Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Omar Chowdhury
@inproceedings{DBLP:conf/cns/NafisCH23, author = {Akib Jawad Nafis and Omar Chowdhury and Md. Endadul Hoque}, title = {VetIoT: On Vetting IoT Defenses Enforcing Policies at Runtime}, booktitle = {{CNS}}, pages = {1--9}, publisher = {{IEEE}}, year = {2023} }
@inproceedings{DBLP:conf/fmcad/LarrazLYACT23, author = {Daniel Larraz and Robert Lorch and Moosa Yahyazadeh and M. Fareed Arif and Omar Chowdhury and Cesare Tinelli}, title = {{CRV:} Automated Cyber-Resiliency Reasoning for System Design Models}, booktitle = {{FMCAD}}, pages = {209--220}, publisher = {{IEEE}}, year = {2023} }
@inproceedings{DBLP:conf/wisec/MazharLHC23, author = {M. Hammad Mazhar and Li Li and Md. Endadul Hoque and Omar Chowdhury}, title = {Maverick: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime}, booktitle = {{WISEC}}, pages = {73--84}, publisher = {{ACM}}, year = {2023} }
@article{DBLP:journals/corr/abs-2302-01452, author = {M. Hammad Mazhar and Li Li and Md. Endadul Hoque and Omar Chowdhury}, title = {{MAVERICK:} An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime}, journal = {CoRR}, volume = {abs/2302.01452}, year = {2023} }
@article{DBLP:journals/corr/abs-2308-12417, author = {Akib Jawad Nafis and Omar Chowdhury and Md. Endadul Hoque}, title = {VetIoT: On Vetting IoT Defenses Enforcing Policies at Runtime}, journal = {CoRR}, volume = {abs/2308.12417}, year = {2023} }
@article{DBLP:journals/tdsc/RahamanCCY22, author = {Sazzadur Rahaman and Haipeng Cai and Omar Chowdhury and Danfeng Yao}, title = {From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in {C/C++}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {6}, pages = {3790--3803}, year = {2022} }
@inproceedings{DBLP:conf/imc/EcheverriaC22, author = {Mitziu Echeverria and Omar Chowdhury}, title = {Demystifying the presence of cellular network attacks and misbehaviors}, booktitle = {{IMC}}, pages = {742--743}, publisher = {{ACM}}, year = {2022} }
@proceedings{DBLP:conf/sacmat/2022, editor = {Sven Dietrich and Omar Chowdhury and Daniel Takabi}, title = {{SACMAT} '22: The 27th {ACM} Symposium on Access Control Models and Technologies, New York, NY, USA, June 8 - 10, 2022}, publisher = {{ACM}}, year = {2022} }
@article{DBLP:journals/systems/MengLSMISPPHAYV21, author = {Baoluo Meng and Daniel Larraz and Kit Siu and Abha Moitra and John Interrante and William Smith and Saswata Paul and Daniel Prince and Heber Herencia{-}Zapana and M. Fareed Arif and Moosa Yahyazadeh and Vidhya Tekken Valapil and Michael Durling and Cesare Tinelli and Omar Chowdhury}, title = {{VERDICT:} {A} Language and Framework for Engineering Cyber Resilient and Safe System}, journal = {Syst.}, volume = {9}, number = {1}, pages = {18}, year = {2021} }
@inproceedings{DBLP:conf/ccs/HussainKICB21, author = {Syed Rafiul Hussain and Imtiaz Karim and Abdullah Al Ishtiaq and Omar Chowdhury and Elisa Bertino}, title = {Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G {LTE} Cellular Devices}, booktitle = {{CCS}}, pages = {1082--1099}, publisher = {{ACM}}, year = {2021} }
@inproceedings{DBLP:conf/ccs/HueDLLMMXHCC21, author = {Man Hong Hue and Joyanta Debnath and Kin Man Leung and Li Li and Mohsen Minaei and M. Hammad Mazhar and Kailiang Xian and Md. Endadul Hoque and Omar Chowdhury and Sze Yiu Chau}, title = {All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations}, booktitle = {{CCS}}, pages = {1100--1117}, publisher = {{ACM}}, year = {2021} }
@inproceedings{DBLP:conf/ccs/DebnathCC21, author = {Joyanta Debnath and Sze Yiu Chau and Omar Chowdhury}, title = {On Re-engineering the {X.509} {PKI} with Executable Specification for Better Implementation Guarantees}, booktitle = {{CCS}}, pages = {1388--1404}, publisher = {{ACM}}, year = {2021} }
@inproceedings{DBLP:conf/ccs/YahyazadehCLHDI21, author = {Moosa Yahyazadeh and Sze Yiu Chau and Li Li and Man Hong Hue and Joyanta Debnath and Sheung Chiu Ip and Chun Ngai Li and Md. Endadul Hoque and Omar Chowdhury}, title = {Morpheus: Bringing The {(PKCS)} One To Meet the Oracle}, booktitle = {{CCS}}, pages = {2474--2496}, publisher = {{ACM}}, year = {2021} }
@inproceedings{DBLP:conf/ndss/EcheverriaAWAHC21, author = {Mitziu Echeverria and Zeeshan Ahmed and Bincheng Wang and M. Fareed Arif and Syed Rafiul Hussain and Omar Chowdhury}, title = {{PHOENIX:} Device-Centric Cellular Network Protocol Monitoring using Runtime Verification}, booktitle = {{NDSS}}, publisher = {The Internet Society}, year = {2021} }
@proceedings{DBLP:conf/sacmat/2021, editor = {Jorge Lobo and Roberto Di Pietro and Omar Chowdhury and Hongxin Hu}, title = {{SACMAT} '21: The 26th {ACM} Symposium on Access Control Models and Technologies, Virtual Event, Spain, June 16-18, 2021}, publisher = {{ACM}}, year = {2021} }
@article{DBLP:journals/corr/abs-2101-00328, author = {Mitziu Echeverria and Zeeshan Ahmed and Bincheng Wang and M. Fareed Arif and Syed Rafiul Hussain and Omar Chowdhury}, title = {{PHOENIX:} Device-Centric Cellular Network Protocol Monitoring using Runtime Verification}, journal = {CoRR}, volume = {abs/2101.00328}, year = {2021} }
@article{DBLP:journals/popets/SinglaHCBL20, author = {Ankush Singla and Syed Rafiul Hussain and Omar Chowdhury and Elisa Bertino and Ninghui Li}, title = {Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2020}, number = {1}, pages = {126--142}, year = {2020} }
@inproceedings{DBLP:conf/acns/DebnathCC20, author = {Joyanta Debnath and Sze Yiu Chau and Omar Chowdhury}, title = {When {TLS} Meets Proxy on Mobile}, booktitle = {{ACNS} {(2)}}, series = {Lecture Notes in Computer Science}, volume = {12147}, pages = {387--407}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/fmcad/ArifLERCT20, author = {M. Fareed Arif and Daniel Larraz and Mitziu Echeverria and Andrew Reynolds and Omar Chowdhury and Cesare Tinelli}, title = {{SYSLITE:} Syntax-Guided Synthesis of {PLTL} Formulas from Finite Traces}, booktitle = {{FMCAD}}, pages = {93--103}, publisher = {{IEEE}}, year = {2020} }
@inproceedings{DBLP:conf/rv/YahyazadehHHC20, author = {Moosa Yahyazadeh and Syed Rafiul Hussain and Md. Endadul Hoque and Omar Chowdhury}, title = {PatrIoT: Policy Assisted Resilient Programmable IoT System}, booktitle = {{RV}}, series = {Lecture Notes in Computer Science}, volume = {12399}, pages = {151--171}, publisher = {Springer}, year = {2020} }
@article{DBLP:journals/corr/abs-2003-13604, author = {Elisa Bertino and Syed Rafiul Hussain and Omar Chowdhury}, title = {5G Security and Privacy: {A} Research Roadmap}, journal = {CoRR}, volume = {abs/2003.13604}, year = {2020} }
@inproceedings{DBLP:conf/acsac/KarimCHCB19, author = {Imtiaz Karim and Fabrizio Cicala and Syed Rafiul Hussain and Omar Chowdhury and Elisa Bertino}, title = {Opening Pandora's box through ATFuzzer: dynamic analysis of {AT} interface for Android smartphones}, booktitle = {{ACSAC}}, pages = {529--543}, publisher = {{ACM}}, year = {2019} }
@inproceedings{DBLP:conf/ccs/HussainEKCB19, author = {Syed Rafiul Hussain and Mitziu Echeverria and Imtiaz Karim and Omar Chowdhury and Elisa Bertino}, title = {5GReasoner: {A} Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol}, booktitle = {{CCS}}, pages = {669--684}, publisher = {{ACM}}, year = {2019} }
@inproceedings{DBLP:conf/ndss/ChauYCKL19, author = {Sze Yiu Chau and Moosa Yahyazadeh and Omar Chowdhury and Aniket Kate and Ninghui Li}, title = {Analyzing Semantic Correctness with Symbolic Execution: {A} Case Study on PKCS{\#}1 v1.5 Signature Verification}, booktitle = {{NDSS}}, publisher = {The Internet Society}, year = {2019} }
@inproceedings{DBLP:conf/ndss/HussainECLB19, author = {Syed Rafiul Hussain and Mitziu Echeverria and Omar Chowdhury and Ninghui Li and Elisa Bertino}, title = {Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information}, booktitle = {{NDSS}}, publisher = {The Internet Society}, year = {2019} }
@inproceedings{DBLP:conf/sacmat/YahyazadehPHC19, author = {Moosa Yahyazadeh and Proyash Podder and Md. Endadul Hoque and Omar Chowdhury}, title = {Expat: Expectation-based Policy Analysis and Enforcement for Appified Smart-Home Platforms}, booktitle = {{SACMAT}}, pages = {61--72}, publisher = {{ACM}}, year = {2019} }
@inproceedings{DBLP:conf/wisec/HussainESCB19, author = {Syed Rafiul Hussain and Mitziu Echeverria and Ankush Singla and Omar Chowdhury and Elisa Bertino}, title = {Insecure connection bootstrapping in cellular networks: the root of all evil}, booktitle = {WiSec}, pages = {1--11}, publisher = {{ACM}}, year = {2019} }
@inproceedings{DBLP:conf/acsac/ChauWWCKL18, author = {Sze Yiu Chau and Bincheng Wang and Jianxiong Wang and Omar Chowdhury and Aniket Kate and Ninghui Li}, title = {Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps}, booktitle = {{ACSAC}}, pages = {236--251}, publisher = {{ACM}}, year = {2018} }
@inproceedings{DBLP:conf/ndss/HussainCMB18, author = {Syed Rafiul Hussain and Omar Chowdhury and Shagufta Mehnaz and Elisa Bertino}, title = {LTEInspector: {A} Systematic Approach for Adversarial Testing of 4G {LTE}}, booktitle = {{NDSS}}, publisher = {The Internet Society}, year = {2018} }
@inproceedings{DBLP:conf/sacmat/Chowdhury18, author = {Omar Chowdhury}, title = {How Inadequate Specification, Buggy Implementation, and Deficient Platform-Support Hinder Security}, booktitle = {{SACMAT}}, pages = {221}, publisher = {{ACM}}, year = {2018} }
@inproceedings{DBLP:conf/securecomm/ChauCGGYFL18, author = {Sze Yiu Chau and Omar Chowdhury and Victor E. Gonsalves and Huangyi Ge and Weining Yang and Sonia Fahmy and Ninghui Li}, title = {Adaptive Deterrence of {DNS} Cache Poisoning}, booktitle = {SecureComm {(2)}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {255}, pages = {171--191}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/dsn/HoqueCCNL17, author = {Md. Endadul Hoque and Omar Chowdhury and Sze Yiu Chau and Cristina Nita{-}Rotaru and Ninghui Li}, title = {Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs}, booktitle = {{DSN}}, pages = {627--638}, publisher = {{IEEE} Computer Society}, year = {2017} }
@inproceedings{DBLP:conf/sp/ChauCHGKNL17, author = {Sze Yiu Chau and Omar Chowdhury and Md. Endadul Hoque and Huangyi Ge and Aniket Kate and Cristina Nita{-}Rotaru and Ninghui Li}, title = {SymCerts: Practical Symbolic Execution for Exposing Noncompliance in {X.509} Certificate Validation Implementations}, booktitle = {{IEEE} Symposium on Security and Privacy}, pages = {503--520}, publisher = {{IEEE} Computer Society}, year = {2017} }
@inproceedings{DBLP:conf/ccs/WangGCML16, author = {Tianhao Wang and Huangyi Ge and Omar Chowdhury and Hemanta K. Maji and Ninghui Li}, title = {On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols}, booktitle = {{CCS}}, pages = {603--615}, publisher = {{ACM}}, year = {2016} }
@inproceedings{DBLP:conf/ccs/YangLCXP16, author = {Weining Yang and Ninghui Li and Omar Chowdhury and Aiping Xiong and Robert W. Proctor}, title = {An Empirical Study of Mnemonic Sentence-based Password Generation Strategies}, booktitle = {{CCS}}, pages = {1216--1229}, publisher = {{ACM}}, year = {2016} }
@inproceedings{DBLP:conf/sacmat/ChenCLKCMP16, author = {Haining Chen and Omar Chowdhury and Ninghui Li and Warut Khern{-}am{-}nuai and Suresh Chari and Ian M. Molloy and Youngja Park}, title = {Tri-Modularization of Firewall Policies}, booktitle = {{SACMAT}}, pages = {37--48}, publisher = {{ACM}}, year = {2016} }
@inproceedings{DBLP:conf/ccs/Chowdhury0JD15, author = {Omar Chowdhury and Deepak Garg and Limin Jia and Anupam Datta}, title = {Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits}, booktitle = {{CCS}}, pages = {1130--1143}, publisher = {{ACM}}, year = {2015} }
@inproceedings{DBLP:conf/hotsos/ChenCCLP15, author = {Haining Chen and Omar Chowdhury and Jing Chen and Ninghui Li and Robert W. Proctor}, title = {Towards quantification of firewall policy complexity}, booktitle = {HotSoS}, pages = {18:1--18:2}, publisher = {{ACM}}, year = {2015} }
@inproceedings{DBLP:conf/rv/KaneCDK15, author = {Aaron Kane and Omar Chowdhury and Anupam Datta and Philip Koopman}, title = {A Case Study on Runtime Monitoring of an Autonomous Research Vehicle {(ARV)} System}, booktitle = {{RV}}, series = {Lecture Notes in Computer Science}, volume = {9333}, pages = {102--117}, publisher = {Springer}, year = {2015} }
@article{DBLP:journals/corr/Chowdhury0JD15, author = {Omar Chowdhury and Deepak Garg and Limin Jia and Anupam Datta}, title = {Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits}, journal = {CoRR}, volume = {abs/1508.02448}, year = {2015} }
@inproceedings{DBLP:conf/cav/ChowdhuryJGD14, author = {Omar Chowdhury and Limin Jia and Deepak Garg and Anupam Datta}, title = {Temporal Mode-Checking for Runtime Monitoring of Privacy Policies}, booktitle = {{CAV}}, series = {Lecture Notes in Computer Science}, volume = {8559}, pages = {131--149}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/sacmat/ChowdhuryGNRBDJW13, author = {Omar Chowdhury and Andreas Gampe and Jianwei Niu and Jeffery von Ronne and Jared Bennatt and Anupam Datta and Limin Jia and William H. Winsborough}, title = {Privacy promises that can be kept: a policy analysis method with application to the {HIPAA} privacy rule}, booktitle = {{SACMAT}}, pages = {3--14}, publisher = {{ACM}}, year = {2013} }
@inproceedings{DBLP:conf/codaspy/PontualGCKAW12, author = {Murillo Pontual and Andreas Gampe and Omar Chowdhury and Bazoumana Kone and Md. Shamim Ashik and William H. Winsborough}, title = {The privacy in the time of the internet: secrecy vs transparency}, booktitle = {{CODASPY}}, pages = {133--140}, publisher = {{ACM}}, year = {2012} }
@inproceedings{DBLP:conf/sacmat/ChowdhuryPWYIN12, author = {Omar Chowdhury and Murillo Pontual and William H. Winsborough and Ting Yu and Keith Irwin and Jianwei Niu}, title = {Ensuring authorization privileges for cascading user obligations}, booktitle = {{SACMAT}}, pages = {33--44}, publisher = {{ACM}}, year = {2012} }
@inproceedings{DBLP:conf/uss/ChowdhuryCNLB12, author = {Omar Chowdhury and Haining Chen and Jianwei Niu and Ninghui Li and Elisa Bertino}, title = {On XACML's Adequacy to Specify and to Enforce {HIPAA}}, booktitle = {HealthSec}, publisher = {{USENIX} Association}, year = {2012} }
@inproceedings{DBLP:conf/sacmat/PontualCWYI11, author = {Murillo Pontual and Omar Chowdhury and William H. Winsborough and Ting Yu and Keith Irwin}, title = {On the management of user obligations}, booktitle = {{SACMAT}}, pages = {175--184}, publisher = {{ACM}}, year = {2011} }
@inproceedings{DBLP:conf/ccs/PontualCWYI10, author = {Murillo Pontual and Omar Chowdhury and William H. Winsborough and Ting Yu and Keith Irwin}, title = {Toward practical authorization-dependent user obligation systems}, booktitle = {AsiaCCS}, pages = {180--191}, publisher = {{ACM}}, year = {2010} }
@inproceedings{DBLP:conf/socialcom/PontualICWY10, author = {Murillo Pontual and Keith Irwin and Omar Chowdhury and William H. Winsborough and Ting Yu}, title = {Failure Feedback for User Obligation Systems}, booktitle = {SocialCom/PASSAT}, pages = {713--720}, publisher = {{IEEE} Computer Society}, year = {2010} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.