BibTeX records: Omar Chowdhury

download as .bib file

@inproceedings{DBLP:conf/cns/NafisCH23,
  author       = {Akib Jawad Nafis and
                  Omar Chowdhury and
                  Md. Endadul Hoque},
  title        = {VetIoT: On Vetting IoT Defenses Enforcing Policies at Runtime},
  booktitle    = {{CNS}},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023}
}
@inproceedings{DBLP:conf/fmcad/LarrazLYACT23,
  author       = {Daniel Larraz and
                  Robert Lorch and
                  Moosa Yahyazadeh and
                  M. Fareed Arif and
                  Omar Chowdhury and
                  Cesare Tinelli},
  title        = {{CRV:} Automated Cyber-Resiliency Reasoning for System Design Models},
  booktitle    = {{FMCAD}},
  pages        = {209--220},
  publisher    = {{IEEE}},
  year         = {2023}
}
@inproceedings{DBLP:conf/wisec/MazharLHC23,
  author       = {M. Hammad Mazhar and
                  Li Li and
                  Md. Endadul Hoque and
                  Omar Chowdhury},
  title        = {Maverick: An App-independent and Platform-agnostic Approach to Enforce
                  Policies in IoT Systems at Runtime},
  booktitle    = {{WISEC}},
  pages        = {73--84},
  publisher    = {{ACM}},
  year         = {2023}
}
@article{DBLP:journals/corr/abs-2302-01452,
  author       = {M. Hammad Mazhar and
                  Li Li and
                  Md. Endadul Hoque and
                  Omar Chowdhury},
  title        = {{MAVERICK:} An App-independent and Platform-agnostic Approach to Enforce
                  Policies in IoT Systems at Runtime},
  journal      = {CoRR},
  volume       = {abs/2302.01452},
  year         = {2023}
}
@article{DBLP:journals/corr/abs-2308-12417,
  author       = {Akib Jawad Nafis and
                  Omar Chowdhury and
                  Md. Endadul Hoque},
  title        = {VetIoT: On Vetting IoT Defenses Enforcing Policies at Runtime},
  journal      = {CoRR},
  volume       = {abs/2308.12417},
  year         = {2023}
}
@article{DBLP:journals/tdsc/RahamanCCY22,
  author       = {Sazzadur Rahaman and
                  Haipeng Cai and
                  Omar Chowdhury and
                  Danfeng Yao},
  title        = {From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations
                  in {C/C++}},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {6},
  pages        = {3790--3803},
  year         = {2022}
}
@inproceedings{DBLP:conf/imc/EcheverriaC22,
  author       = {Mitziu Echeverria and
                  Omar Chowdhury},
  title        = {Demystifying the presence of cellular network attacks and misbehaviors},
  booktitle    = {{IMC}},
  pages        = {742--743},
  publisher    = {{ACM}},
  year         = {2022}
}
@proceedings{DBLP:conf/sacmat/2022,
  editor       = {Sven Dietrich and
                  Omar Chowdhury and
                  Daniel Takabi},
  title        = {{SACMAT} '22: The 27th {ACM} Symposium on Access Control Models and
                  Technologies, New York, NY, USA, June 8 - 10, 2022},
  publisher    = {{ACM}},
  year         = {2022}
}
@article{DBLP:journals/systems/MengLSMISPPHAYV21,
  author       = {Baoluo Meng and
                  Daniel Larraz and
                  Kit Siu and
                  Abha Moitra and
                  John Interrante and
                  William Smith and
                  Saswata Paul and
                  Daniel Prince and
                  Heber Herencia{-}Zapana and
                  M. Fareed Arif and
                  Moosa Yahyazadeh and
                  Vidhya Tekken Valapil and
                  Michael Durling and
                  Cesare Tinelli and
                  Omar Chowdhury},
  title        = {{VERDICT:} {A} Language and Framework for Engineering Cyber Resilient
                  and Safe System},
  journal      = {Syst.},
  volume       = {9},
  number       = {1},
  pages        = {18},
  year         = {2021}
}
@inproceedings{DBLP:conf/ccs/HussainKICB21,
  author       = {Syed Rafiul Hussain and
                  Imtiaz Karim and
                  Abdullah Al Ishtiaq and
                  Omar Chowdhury and
                  Elisa Bertino},
  title        = {Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance
                  Checker for 4G {LTE} Cellular Devices},
  booktitle    = {{CCS}},
  pages        = {1082--1099},
  publisher    = {{ACM}},
  year         = {2021}
}
@inproceedings{DBLP:conf/ccs/HueDLLMMXHCC21,
  author       = {Man Hong Hue and
                  Joyanta Debnath and
                  Kin Man Leung and
                  Li Li and
                  Mohsen Minaei and
                  M. Hammad Mazhar and
                  Kailiang Xian and
                  Md. Endadul Hoque and
                  Omar Chowdhury and
                  Sze Yiu Chau},
  title        = {All your Credentials are Belong to Us: On Insecure WPA2-Enterprise
                  Configurations},
  booktitle    = {{CCS}},
  pages        = {1100--1117},
  publisher    = {{ACM}},
  year         = {2021}
}
@inproceedings{DBLP:conf/ccs/DebnathCC21,
  author       = {Joyanta Debnath and
                  Sze Yiu Chau and
                  Omar Chowdhury},
  title        = {On Re-engineering the {X.509} {PKI} with Executable Specification
                  for Better Implementation Guarantees},
  booktitle    = {{CCS}},
  pages        = {1388--1404},
  publisher    = {{ACM}},
  year         = {2021}
}
@inproceedings{DBLP:conf/ccs/YahyazadehCLHDI21,
  author       = {Moosa Yahyazadeh and
                  Sze Yiu Chau and
                  Li Li and
                  Man Hong Hue and
                  Joyanta Debnath and
                  Sheung Chiu Ip and
                  Chun Ngai Li and
                  Md. Endadul Hoque and
                  Omar Chowdhury},
  title        = {Morpheus: Bringing The {(PKCS)} One To Meet the Oracle},
  booktitle    = {{CCS}},
  pages        = {2474--2496},
  publisher    = {{ACM}},
  year         = {2021}
}
@inproceedings{DBLP:conf/ndss/EcheverriaAWAHC21,
  author       = {Mitziu Echeverria and
                  Zeeshan Ahmed and
                  Bincheng Wang and
                  M. Fareed Arif and
                  Syed Rafiul Hussain and
                  Omar Chowdhury},
  title        = {{PHOENIX:} Device-Centric Cellular Network Protocol Monitoring using
                  Runtime Verification},
  booktitle    = {{NDSS}},
  publisher    = {The Internet Society},
  year         = {2021}
}
@proceedings{DBLP:conf/sacmat/2021,
  editor       = {Jorge Lobo and
                  Roberto Di Pietro and
                  Omar Chowdhury and
                  Hongxin Hu},
  title        = {{SACMAT} '21: The 26th {ACM} Symposium on Access Control Models and
                  Technologies, Virtual Event, Spain, June 16-18, 2021},
  publisher    = {{ACM}},
  year         = {2021}
}
@article{DBLP:journals/corr/abs-2101-00328,
  author       = {Mitziu Echeverria and
                  Zeeshan Ahmed and
                  Bincheng Wang and
                  M. Fareed Arif and
                  Syed Rafiul Hussain and
                  Omar Chowdhury},
  title        = {{PHOENIX:} Device-Centric Cellular Network Protocol Monitoring using
                  Runtime Verification},
  journal      = {CoRR},
  volume       = {abs/2101.00328},
  year         = {2021}
}
@article{DBLP:journals/popets/SinglaHCBL20,
  author       = {Ankush Singla and
                  Syed Rafiul Hussain and
                  Omar Chowdhury and
                  Elisa Bertino and
                  Ninghui Li},
  title        = {Protecting the 4G and 5G Cellular Paging Protocols against Security
                  and Privacy Attacks},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2020},
  number       = {1},
  pages        = {126--142},
  year         = {2020}
}
@inproceedings{DBLP:conf/acns/DebnathCC20,
  author       = {Joyanta Debnath and
                  Sze Yiu Chau and
                  Omar Chowdhury},
  title        = {When {TLS} Meets Proxy on Mobile},
  booktitle    = {{ACNS} {(2)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12147},
  pages        = {387--407},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/fmcad/ArifLERCT20,
  author       = {M. Fareed Arif and
                  Daniel Larraz and
                  Mitziu Echeverria and
                  Andrew Reynolds and
                  Omar Chowdhury and
                  Cesare Tinelli},
  title        = {{SYSLITE:} Syntax-Guided Synthesis of {PLTL} Formulas from Finite
                  Traces},
  booktitle    = {{FMCAD}},
  pages        = {93--103},
  publisher    = {{IEEE}},
  year         = {2020}
}
@inproceedings{DBLP:conf/rv/YahyazadehHHC20,
  author       = {Moosa Yahyazadeh and
                  Syed Rafiul Hussain and
                  Md. Endadul Hoque and
                  Omar Chowdhury},
  title        = {PatrIoT: Policy Assisted Resilient Programmable IoT System},
  booktitle    = {{RV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12399},
  pages        = {151--171},
  publisher    = {Springer},
  year         = {2020}
}
@article{DBLP:journals/corr/abs-2003-13604,
  author       = {Elisa Bertino and
                  Syed Rafiul Hussain and
                  Omar Chowdhury},
  title        = {5G Security and Privacy: {A} Research Roadmap},
  journal      = {CoRR},
  volume       = {abs/2003.13604},
  year         = {2020}
}
@inproceedings{DBLP:conf/acsac/KarimCHCB19,
  author       = {Imtiaz Karim and
                  Fabrizio Cicala and
                  Syed Rafiul Hussain and
                  Omar Chowdhury and
                  Elisa Bertino},
  title        = {Opening Pandora's box through ATFuzzer: dynamic analysis of {AT} interface
                  for Android smartphones},
  booktitle    = {{ACSAC}},
  pages        = {529--543},
  publisher    = {{ACM}},
  year         = {2019}
}
@inproceedings{DBLP:conf/ccs/HussainEKCB19,
  author       = {Syed Rafiul Hussain and
                  Mitziu Echeverria and
                  Imtiaz Karim and
                  Omar Chowdhury and
                  Elisa Bertino},
  title        = {5GReasoner: {A} Property-Directed Security and Privacy Analysis Framework
                  for 5G Cellular Network Protocol},
  booktitle    = {{CCS}},
  pages        = {669--684},
  publisher    = {{ACM}},
  year         = {2019}
}
@inproceedings{DBLP:conf/ndss/ChauYCKL19,
  author       = {Sze Yiu Chau and
                  Moosa Yahyazadeh and
                  Omar Chowdhury and
                  Aniket Kate and
                  Ninghui Li},
  title        = {Analyzing Semantic Correctness with Symbolic Execution: {A} Case Study
                  on PKCS{\#}1 v1.5 Signature Verification},
  booktitle    = {{NDSS}},
  publisher    = {The Internet Society},
  year         = {2019}
}
@inproceedings{DBLP:conf/ndss/HussainECLB19,
  author       = {Syed Rafiul Hussain and
                  Mitziu Echeverria and
                  Omar Chowdhury and
                  Ninghui Li and
                  Elisa Bertino},
  title        = {Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side
                  Channel Information},
  booktitle    = {{NDSS}},
  publisher    = {The Internet Society},
  year         = {2019}
}
@inproceedings{DBLP:conf/sacmat/YahyazadehPHC19,
  author       = {Moosa Yahyazadeh and
                  Proyash Podder and
                  Md. Endadul Hoque and
                  Omar Chowdhury},
  title        = {Expat: Expectation-based Policy Analysis and Enforcement for Appified
                  Smart-Home Platforms},
  booktitle    = {{SACMAT}},
  pages        = {61--72},
  publisher    = {{ACM}},
  year         = {2019}
}
@inproceedings{DBLP:conf/wisec/HussainESCB19,
  author       = {Syed Rafiul Hussain and
                  Mitziu Echeverria and
                  Ankush Singla and
                  Omar Chowdhury and
                  Elisa Bertino},
  title        = {Insecure connection bootstrapping in cellular networks: the root of
                  all evil},
  booktitle    = {WiSec},
  pages        = {1--11},
  publisher    = {{ACM}},
  year         = {2019}
}
@inproceedings{DBLP:conf/acsac/ChauWWCKL18,
  author       = {Sze Yiu Chau and
                  Bincheng Wang and
                  Jianxiong Wang and
                  Omar Chowdhury and
                  Aniket Kate and
                  Ninghui Li},
  title        = {Why Johnny Can't Make Money With His Contents: Pitfalls of Designing
                  and Implementing Content Delivery Apps},
  booktitle    = {{ACSAC}},
  pages        = {236--251},
  publisher    = {{ACM}},
  year         = {2018}
}
@inproceedings{DBLP:conf/ndss/HussainCMB18,
  author       = {Syed Rafiul Hussain and
                  Omar Chowdhury and
                  Shagufta Mehnaz and
                  Elisa Bertino},
  title        = {LTEInspector: {A} Systematic Approach for Adversarial Testing of 4G
                  {LTE}},
  booktitle    = {{NDSS}},
  publisher    = {The Internet Society},
  year         = {2018}
}
@inproceedings{DBLP:conf/sacmat/Chowdhury18,
  author       = {Omar Chowdhury},
  title        = {How Inadequate Specification, Buggy Implementation, and Deficient
                  Platform-Support Hinder Security},
  booktitle    = {{SACMAT}},
  pages        = {221},
  publisher    = {{ACM}},
  year         = {2018}
}
@inproceedings{DBLP:conf/securecomm/ChauCGGYFL18,
  author       = {Sze Yiu Chau and
                  Omar Chowdhury and
                  Victor E. Gonsalves and
                  Huangyi Ge and
                  Weining Yang and
                  Sonia Fahmy and
                  Ninghui Li},
  title        = {Adaptive Deterrence of {DNS} Cache Poisoning},
  booktitle    = {SecureComm {(2)}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {255},
  pages        = {171--191},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/dsn/HoqueCCNL17,
  author       = {Md. Endadul Hoque and
                  Omar Chowdhury and
                  Sze Yiu Chau and
                  Cristina Nita{-}Rotaru and
                  Ninghui Li},
  title        = {Analyzing Operational Behavior of Stateful Protocol Implementations
                  for Detecting Semantic Bugs},
  booktitle    = {{DSN}},
  pages        = {627--638},
  publisher    = {{IEEE} Computer Society},
  year         = {2017}
}
@inproceedings{DBLP:conf/sp/ChauCHGKNL17,
  author       = {Sze Yiu Chau and
                  Omar Chowdhury and
                  Md. Endadul Hoque and
                  Huangyi Ge and
                  Aniket Kate and
                  Cristina Nita{-}Rotaru and
                  Ninghui Li},
  title        = {SymCerts: Practical Symbolic Execution for Exposing Noncompliance
                  in {X.509} Certificate Validation Implementations},
  booktitle    = {{IEEE} Symposium on Security and Privacy},
  pages        = {503--520},
  publisher    = {{IEEE} Computer Society},
  year         = {2017}
}
@inproceedings{DBLP:conf/ccs/WangGCML16,
  author       = {Tianhao Wang and
                  Huangyi Ge and
                  Omar Chowdhury and
                  Hemanta K. Maji and
                  Ninghui Li},
  title        = {On the Security and Usability of Segment-based Visual Cryptographic
                  Authentication Protocols},
  booktitle    = {{CCS}},
  pages        = {603--615},
  publisher    = {{ACM}},
  year         = {2016}
}
@inproceedings{DBLP:conf/ccs/YangLCXP16,
  author       = {Weining Yang and
                  Ninghui Li and
                  Omar Chowdhury and
                  Aiping Xiong and
                  Robert W. Proctor},
  title        = {An Empirical Study of Mnemonic Sentence-based Password Generation
                  Strategies},
  booktitle    = {{CCS}},
  pages        = {1216--1229},
  publisher    = {{ACM}},
  year         = {2016}
}
@inproceedings{DBLP:conf/sacmat/ChenCLKCMP16,
  author       = {Haining Chen and
                  Omar Chowdhury and
                  Ninghui Li and
                  Warut Khern{-}am{-}nuai and
                  Suresh Chari and
                  Ian M. Molloy and
                  Youngja Park},
  title        = {Tri-Modularization of Firewall Policies},
  booktitle    = {{SACMAT}},
  pages        = {37--48},
  publisher    = {{ACM}},
  year         = {2016}
}
@inproceedings{DBLP:conf/ccs/Chowdhury0JD15,
  author       = {Omar Chowdhury and
                  Deepak Garg and
                  Limin Jia and
                  Anupam Datta},
  title        = {Equivalence-based Security for Querying Encrypted Databases: Theory
                  and Application to Privacy Policy Audits},
  booktitle    = {{CCS}},
  pages        = {1130--1143},
  publisher    = {{ACM}},
  year         = {2015}
}
@inproceedings{DBLP:conf/hotsos/ChenCCLP15,
  author       = {Haining Chen and
                  Omar Chowdhury and
                  Jing Chen and
                  Ninghui Li and
                  Robert W. Proctor},
  title        = {Towards quantification of firewall policy complexity},
  booktitle    = {HotSoS},
  pages        = {18:1--18:2},
  publisher    = {{ACM}},
  year         = {2015}
}
@inproceedings{DBLP:conf/rv/KaneCDK15,
  author       = {Aaron Kane and
                  Omar Chowdhury and
                  Anupam Datta and
                  Philip Koopman},
  title        = {A Case Study on Runtime Monitoring of an Autonomous Research Vehicle
                  {(ARV)} System},
  booktitle    = {{RV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9333},
  pages        = {102--117},
  publisher    = {Springer},
  year         = {2015}
}
@article{DBLP:journals/corr/Chowdhury0JD15,
  author       = {Omar Chowdhury and
                  Deepak Garg and
                  Limin Jia and
                  Anupam Datta},
  title        = {Equivalence-based Security for Querying Encrypted Databases: Theory
                  and Application to Privacy Policy Audits},
  journal      = {CoRR},
  volume       = {abs/1508.02448},
  year         = {2015}
}
@inproceedings{DBLP:conf/cav/ChowdhuryJGD14,
  author       = {Omar Chowdhury and
                  Limin Jia and
                  Deepak Garg and
                  Anupam Datta},
  title        = {Temporal Mode-Checking for Runtime Monitoring of Privacy Policies},
  booktitle    = {{CAV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8559},
  pages        = {131--149},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/sacmat/ChowdhuryGNRBDJW13,
  author       = {Omar Chowdhury and
                  Andreas Gampe and
                  Jianwei Niu and
                  Jeffery von Ronne and
                  Jared Bennatt and
                  Anupam Datta and
                  Limin Jia and
                  William H. Winsborough},
  title        = {Privacy promises that can be kept: a policy analysis method with application
                  to the {HIPAA} privacy rule},
  booktitle    = {{SACMAT}},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2013}
}
@inproceedings{DBLP:conf/codaspy/PontualGCKAW12,
  author       = {Murillo Pontual and
                  Andreas Gampe and
                  Omar Chowdhury and
                  Bazoumana Kone and
                  Md. Shamim Ashik and
                  William H. Winsborough},
  title        = {The privacy in the time of the internet: secrecy vs transparency},
  booktitle    = {{CODASPY}},
  pages        = {133--140},
  publisher    = {{ACM}},
  year         = {2012}
}
@inproceedings{DBLP:conf/sacmat/ChowdhuryPWYIN12,
  author       = {Omar Chowdhury and
                  Murillo Pontual and
                  William H. Winsborough and
                  Ting Yu and
                  Keith Irwin and
                  Jianwei Niu},
  title        = {Ensuring authorization privileges for cascading user obligations},
  booktitle    = {{SACMAT}},
  pages        = {33--44},
  publisher    = {{ACM}},
  year         = {2012}
}
@inproceedings{DBLP:conf/uss/ChowdhuryCNLB12,
  author       = {Omar Chowdhury and
                  Haining Chen and
                  Jianwei Niu and
                  Ninghui Li and
                  Elisa Bertino},
  title        = {On XACML's Adequacy to Specify and to Enforce {HIPAA}},
  booktitle    = {HealthSec},
  publisher    = {{USENIX} Association},
  year         = {2012}
}
@inproceedings{DBLP:conf/sacmat/PontualCWYI11,
  author       = {Murillo Pontual and
                  Omar Chowdhury and
                  William H. Winsborough and
                  Ting Yu and
                  Keith Irwin},
  title        = {On the management of user obligations},
  booktitle    = {{SACMAT}},
  pages        = {175--184},
  publisher    = {{ACM}},
  year         = {2011}
}
@inproceedings{DBLP:conf/ccs/PontualCWYI10,
  author       = {Murillo Pontual and
                  Omar Chowdhury and
                  William H. Winsborough and
                  Ting Yu and
                  Keith Irwin},
  title        = {Toward practical authorization-dependent user obligation systems},
  booktitle    = {AsiaCCS},
  pages        = {180--191},
  publisher    = {{ACM}},
  year         = {2010}
}
@inproceedings{DBLP:conf/socialcom/PontualICWY10,
  author       = {Murillo Pontual and
                  Keith Irwin and
                  Omar Chowdhury and
                  William H. Winsborough and
                  Ting Yu},
  title        = {Failure Feedback for User Obligation Systems},
  booktitle    = {SocialCom/PASSAT},
  pages        = {713--720},
  publisher    = {{IEEE} Computer Society},
  year         = {2010}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics