default search action
Syed Rafiul Hussain
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Raja Hasnain Anwar, Syed Rafiul Hussain, Muhammad Taqi Raza:
In Wallet We Trust: Bypassing the Digital Wallets Payment Security for Free Shopping. USENIX Security Symposium 2024 - [c25]Abdullah Al Ishtiaq, Sarkar Snigdha Sarathi Das, Syed Md. Mukit Rashid, Ali Ranjbar, Kai Tu, Tianwei Wu, Zhezheng Song, Weixuan Wang, Mujtahid Akon, Rui Zhang, Syed Rafiul Hussain:
Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications. USENIX Security Symposium 2024 - [c24]Kai Tu, Abdullah Al Ishtiaq, Syed Md. Mukit Rashid, Yilu Dong, Weixuan Wang, Tianwei Wu, Syed Rafiul Hussain:
Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands. USENIX Security Symposium 2024 - [c23]Tianchang Yang, Syed Md. Mukit Rashid, Ali Ranjbar, Gang Tan, Syed Rafiul Hussain:
ORANalyst: Systematic Testing Framework for Open RAN Implementations. USENIX Security Symposium 2024 - [c22]Feiyang Yu, Quan Zhou, Syed Rafiul Hussain, Danfeng Zhang:
Athena: Analyzing and Quantifying Side Channels of Transport Layer Protocols. USENIX Security Symposium 2024 - [i8]Syed Md. Mukit Rashid, Tianwei Wu, Kai Tu, Abdullah Al Ishtiaq, Ridwanul Hasan Tanvir, Yilu Dong, Omar Chowdhury, Syed Rafiul Hussain:
State Machine Mutation-based Testing Framework for Wireless Communication Protocols. CoRR abs/2409.02905 (2024) - [i7]Rabiah Alnashwan, Yang Yang, Yilu Dong, Prosanta Gope, Behzad Abdolmaleki, Syed Rafiul Hussain:
Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator. CoRR abs/2409.04877 (2024) - 2023
- [c21]Mujtahid Akon, Tianchang Yang, Yilu Dong, Syed Rafiul Hussain:
Formal Analysis of Access Control Mechanism of 5G Core Network. CCS 2023: 666-680 - [c20]Wai Ming Chan, Hyuck M. Kwon, Rémi A. Chou, David J. Love, Sonia Fahmy, Syed Rafiul Hussain, Sang Wu Kim, Chris Vander Valk, Christopher G. Brinton, Vuk Marojevic, Khanh D. Pham, Taejoon Kim:
Adaptive Frequency Hopping for 5G New Radio mMTC Security. ICIT 2023: 1-5 - [c19]Imtiaz Karim, Abdullah Al Ishtiaq, Syed Rafiul Hussain, Elisa Bertino:
BLEDiff: Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations. SP 2023: 3209-3227 - [i6]Syed Rafiul Hussain, Patrick D. McDaniel, Anshul Gandhi, Kanad Ghose, Kartik Gopalan, Dongyoon Lee, Yu David Liu, Zhenhua Liu, Shuai Mu, Erez Zadok:
Verifiable Sustainability in Data Centers. CoRR abs/2307.11993 (2023) - [i5]Abdullah Al Ishtiaq, Sarkar Snigdha Sarathi Das, Syed Md. Mukit Rashid, Ali Ranjbar, Kai Tu, Tianwei Wu, Zhezheng Song, Weixuan Wang, Mujtahid Akon, Rui Zhang, Syed Rafiul Hussain:
Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications. CoRR abs/2310.04381 (2023) - 2022
- [j7]Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, Patrick D. McDaniel:
Building a Privacy-Preserving Smart Camera System. Proc. Priv. Enhancing Technol. 2022(2): 25-46 (2022) - [i4]Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, Patrick D. McDaniel:
Building a Privacy-Preserving Smart Camera System. CoRR abs/2201.09338 (2022) - [i3]Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, Patrick D. McDaniel:
Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices. CoRR abs/2208.09776 (2022) - 2021
- [c18]Ankush Singla, Rouzbeh Behnia, Syed Rafiul Hussain, Attila A. Yavuz, Elisa Bertino:
Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations. AsiaCCS 2021: 501-515 - [c17]Syed Rafiul Hussain, Imtiaz Karim, Abdullah Al Ishtiaq, Omar Chowdhury, Elisa Bertino:
Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices. CCS 2021: 1082-1099 - [c16]Imtiaz Karim, Syed Rafiul Hussain, Elisa Bertino:
ProChecker: An Automated Security and Privacy Analysis Framework for 4G LTE Protocol Implementations. ICDCS 2021: 773-785 - [c15]Mitziu Echeverria, Zeeshan Ahmed, Bincheng Wang, M. Fareed Arif, Syed Rafiul Hussain, Omar Chowdhury:
PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification. NDSS 2021 - [i2]Mitziu Echeverria, Zeeshan Ahmed, Bincheng Wang, M. Fareed Arif, Syed Rafiul Hussain, Omar Chowdhury:
PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification. CoRR abs/2101.00328 (2021) - 2020
- [j6]Ankush Singla, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino, Ninghui Li:
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks. Proc. Priv. Enhancing Technol. 2020(1): 126-142 (2020) - [c14]Moosa Yahyazadeh, Syed Rafiul Hussain, Md. Endadul Hoque, Omar Chowdhury:
PatrIoT: Policy Assisted Resilient Programmable IoT System. RV 2020: 151-171 - [c13]Weicheng Wang, Fabrizio Cicala, Syed Rafiul Hussain, Elisa Bertino, Ninghui Li:
Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy. WISEC 2020: 133-143 - [i1]Elisa Bertino, Syed Rafiul Hussain, Omar Chowdhury:
5G Security and Privacy: A Research Roadmap. CoRR abs/2003.13604 (2020)
2010 – 2019
- 2019
- [c12]Imtiaz Karim, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino:
Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones. ACSAC 2019: 529-543 - [c11]Syed Rafiul Hussain, Mitziu Echeverria, Imtiaz Karim, Omar Chowdhury, Elisa Bertino:
5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol. CCS 2019: 669-684 - [c10]Syed Rafiul Hussain, Shahriar Nirjon, Elisa Bertino:
Securing the Insecure Link of Internet-of-Things Using Next-Generation Smart Gateways. DCOSS 2019: 66-73 - [c9]Syed Rafiul Hussain, Mitziu Echeverria, Omar Chowdhury, Ninghui Li, Elisa Bertino:
Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information. NDSS 2019 - [c8]Syed Rafiul Hussain, Mitziu Echeverria, Ankush Singla, Omar Chowdhury, Elisa Bertino:
Insecure connection bootstrapping in cellular networks: the root of all evil. WiSec 2019: 1-11 - 2018
- [j5]Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, Elisa Bertino:
Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices. IEEE Trans. Mob. Comput. 17(4): 927-944 (2018) - [c7]Syed Rafiul Hussain, Omar Chowdhury, Shagufta Mehnaz, Elisa Bertino:
LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE. NDSS 2018 - 2017
- [j4]Asmaa Sallam, Elisa Bertino, Syed Rafiul Hussain, David Landers, Robert Michael Lefler, Donald Steiner:
DBSAFE - An Anomaly Detection System to Protect Databases From Exfiltration Attempts. IEEE Syst. J. 11(2): 483-493 (2017) - [j3]Lorenzo Bossi, Elisa Bertino, Syed Rafiul Hussain:
A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection. IEEE Trans. Software Eng. 43(5): 415-431 (2017) - [c6]Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, Elisa Bertino:
Seamless and Secure Bluetooth LE Connection Migration. CODASPY 2017: 147-149 - [c5]Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, Elisa Bertino:
SeamBlue: Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices. EWSN 2017: 132-143 - 2016
- [j2]Changda Wang, Syed Rafiul Hussain, Elisa Bertino:
Dictionary Based Secure Provenance Compression for Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 27(2): 405-418 (2016) - 2015
- [c4]Syed Rafiul Hussain, Asmaa Sallam, Elisa Bertino:
DetAnom: Detecting Anomalous Database Transactions by Insiders. CODASPY 2015: 25-35 - 2014
- [c3]Syed Rafiul Hussain, Changda Wang, Salmin Sultana, Elisa Bertino:
Secure data provenance compression using arithmetic coding in wireless sensor networks. IPCCC 2014: 1-10 - 2011
- [j1]Syed Rafiul Hussain, Subrata Saha, Ashikur Rahman:
SAAMAN: Scalable Address Autoconfiguration in Mobile Ad Hoc Networks. J. Netw. Syst. Manag. 19(3): 394-426 (2011) - 2010
- [c2]Subrata Saha, Syed Rafiul Hussain, Ashikur Rahman:
RBP: Reliable Broadcasting Protocol in Large Scale Mobile Ad Hoc Networks. AINA 2010: 526-532
2000 – 2009
- 2009
- [c1]Syed Rafiul Hussain, Subrata Saha, Ashikur Rahman:
An Efficient and Scalable Address Autoconfiguration in Mobile Ad Hoc Networks. ADHOC-NOW 2009: 152-165
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint