Kanich, Cynthia Taylor.

In Proceedings of the New Approaches to Cybersecurity Education (NACE 18), New Orleans, LA, June 2018.

Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage PDFSlides

Mohammad Taha Khan, Maria Hyun, Chris Kanich, Blase Ur.

Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), Montreal, QC, Canada, April 2018.

Old is Still Gold: A Comparison of Cyber and Regular Fraud in the United States PDFSlides

Mohammad Taha Khan, Chris Kanich.

Proceedings of the Workshop on Technology and Consumer Protection (ConPro), San Jose, CA, May 2017.

Sneak-Peek: High Speed Covert Channels in Data-Center Networks PDFSlidesPoster

Rashid Tahir, Mohammad Taha Khan, Xun Gong, Adnan Ahmed, AmirEmad Ghassami, Hasanat Kazmi, Matthew Caesar, Fareed Zaffar, Negar Kiyavash.

Proceedings of the IEEE Conference on Computer Communications (INFOCOM), San Francisco, CA, April 2016.

High Fidelity, High Risk, High Reward: Using High-Fidelity Networking Data in Ethically Sound Research PDFSlides

Mohammad Taha Khan, Chris Kanich.

Proceedings of the ACM SIGCOMM Workshop on Ethics in Networked Systems (NSEthics), London, UK, August 2015.

A Classification Based Framework to Predict Viral Threads PDF

Hashim Sharif, Saad Ismail, Shehroze Farooqi, Mohammad Taha Khan, Muhammad Ali Gulzar, Hasnain Lakhani, Fareed Zaffar, Ahmed Abbasi.

Proceedings of the Pacific Asia Conference on Information Systems (PACIS), Singapore, July 2015.

Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting PDFSlidesPoster

Mohammad Taha Khan, Xiang Huo, Zhou Li, Chris Kanich.

Proceedings of the IEEE Symposium on Security and Privacy (S&P / "Oakland"), San Jose, CA, May 2015.

Efficient Relaying Strategy Selection and Signal Combining using Error Estimation Codes PDFSlides

Mohammad Taha Khan, Talha Anwar, Muhammad Kumail Haider, Momin Uppal.

Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Istanbul, Turkey, April 2014.



Technical Reports

Enabling Retrospective Management of Data in the Cloud PDFSlides

Mohammad Taha Khan.

PhD Thesis, University of Illinois, Chicago, 2020.

Packets Lost in the Wild: An Analysis of Empirical Approaches to Measure Internet Censorship PDFSlides

Mohammad Taha Khan.

PhD Qualifier Report, April 2017.