BibTeX records: Omar Chowdhury

download as .bib file

@inproceedings{DBLP:conf/cns/NafisCH23,
  author       = {Akib Jawad Nafis and
                  Omar Chowdhury and
                  Md. Endadul Hoque},
  title        = {VetIoT: On Vetting IoT Defenses Enforcing Policies at Runtime},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288667},
  doi          = {10.1109/CNS59707.2023.10288667},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/NafisCH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmcad/LarrazLYACT23,
  author       = {Daniel Larraz and
                  Robert Lorch and
                  Moosa Yahyazadeh and
                  M. Fareed Arif and
                  Omar Chowdhury and
                  Cesare Tinelli},
  editor       = {Alexander Nadel and
                  Kristin Yvonne Rozier},
  title        = {{CRV:} Automated Cyber-Resiliency Reasoning for System Design Models},
  booktitle    = {Formal Methods in Computer-Aided Design, {FMCAD} 2023, Ames, IA, USA,
                  October 24-27, 2023},
  pages        = {209--220},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.34727/2023/isbn.978-3-85448-060-0\_29},
  doi          = {10.34727/2023/ISBN.978-3-85448-060-0\_29},
  timestamp    = {Wed, 13 Dec 2023 14:38:51 +0100},
  biburl       = {https://dblp.org/rec/conf/fmcad/LarrazLYACT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MazharLHC23,
  author       = {M. Hammad Mazhar and
                  Li Li and
                  Md. Endadul Hoque and
                  Omar Chowdhury},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Maverick: An App-independent and Platform-agnostic Approach to Enforce
                  Policies in IoT Systems at Runtime},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {73--84},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590188},
  doi          = {10.1145/3558482.3590188},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MazharLHC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-01452,
  author       = {M. Hammad Mazhar and
                  Li Li and
                  Md. Endadul Hoque and
                  Omar Chowdhury},
  title        = {{MAVERICK:} An App-independent and Platform-agnostic Approach to Enforce
                  Policies in IoT Systems at Runtime},
  journal      = {CoRR},
  volume       = {abs/2302.01452},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.01452},
  doi          = {10.48550/ARXIV.2302.01452},
  eprinttype    = {arXiv},
  eprint       = {2302.01452},
  timestamp    = {Thu, 09 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-01452.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-12417,
  author       = {Akib Jawad Nafis and
                  Omar Chowdhury and
                  Md. Endadul Hoque},
  title        = {VetIoT: On Vetting IoT Defenses Enforcing Policies at Runtime},
  journal      = {CoRR},
  volume       = {abs/2308.12417},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.12417},
  doi          = {10.48550/ARXIV.2308.12417},
  eprinttype    = {arXiv},
  eprint       = {2308.12417},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-12417.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RahamanCCY22,
  author       = {Sazzadur Rahaman and
                  Haipeng Cai and
                  Omar Chowdhury and
                  Danfeng Yao},
  title        = {From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations
                  in {C/C++}},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {6},
  pages        = {3790--3803},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3108031},
  doi          = {10.1109/TDSC.2021.3108031},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/RahamanCCY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/EcheverriaC22,
  author       = {Mitziu Echeverria and
                  Omar Chowdhury},
  editor       = {Chadi Barakat and
                  Cristel Pelsser and
                  Theophilus A. Benson and
                  David R. Choffnes},
  title        = {Demystifying the presence of cellular network attacks and misbehaviors},
  booktitle    = {Proceedings of the 22nd {ACM} Internet Measurement Conference, {IMC}
                  2022, Nice, France, October 25-27, 2022},
  pages        = {742--743},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3517745.3563017},
  doi          = {10.1145/3517745.3563017},
  timestamp    = {Mon, 06 Feb 2023 21:45:20 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/EcheverriaC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2022,
  editor       = {Sven Dietrich and
                  Omar Chowdhury and
                  Daniel Takabi},
  title        = {{SACMAT} '22: The 27th {ACM} Symposium on Access Control Models and
                  Technologies, New York, NY, USA, June 8 - 10, 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3532105},
  doi          = {10.1145/3532105},
  isbn         = {978-1-4503-9357-7},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/systems/MengLSMISPPHAYV21,
  author       = {Baoluo Meng and
                  Daniel Larraz and
                  Kit Siu and
                  Abha Moitra and
                  John Interrante and
                  William Smith and
                  Saswata Paul and
                  Daniel Prince and
                  Heber Herencia{-}Zapana and
                  M. Fareed Arif and
                  Moosa Yahyazadeh and
                  Vidhya Tekken Valapil and
                  Michael Durling and
                  Cesare Tinelli and
                  Omar Chowdhury},
  title        = {{VERDICT:} {A} Language and Framework for Engineering Cyber Resilient
                  and Safe System},
  journal      = {Syst.},
  volume       = {9},
  number       = {1},
  pages        = {18},
  year         = {2021},
  url          = {https://doi.org/10.3390/systems9010018},
  doi          = {10.3390/SYSTEMS9010018},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/systems/MengLSMISPPHAYV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HussainKICB21,
  author       = {Syed Rafiul Hussain and
                  Imtiaz Karim and
                  Abdullah Al Ishtiaq and
                  Omar Chowdhury and
                  Elisa Bertino},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance
                  Checker for 4G {LTE} Cellular Devices},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {1082--1099},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3485388},
  doi          = {10.1145/3460120.3485388},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HussainKICB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HueDLLMMXHCC21,
  author       = {Man Hong Hue and
                  Joyanta Debnath and
                  Kin Man Leung and
                  Li Li and
                  Mohsen Minaei and
                  M. Hammad Mazhar and
                  Kailiang Xian and
                  Md. Endadul Hoque and
                  Omar Chowdhury and
                  Sze Yiu Chau},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {All your Credentials are Belong to Us: On Insecure WPA2-Enterprise
                  Configurations},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {1100--1117},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484569},
  doi          = {10.1145/3460120.3484569},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HueDLLMMXHCC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DebnathCC21,
  author       = {Joyanta Debnath and
                  Sze Yiu Chau and
                  Omar Chowdhury},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {On Re-engineering the {X.509} {PKI} with Executable Specification
                  for Better Implementation Guarantees},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {1388--1404},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484793},
  doi          = {10.1145/3460120.3484793},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DebnathCC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YahyazadehCLHDI21,
  author       = {Moosa Yahyazadeh and
                  Sze Yiu Chau and
                  Li Li and
                  Man Hong Hue and
                  Joyanta Debnath and
                  Sheung Chiu Ip and
                  Chun Ngai Li and
                  Md. Endadul Hoque and
                  Omar Chowdhury},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Morpheus: Bringing The {(PKCS)} One To Meet the Oracle},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {2474--2496},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3485382},
  doi          = {10.1145/3460120.3485382},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YahyazadehCLHDI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/EcheverriaAWAHC21,
  author       = {Mitziu Echeverria and
                  Zeeshan Ahmed and
                  Bincheng Wang and
                  M. Fareed Arif and
                  Syed Rafiul Hussain and
                  Omar Chowdhury},
  title        = {{PHOENIX:} Device-Centric Cellular Network Protocol Monitoring using
                  Runtime Verification},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/phoenix-device-centric-cellular-network-protocol-monitoring-using-runtime-verification/},
  timestamp    = {Thu, 17 Jun 2021 15:42:26 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/EcheverriaAWAHC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2021,
  editor       = {Jorge Lobo and
                  Roberto Di Pietro and
                  Omar Chowdhury and
                  Hongxin Hu},
  title        = {{SACMAT} '21: The 26th {ACM} Symposium on Access Control Models and
                  Technologies, Virtual Event, Spain, June 16-18, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3450569},
  doi          = {10.1145/3450569},
  isbn         = {978-1-4503-8365-3},
  timestamp    = {Tue, 06 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-00328,
  author       = {Mitziu Echeverria and
                  Zeeshan Ahmed and
                  Bincheng Wang and
                  M. Fareed Arif and
                  Syed Rafiul Hussain and
                  Omar Chowdhury},
  title        = {{PHOENIX:} Device-Centric Cellular Network Protocol Monitoring using
                  Runtime Verification},
  journal      = {CoRR},
  volume       = {abs/2101.00328},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.00328},
  eprinttype    = {arXiv},
  eprint       = {2101.00328},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-00328.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/SinglaHCBL20,
  author       = {Ankush Singla and
                  Syed Rafiul Hussain and
                  Omar Chowdhury and
                  Elisa Bertino and
                  Ninghui Li},
  title        = {Protecting the 4G and 5G Cellular Paging Protocols against Security
                  and Privacy Attacks},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2020},
  number       = {1},
  pages        = {126--142},
  year         = {2020},
  url          = {https://doi.org/10.2478/popets-2020-0008},
  doi          = {10.2478/POPETS-2020-0008},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/SinglaHCBL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DebnathCC20,
  author       = {Joyanta Debnath and
                  Sze Yiu Chau and
                  Omar Chowdhury},
  editor       = {Mauro Conti and
                  Jianying Zhou and
                  Emiliano Casalicchio and
                  Angelo Spognardi},
  title        = {When {TLS} Meets Proxy on Mobile},
  booktitle    = {Applied Cryptography and Network Security - 18th International Conference,
                  {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12147},
  pages        = {387--407},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57878-7\_19},
  doi          = {10.1007/978-3-030-57878-7\_19},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/DebnathCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmcad/ArifLERCT20,
  author       = {M. Fareed Arif and
                  Daniel Larraz and
                  Mitziu Echeverria and
                  Andrew Reynolds and
                  Omar Chowdhury and
                  Cesare Tinelli},
  title        = {{SYSLITE:} Syntax-Guided Synthesis of {PLTL} Formulas from Finite
                  Traces},
  booktitle    = {2020 Formal Methods in Computer Aided Design, {FMCAD} 2020, Haifa,
                  Israel, September 21-24, 2020},
  pages        = {93--103},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.34727/2020/isbn.978-3-85448-042-6\_16},
  doi          = {10.34727/2020/ISBN.978-3-85448-042-6\_16},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fmcad/ArifLERCT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/YahyazadehHHC20,
  author       = {Moosa Yahyazadeh and
                  Syed Rafiul Hussain and
                  Md. Endadul Hoque and
                  Omar Chowdhury},
  editor       = {Jyotirmoy Deshmukh and
                  Dejan Nickovic},
  title        = {PatrIoT: Policy Assisted Resilient Programmable IoT System},
  booktitle    = {Runtime Verification - 20th International Conference, {RV} 2020, Los
                  Angeles, CA, USA, October 6-9, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12399},
  pages        = {151--171},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-60508-7\_8},
  doi          = {10.1007/978-3-030-60508-7\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/YahyazadehHHC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-13604,
  author       = {Elisa Bertino and
                  Syed Rafiul Hussain and
                  Omar Chowdhury},
  title        = {5G Security and Privacy: {A} Research Roadmap},
  journal      = {CoRR},
  volume       = {abs/2003.13604},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.13604},
  eprinttype    = {arXiv},
  eprint       = {2003.13604},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-13604.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KarimCHCB19,
  author       = {Imtiaz Karim and
                  Fabrizio Cicala and
                  Syed Rafiul Hussain and
                  Omar Chowdhury and
                  Elisa Bertino},
  editor       = {David Balenson},
  title        = {Opening Pandora's box through ATFuzzer: dynamic analysis of {AT} interface
                  for Android smartphones},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {529--543},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359833},
  doi          = {10.1145/3359789.3359833},
  timestamp    = {Tue, 26 Nov 2019 09:46:34 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KarimCHCB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HussainEKCB19,
  author       = {Syed Rafiul Hussain and
                  Mitziu Echeverria and
                  Imtiaz Karim and
                  Omar Chowdhury and
                  Elisa Bertino},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {5GReasoner: {A} Property-Directed Security and Privacy Analysis Framework
                  for 5G Cellular Network Protocol},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {669--684},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354263},
  doi          = {10.1145/3319535.3354263},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HussainEKCB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChauYCKL19,
  author       = {Sze Yiu Chau and
                  Moosa Yahyazadeh and
                  Omar Chowdhury and
                  Aniket Kate and
                  Ninghui Li},
  title        = {Analyzing Semantic Correctness with Symbolic Execution: {A} Case Study
                  on PKCS{\#}1 v1.5 Signature Verification},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/analyzing-semantic-correctness-with-symbolic-execution-a-case-study-on-pkcs1-v1-5-signature-verification/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ChauYCKL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HussainECLB19,
  author       = {Syed Rafiul Hussain and
                  Mitziu Echeverria and
                  Omar Chowdhury and
                  Ninghui Li and
                  Elisa Bertino},
  title        = {Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side
                  Channel Information},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/privacy-attacks-to-the-4g-and-5g-cellular-paging-protocols-using-side-channel-information/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/HussainECLB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/YahyazadehPHC19,
  author       = {Moosa Yahyazadeh and
                  Proyash Podder and
                  Md. Endadul Hoque and
                  Omar Chowdhury},
  editor       = {Florian Kerschbaum and
                  Atefeh Mashatan and
                  Jianwei Niu and
                  Adam J. Lee},
  title        = {Expat: Expectation-based Policy Analysis and Enforcement for Appified
                  Smart-Home Platforms},
  booktitle    = {Proceedings of the 24th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019},
  pages        = {61--72},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3322431.3325107},
  doi          = {10.1145/3322431.3325107},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/YahyazadehPHC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HussainESCB19,
  author       = {Syed Rafiul Hussain and
                  Mitziu Echeverria and
                  Ankush Singla and
                  Omar Chowdhury and
                  Elisa Bertino},
  title        = {Insecure connection bootstrapping in cellular networks: the root of
                  all evil},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {1--11},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3323402},
  doi          = {10.1145/3317549.3323402},
  timestamp    = {Tue, 21 May 2019 10:54:31 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HussainESCB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChauWWCKL18,
  author       = {Sze Yiu Chau and
                  Bincheng Wang and
                  Jianxiong Wang and
                  Omar Chowdhury and
                  Aniket Kate and
                  Ninghui Li},
  title        = {Why Johnny Can't Make Money With His Contents: Pitfalls of Designing
                  and Implementing Content Delivery Apps},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {236--251},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274752},
  doi          = {10.1145/3274694.3274752},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ChauWWCKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HussainCMB18,
  author       = {Syed Rafiul Hussain and
                  Omar Chowdhury and
                  Shagufta Mehnaz and
                  Elisa Bertino},
  title        = {LTEInspector: {A} Systematic Approach for Adversarial Testing of 4G
                  {LTE}},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_02A-3\_Hussain\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/HussainCMB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Chowdhury18,
  author       = {Omar Chowdhury},
  editor       = {Elisa Bertino and
                  Dan Lin and
                  Jorge Lobo},
  title        = {How Inadequate Specification, Buggy Implementation, and Deficient
                  Platform-Support Hinder Security},
  booktitle    = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models
                  and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15,
                  2018},
  pages        = {221},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3205977.3206002},
  doi          = {10.1145/3205977.3206002},
  timestamp    = {Wed, 21 Nov 2018 12:44:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/Chowdhury18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ChauCGGYFL18,
  author       = {Sze Yiu Chau and
                  Omar Chowdhury and
                  Victor E. Gonsalves and
                  Huangyi Ge and
                  Weining Yang and
                  Sonia Fahmy and
                  Ninghui Li},
  editor       = {Raheem Beyah and
                  Bing Chang and
                  Yingjiu Li and
                  Sencun Zhu},
  title        = {Adaptive Deterrence of {DNS} Cache Poisoning},
  booktitle    = {Security and Privacy in Communication Networks - 14th International
                  Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {255},
  pages        = {171--191},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01704-0\_10},
  doi          = {10.1007/978-3-030-01704-0\_10},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ChauCGGYFL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/HoqueCCNL17,
  author       = {Md. Endadul Hoque and
                  Omar Chowdhury and
                  Sze Yiu Chau and
                  Cristina Nita{-}Rotaru and
                  Ninghui Li},
  title        = {Analyzing Operational Behavior of Stateful Protocol Implementations
                  for Detecting Semantic Bugs},
  booktitle    = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017},
  pages        = {627--638},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSN.2017.36},
  doi          = {10.1109/DSN.2017.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/HoqueCCNL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChauCHGKNL17,
  author       = {Sze Yiu Chau and
                  Omar Chowdhury and
                  Md. Endadul Hoque and
                  Huangyi Ge and
                  Aniket Kate and
                  Cristina Nita{-}Rotaru and
                  Ninghui Li},
  title        = {SymCerts: Practical Symbolic Execution for Exposing Noncompliance
                  in {X.509} Certificate Validation Implementations},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {503--520},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.40},
  doi          = {10.1109/SP.2017.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChauCHGKNL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangGCML16,
  author       = {Tianhao Wang and
                  Huangyi Ge and
                  Omar Chowdhury and
                  Hemanta K. Maji and
                  Ninghui Li},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {On the Security and Usability of Segment-based Visual Cryptographic
                  Authentication Protocols},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {603--615},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978417},
  doi          = {10.1145/2976749.2978417},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangGCML16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YangLCXP16,
  author       = {Weining Yang and
                  Ninghui Li and
                  Omar Chowdhury and
                  Aiping Xiong and
                  Robert W. Proctor},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {An Empirical Study of Mnemonic Sentence-based Password Generation
                  Strategies},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1216--1229},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978346},
  doi          = {10.1145/2976749.2978346},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YangLCXP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ChenCLKCMP16,
  author       = {Haining Chen and
                  Omar Chowdhury and
                  Ninghui Li and
                  Warut Khern{-}am{-}nuai and
                  Suresh Chari and
                  Ian M. Molloy and
                  Youngja Park},
  editor       = {X. Sean Wang and
                  Lujo Bauer and
                  Florian Kerschbaum},
  title        = {Tri-Modularization of Firewall Policies},
  booktitle    = {Proceedings of the 21st {ACM} on Symposium on Access Control Models
                  and Technologies, {SACMAT} 2016, Shanghai, China, June 5-8, 2016},
  pages        = {37--48},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2914642.2914646},
  doi          = {10.1145/2914642.2914646},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/ChenCLKCMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Chowdhury0JD15,
  author       = {Omar Chowdhury and
                  Deepak Garg and
                  Limin Jia and
                  Anupam Datta},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Equivalence-based Security for Querying Encrypted Databases: Theory
                  and Application to Privacy Policy Audits},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1130--1143},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813638},
  doi          = {10.1145/2810103.2813638},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Chowdhury0JD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/ChenCCLP15,
  author       = {Haining Chen and
                  Omar Chowdhury and
                  Jing Chen and
                  Ninghui Li and
                  Robert W. Proctor},
  editor       = {David M. Nicol},
  title        = {Towards quantification of firewall policy complexity},
  booktitle    = {Proceedings of the 2015 Symposium and Bootcamp on the Science of Security,
                  HotSoS 2015, Urbana, IL, USA, April 21-22, 2015},
  pages        = {18:1--18:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746194.2746212},
  doi          = {10.1145/2746194.2746212},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotsos/ChenCCLP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/KaneCDK15,
  author       = {Aaron Kane and
                  Omar Chowdhury and
                  Anupam Datta and
                  Philip Koopman},
  editor       = {Ezio Bartocci and
                  Rupak Majumdar},
  title        = {A Case Study on Runtime Monitoring of an Autonomous Research Vehicle
                  {(ARV)} System},
  booktitle    = {Runtime Verification - 6th International Conference, {RV} 2015 Vienna,
                  Austria, September 22-25, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9333},
  pages        = {102--117},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23820-3\_7},
  doi          = {10.1007/978-3-319-23820-3\_7},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/KaneCDK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Chowdhury0JD15,
  author       = {Omar Chowdhury and
                  Deepak Garg and
                  Limin Jia and
                  Anupam Datta},
  title        = {Equivalence-based Security for Querying Encrypted Databases: Theory
                  and Application to Privacy Policy Audits},
  journal      = {CoRR},
  volume       = {abs/1508.02448},
  year         = {2015},
  url          = {http://arxiv.org/abs/1508.02448},
  eprinttype    = {arXiv},
  eprint       = {1508.02448},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Chowdhury0JD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ChowdhuryJGD14,
  author       = {Omar Chowdhury and
                  Limin Jia and
                  Deepak Garg and
                  Anupam Datta},
  editor       = {Armin Biere and
                  Roderick Bloem},
  title        = {Temporal Mode-Checking for Runtime Monitoring of Privacy Policies},
  booktitle    = {Computer Aided Verification - 26th International Conference, {CAV}
                  2014, Held as Part of the Vienna Summer of Logic, {VSL} 2014, Vienna,
                  Austria, July 18-22, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8559},
  pages        = {131--149},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08867-9\_9},
  doi          = {10.1007/978-3-319-08867-9\_9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/ChowdhuryJGD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ChowdhuryGNRBDJW13,
  author       = {Omar Chowdhury and
                  Andreas Gampe and
                  Jianwei Niu and
                  Jeffery von Ronne and
                  Jared Bennatt and
                  Anupam Datta and
                  Limin Jia and
                  William H. Winsborough},
  editor       = {Mauro Conti and
                  Jaideep Vaidya and
                  Andreas Schaad},
  title        = {Privacy promises that can be kept: a policy analysis method with application
                  to the {HIPAA} privacy rule},
  booktitle    = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '13, Amsterdam, The Netherlands, June 12-14, 2013},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462410.2462423},
  doi          = {10.1145/2462410.2462423},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/ChowdhuryGNRBDJW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/PontualGCKAW12,
  author       = {Murillo Pontual and
                  Andreas Gampe and
                  Omar Chowdhury and
                  Bazoumana Kone and
                  Md. Shamim Ashik and
                  William H. Winsborough},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {The privacy in the time of the internet: secrecy vs transparency},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {133--140},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133618},
  doi          = {10.1145/2133601.2133618},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/PontualGCKAW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ChowdhuryPWYIN12,
  author       = {Omar Chowdhury and
                  Murillo Pontual and
                  William H. Winsborough and
                  Ting Yu and
                  Keith Irwin and
                  Jianwei Niu},
  editor       = {Vijay Atluri and
                  Jaideep Vaidya and
                  Axel Kern and
                  Murat Kantarcioglu},
  title        = {Ensuring authorization privileges for cascading user obligations},
  booktitle    = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '12, Newark, NJ, {USA} - June 20 - 22, 2012},
  pages        = {33--44},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2295136.2295144},
  doi          = {10.1145/2295136.2295144},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/ChowdhuryPWYIN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChowdhuryCNLB12,
  author       = {Omar Chowdhury and
                  Haining Chen and
                  Jianwei Niu and
                  Ninghui Li and
                  Elisa Bertino},
  editor       = {Carl A. Gunter and
                  Zachary N. J. Peterson},
  title        = {On XACML's Adequacy to Specify and to Enforce {HIPAA}},
  booktitle    = {3rd {USENIX} Workshop on Health Security and Privacy, HealthSec'12,
                  Bellevue, WA, USA, August 6-7, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/healthsec12/workshop-program/presentation/chowdhury},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ChowdhuryCNLB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/PontualCWYI11,
  author       = {Murillo Pontual and
                  Omar Chowdhury and
                  William H. Winsborough and
                  Ting Yu and
                  Keith Irwin},
  editor       = {Ruth Breu and
                  Jason Crampton and
                  Jorge Lobo},
  title        = {On the management of user obligations},
  booktitle    = {16th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2011, Innsbruck, Austria, June 15-17, 2011, Proceedings},
  pages        = {175--184},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998441.1998473},
  doi          = {10.1145/1998441.1998473},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/PontualCWYI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PontualCWYI10,
  author       = {Murillo Pontual and
                  Omar Chowdhury and
                  William H. Winsborough and
                  Ting Yu and
                  Keith Irwin},
  editor       = {Dengguo Feng and
                  David A. Basin and
                  Peng Liu},
  title        = {Toward practical authorization-dependent user obligation systems},
  booktitle    = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
                  2010},
  pages        = {180--191},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1755688.1755711},
  doi          = {10.1145/1755688.1755711},
  timestamp    = {Fri, 03 Jun 2022 12:02:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PontualCWYI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/PontualICWY10,
  author       = {Murillo Pontual and
                  Keith Irwin and
                  Omar Chowdhury and
                  William H. Winsborough and
                  Ting Yu},
  editor       = {Ahmed K. Elmagarmid and
                  Divyakant Agrawal},
  title        = {Failure Feedback for User Obligation Systems},
  booktitle    = {Proceedings of the 2010 {IEEE} Second International Conference on
                  Social Computing, SocialCom / {IEEE} International Conference on Privacy,
                  Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
                  August 20-22, 2010},
  pages        = {713--720},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SocialCom.2010.111},
  doi          = {10.1109/SOCIALCOM.2010.111},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/PontualICWY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics