Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Omar Chowdhury
@inproceedings{DBLP:conf/cns/NafisCH23, author = {Akib Jawad Nafis and Omar Chowdhury and Md. Endadul Hoque}, title = {VetIoT: On Vetting IoT Defenses Enforcing Policies at Runtime}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288667}, doi = {10.1109/CNS59707.2023.10288667}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/NafisCH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmcad/LarrazLYACT23, author = {Daniel Larraz and Robert Lorch and Moosa Yahyazadeh and M. Fareed Arif and Omar Chowdhury and Cesare Tinelli}, editor = {Alexander Nadel and Kristin Yvonne Rozier}, title = {{CRV:} Automated Cyber-Resiliency Reasoning for System Design Models}, booktitle = {Formal Methods in Computer-Aided Design, {FMCAD} 2023, Ames, IA, USA, October 24-27, 2023}, pages = {209--220}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.34727/2023/isbn.978-3-85448-060-0\_29}, doi = {10.34727/2023/ISBN.978-3-85448-060-0\_29}, timestamp = {Wed, 13 Dec 2023 14:38:51 +0100}, biburl = {https://dblp.org/rec/conf/fmcad/LarrazLYACT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MazharLHC23, author = {M. Hammad Mazhar and Li Li and Md. Endadul Hoque and Omar Chowdhury}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Maverick: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {73--84}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590188}, doi = {10.1145/3558482.3590188}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MazharLHC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-01452, author = {M. Hammad Mazhar and Li Li and Md. Endadul Hoque and Omar Chowdhury}, title = {{MAVERICK:} An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime}, journal = {CoRR}, volume = {abs/2302.01452}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.01452}, doi = {10.48550/ARXIV.2302.01452}, eprinttype = {arXiv}, eprint = {2302.01452}, timestamp = {Thu, 09 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-01452.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-12417, author = {Akib Jawad Nafis and Omar Chowdhury and Md. Endadul Hoque}, title = {VetIoT: On Vetting IoT Defenses Enforcing Policies at Runtime}, journal = {CoRR}, volume = {abs/2308.12417}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.12417}, doi = {10.48550/ARXIV.2308.12417}, eprinttype = {arXiv}, eprint = {2308.12417}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-12417.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RahamanCCY22, author = {Sazzadur Rahaman and Haipeng Cai and Omar Chowdhury and Danfeng Yao}, title = {From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in {C/C++}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {6}, pages = {3790--3803}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3108031}, doi = {10.1109/TDSC.2021.3108031}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RahamanCCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/EcheverriaC22, author = {Mitziu Echeverria and Omar Chowdhury}, editor = {Chadi Barakat and Cristel Pelsser and Theophilus A. Benson and David R. Choffnes}, title = {Demystifying the presence of cellular network attacks and misbehaviors}, booktitle = {Proceedings of the 22nd {ACM} Internet Measurement Conference, {IMC} 2022, Nice, France, October 25-27, 2022}, pages = {742--743}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3517745.3563017}, doi = {10.1145/3517745.3563017}, timestamp = {Mon, 06 Feb 2023 21:45:20 +0100}, biburl = {https://dblp.org/rec/conf/imc/EcheverriaC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacmat/2022, editor = {Sven Dietrich and Omar Chowdhury and Daniel Takabi}, title = {{SACMAT} '22: The 27th {ACM} Symposium on Access Control Models and Technologies, New York, NY, USA, June 8 - 10, 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3532105}, doi = {10.1145/3532105}, isbn = {978-1-4503-9357-7}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/systems/MengLSMISPPHAYV21, author = {Baoluo Meng and Daniel Larraz and Kit Siu and Abha Moitra and John Interrante and William Smith and Saswata Paul and Daniel Prince and Heber Herencia{-}Zapana and M. Fareed Arif and Moosa Yahyazadeh and Vidhya Tekken Valapil and Michael Durling and Cesare Tinelli and Omar Chowdhury}, title = {{VERDICT:} {A} Language and Framework for Engineering Cyber Resilient and Safe System}, journal = {Syst.}, volume = {9}, number = {1}, pages = {18}, year = {2021}, url = {https://doi.org/10.3390/systems9010018}, doi = {10.3390/SYSTEMS9010018}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/systems/MengLSMISPPHAYV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HussainKICB21, author = {Syed Rafiul Hussain and Imtiaz Karim and Abdullah Al Ishtiaq and Omar Chowdhury and Elisa Bertino}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G {LTE} Cellular Devices}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1082--1099}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3485388}, doi = {10.1145/3460120.3485388}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HussainKICB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HueDLLMMXHCC21, author = {Man Hong Hue and Joyanta Debnath and Kin Man Leung and Li Li and Mohsen Minaei and M. Hammad Mazhar and Kailiang Xian and Md. Endadul Hoque and Omar Chowdhury and Sze Yiu Chau}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1100--1117}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484569}, doi = {10.1145/3460120.3484569}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HueDLLMMXHCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DebnathCC21, author = {Joyanta Debnath and Sze Yiu Chau and Omar Chowdhury}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {On Re-engineering the {X.509} {PKI} with Executable Specification for Better Implementation Guarantees}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1388--1404}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484793}, doi = {10.1145/3460120.3484793}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DebnathCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YahyazadehCLHDI21, author = {Moosa Yahyazadeh and Sze Yiu Chau and Li Li and Man Hong Hue and Joyanta Debnath and Sheung Chiu Ip and Chun Ngai Li and Md. Endadul Hoque and Omar Chowdhury}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Morpheus: Bringing The {(PKCS)} One To Meet the Oracle}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {2474--2496}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3485382}, doi = {10.1145/3460120.3485382}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YahyazadehCLHDI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/EcheverriaAWAHC21, author = {Mitziu Echeverria and Zeeshan Ahmed and Bincheng Wang and M. Fareed Arif and Syed Rafiul Hussain and Omar Chowdhury}, title = {{PHOENIX:} Device-Centric Cellular Network Protocol Monitoring using Runtime Verification}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/phoenix-device-centric-cellular-network-protocol-monitoring-using-runtime-verification/}, timestamp = {Thu, 17 Jun 2021 15:42:26 +0200}, biburl = {https://dblp.org/rec/conf/ndss/EcheverriaAWAHC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacmat/2021, editor = {Jorge Lobo and Roberto Di Pietro and Omar Chowdhury and Hongxin Hu}, title = {{SACMAT} '21: The 26th {ACM} Symposium on Access Control Models and Technologies, Virtual Event, Spain, June 16-18, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3450569}, doi = {10.1145/3450569}, isbn = {978-1-4503-8365-3}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-00328, author = {Mitziu Echeverria and Zeeshan Ahmed and Bincheng Wang and M. Fareed Arif and Syed Rafiul Hussain and Omar Chowdhury}, title = {{PHOENIX:} Device-Centric Cellular Network Protocol Monitoring using Runtime Verification}, journal = {CoRR}, volume = {abs/2101.00328}, year = {2021}, url = {https://arxiv.org/abs/2101.00328}, eprinttype = {arXiv}, eprint = {2101.00328}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-00328.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/SinglaHCBL20, author = {Ankush Singla and Syed Rafiul Hussain and Omar Chowdhury and Elisa Bertino and Ninghui Li}, title = {Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2020}, number = {1}, pages = {126--142}, year = {2020}, url = {https://doi.org/10.2478/popets-2020-0008}, doi = {10.2478/POPETS-2020-0008}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/SinglaHCBL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DebnathCC20, author = {Joyanta Debnath and Sze Yiu Chau and Omar Chowdhury}, editor = {Mauro Conti and Jianying Zhou and Emiliano Casalicchio and Angelo Spognardi}, title = {When {TLS} Meets Proxy on Mobile}, booktitle = {Applied Cryptography and Network Security - 18th International Conference, {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12147}, pages = {387--407}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57878-7\_19}, doi = {10.1007/978-3-030-57878-7\_19}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/DebnathCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmcad/ArifLERCT20, author = {M. Fareed Arif and Daniel Larraz and Mitziu Echeverria and Andrew Reynolds and Omar Chowdhury and Cesare Tinelli}, title = {{SYSLITE:} Syntax-Guided Synthesis of {PLTL} Formulas from Finite Traces}, booktitle = {2020 Formal Methods in Computer Aided Design, {FMCAD} 2020, Haifa, Israel, September 21-24, 2020}, pages = {93--103}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.34727/2020/isbn.978-3-85448-042-6\_16}, doi = {10.34727/2020/ISBN.978-3-85448-042-6\_16}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fmcad/ArifLERCT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rv/YahyazadehHHC20, author = {Moosa Yahyazadeh and Syed Rafiul Hussain and Md. Endadul Hoque and Omar Chowdhury}, editor = {Jyotirmoy Deshmukh and Dejan Nickovic}, title = {PatrIoT: Policy Assisted Resilient Programmable IoT System}, booktitle = {Runtime Verification - 20th International Conference, {RV} 2020, Los Angeles, CA, USA, October 6-9, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12399}, pages = {151--171}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-60508-7\_8}, doi = {10.1007/978-3-030-60508-7\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rv/YahyazadehHHC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-13604, author = {Elisa Bertino and Syed Rafiul Hussain and Omar Chowdhury}, title = {5G Security and Privacy: {A} Research Roadmap}, journal = {CoRR}, volume = {abs/2003.13604}, year = {2020}, url = {https://arxiv.org/abs/2003.13604}, eprinttype = {arXiv}, eprint = {2003.13604}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-13604.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KarimCHCB19, author = {Imtiaz Karim and Fabrizio Cicala and Syed Rafiul Hussain and Omar Chowdhury and Elisa Bertino}, editor = {David Balenson}, title = {Opening Pandora's box through ATFuzzer: dynamic analysis of {AT} interface for Android smartphones}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {529--543}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359833}, doi = {10.1145/3359789.3359833}, timestamp = {Tue, 26 Nov 2019 09:46:34 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KarimCHCB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HussainEKCB19, author = {Syed Rafiul Hussain and Mitziu Echeverria and Imtiaz Karim and Omar Chowdhury and Elisa Bertino}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {5GReasoner: {A} Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {669--684}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354263}, doi = {10.1145/3319535.3354263}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HussainEKCB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ChauYCKL19, author = {Sze Yiu Chau and Moosa Yahyazadeh and Omar Chowdhury and Aniket Kate and Ninghui Li}, title = {Analyzing Semantic Correctness with Symbolic Execution: {A} Case Study on PKCS{\#}1 v1.5 Signature Verification}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/analyzing-semantic-correctness-with-symbolic-execution-a-case-study-on-pkcs1-v1-5-signature-verification/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ChauYCKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HussainECLB19, author = {Syed Rafiul Hussain and Mitziu Echeverria and Omar Chowdhury and Ninghui Li and Elisa Bertino}, title = {Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/privacy-attacks-to-the-4g-and-5g-cellular-paging-protocols-using-side-channel-information/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/HussainECLB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/YahyazadehPHC19, author = {Moosa Yahyazadeh and Proyash Podder and Md. Endadul Hoque and Omar Chowdhury}, editor = {Florian Kerschbaum and Atefeh Mashatan and Jianwei Niu and Adam J. Lee}, title = {Expat: Expectation-based Policy Analysis and Enforcement for Appified Smart-Home Platforms}, booktitle = {Proceedings of the 24th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019}, pages = {61--72}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3322431.3325107}, doi = {10.1145/3322431.3325107}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/YahyazadehPHC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HussainESCB19, author = {Syed Rafiul Hussain and Mitziu Echeverria and Ankush Singla and Omar Chowdhury and Elisa Bertino}, title = {Insecure connection bootstrapping in cellular networks: the root of all evil}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {1--11}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3323402}, doi = {10.1145/3317549.3323402}, timestamp = {Tue, 21 May 2019 10:54:31 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HussainESCB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChauWWCKL18, author = {Sze Yiu Chau and Bincheng Wang and Jianxiong Wang and Omar Chowdhury and Aniket Kate and Ninghui Li}, title = {Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {236--251}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274752}, doi = {10.1145/3274694.3274752}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ChauWWCKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HussainCMB18, author = {Syed Rafiul Hussain and Omar Chowdhury and Shagufta Mehnaz and Elisa Bertino}, title = {LTEInspector: {A} Systematic Approach for Adversarial Testing of 4G {LTE}}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_02A-3\_Hussain\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/HussainCMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Chowdhury18, author = {Omar Chowdhury}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {How Inadequate Specification, Buggy Implementation, and Deficient Platform-Support Hinder Security}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {221}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3206002}, doi = {10.1145/3205977.3206002}, timestamp = {Wed, 21 Nov 2018 12:44:16 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/Chowdhury18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ChauCGGYFL18, author = {Sze Yiu Chau and Omar Chowdhury and Victor E. Gonsalves and Huangyi Ge and Weining Yang and Sonia Fahmy and Ninghui Li}, editor = {Raheem Beyah and Bing Chang and Yingjiu Li and Sencun Zhu}, title = {Adaptive Deterrence of {DNS} Cache Poisoning}, booktitle = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {255}, pages = {171--191}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01704-0\_10}, doi = {10.1007/978-3-030-01704-0\_10}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ChauCGGYFL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/HoqueCCNL17, author = {Md. Endadul Hoque and Omar Chowdhury and Sze Yiu Chau and Cristina Nita{-}Rotaru and Ninghui Li}, title = {Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs}, booktitle = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017}, pages = {627--638}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSN.2017.36}, doi = {10.1109/DSN.2017.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/HoqueCCNL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChauCHGKNL17, author = {Sze Yiu Chau and Omar Chowdhury and Md. Endadul Hoque and Huangyi Ge and Aniket Kate and Cristina Nita{-}Rotaru and Ninghui Li}, title = {SymCerts: Practical Symbolic Execution for Exposing Noncompliance in {X.509} Certificate Validation Implementations}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {503--520}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.40}, doi = {10.1109/SP.2017.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ChauCHGKNL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangGCML16, author = {Tianhao Wang and Huangyi Ge and Omar Chowdhury and Hemanta K. Maji and Ninghui Li}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {603--615}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978417}, doi = {10.1145/2976749.2978417}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangGCML16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YangLCXP16, author = {Weining Yang and Ninghui Li and Omar Chowdhury and Aiping Xiong and Robert W. Proctor}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {An Empirical Study of Mnemonic Sentence-based Password Generation Strategies}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1216--1229}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978346}, doi = {10.1145/2976749.2978346}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YangLCXP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ChenCLKCMP16, author = {Haining Chen and Omar Chowdhury and Ninghui Li and Warut Khern{-}am{-}nuai and Suresh Chari and Ian M. Molloy and Youngja Park}, editor = {X. Sean Wang and Lujo Bauer and Florian Kerschbaum}, title = {Tri-Modularization of Firewall Policies}, booktitle = {Proceedings of the 21st {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2016, Shanghai, China, June 5-8, 2016}, pages = {37--48}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2914642.2914646}, doi = {10.1145/2914642.2914646}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ChenCLKCMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Chowdhury0JD15, author = {Omar Chowdhury and Deepak Garg and Limin Jia and Anupam Datta}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1130--1143}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813638}, doi = {10.1145/2810103.2813638}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Chowdhury0JD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/ChenCCLP15, author = {Haining Chen and Omar Chowdhury and Jing Chen and Ninghui Li and Robert W. Proctor}, editor = {David M. Nicol}, title = {Towards quantification of firewall policy complexity}, booktitle = {Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015}, pages = {18:1--18:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2746194.2746212}, doi = {10.1145/2746194.2746212}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/ChenCCLP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rv/KaneCDK15, author = {Aaron Kane and Omar Chowdhury and Anupam Datta and Philip Koopman}, editor = {Ezio Bartocci and Rupak Majumdar}, title = {A Case Study on Runtime Monitoring of an Autonomous Research Vehicle {(ARV)} System}, booktitle = {Runtime Verification - 6th International Conference, {RV} 2015 Vienna, Austria, September 22-25, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9333}, pages = {102--117}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23820-3\_7}, doi = {10.1007/978-3-319-23820-3\_7}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/rv/KaneCDK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Chowdhury0JD15, author = {Omar Chowdhury and Deepak Garg and Limin Jia and Anupam Datta}, title = {Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits}, journal = {CoRR}, volume = {abs/1508.02448}, year = {2015}, url = {http://arxiv.org/abs/1508.02448}, eprinttype = {arXiv}, eprint = {1508.02448}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Chowdhury0JD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ChowdhuryJGD14, author = {Omar Chowdhury and Limin Jia and Deepak Garg and Anupam Datta}, editor = {Armin Biere and Roderick Bloem}, title = {Temporal Mode-Checking for Runtime Monitoring of Privacy Policies}, booktitle = {Computer Aided Verification - 26th International Conference, {CAV} 2014, Held as Part of the Vienna Summer of Logic, {VSL} 2014, Vienna, Austria, July 18-22, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8559}, pages = {131--149}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08867-9\_9}, doi = {10.1007/978-3-319-08867-9\_9}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cav/ChowdhuryJGD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ChowdhuryGNRBDJW13, author = {Omar Chowdhury and Andreas Gampe and Jianwei Niu and Jeffery von Ronne and Jared Bennatt and Anupam Datta and Limin Jia and William H. Winsborough}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Privacy promises that can be kept: a policy analysis method with application to the {HIPAA} privacy rule}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {3--14}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462423}, doi = {10.1145/2462410.2462423}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ChowdhuryGNRBDJW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/PontualGCKAW12, author = {Murillo Pontual and Andreas Gampe and Omar Chowdhury and Bazoumana Kone and Md. Shamim Ashik and William H. Winsborough}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {The privacy in the time of the internet: secrecy vs transparency}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {133--140}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133618}, doi = {10.1145/2133601.2133618}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/PontualGCKAW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ChowdhuryPWYIN12, author = {Omar Chowdhury and Murillo Pontual and William H. Winsborough and Ting Yu and Keith Irwin and Jianwei Niu}, editor = {Vijay Atluri and Jaideep Vaidya and Axel Kern and Murat Kantarcioglu}, title = {Ensuring authorization privileges for cascading user obligations}, booktitle = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '12, Newark, NJ, {USA} - June 20 - 22, 2012}, pages = {33--44}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2295136.2295144}, doi = {10.1145/2295136.2295144}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ChowdhuryPWYIN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChowdhuryCNLB12, author = {Omar Chowdhury and Haining Chen and Jianwei Niu and Ninghui Li and Elisa Bertino}, editor = {Carl A. Gunter and Zachary N. J. Peterson}, title = {On XACML's Adequacy to Specify and to Enforce {HIPAA}}, booktitle = {3rd {USENIX} Workshop on Health Security and Privacy, HealthSec'12, Bellevue, WA, USA, August 6-7, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/healthsec12/workshop-program/presentation/chowdhury}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/ChowdhuryCNLB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/PontualCWYI11, author = {Murillo Pontual and Omar Chowdhury and William H. Winsborough and Ting Yu and Keith Irwin}, editor = {Ruth Breu and Jason Crampton and Jorge Lobo}, title = {On the management of user obligations}, booktitle = {16th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings}, pages = {175--184}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998441.1998473}, doi = {10.1145/1998441.1998473}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/PontualCWYI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PontualCWYI10, author = {Murillo Pontual and Omar Chowdhury and William H. Winsborough and Ting Yu and Keith Irwin}, editor = {Dengguo Feng and David A. Basin and Peng Liu}, title = {Toward practical authorization-dependent user obligation systems}, booktitle = {Proceedings of the 5th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16, 2010}, pages = {180--191}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1755688.1755711}, doi = {10.1145/1755688.1755711}, timestamp = {Fri, 03 Jun 2022 12:02:10 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PontualCWYI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/PontualICWY10, author = {Murillo Pontual and Keith Irwin and Omar Chowdhury and William H. Winsborough and Ting Yu}, editor = {Ahmed K. Elmagarmid and Divyakant Agrawal}, title = {Failure Feedback for User Obligation Systems}, booktitle = {Proceedings of the 2010 {IEEE} Second International Conference on Social Computing, SocialCom / {IEEE} International Conference on Privacy, Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA, August 20-22, 2010}, pages = {713--720}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SocialCom.2010.111}, doi = {10.1109/SOCIALCOM.2010.111}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/PontualICWY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.