Md. Endadul Hoque

Orcid: 0000-0002-6682-9618

Affiliations:
  • Northeastern University
  • Purdue University


According to our database1, Md. Endadul Hoque authored at least 37 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Maverick: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

VetIoT: On Vetting IoT Defenses Enforcing Policies at Runtime.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
Network (In)security: Leniency in Protocols' Design, Code and Configuration.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

2021
Morpheus: Bringing The (PKCS) One To Meet the Oracle.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
PatrIoT: Policy Assisted Resilient Programmable IoT System.
Proceedings of the Runtime Verification - 20th International Conference, 2020

aBBRate: Automating BBR Attack Exploration Using a Model-Based Approach.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

A formal security analysis of ZigBee (1.0 and 3.0).
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020

2019
Expat: Expectation-based Policy Analysis and Enforcement for Appified Smart-Home Platforms.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

2018
Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
AnonPri: A secure anonymous private authentication protocol for RFID systems.
Inf. Sci., 2017

SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Automated Adversarial Testing of Unmodified Wireless Routing Implementations.
IEEE/ACM Trans. Netw., 2016

Building Robust Distributed Systems and Network Protocols by Using Adversarial Testing and Behavioral Analysis.
Proceedings of the IEEE Cybersecurity Development, 2016

Practical Intrusion-Tolerant Networks.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

2015
Taming epidemic outbreaks in mobile adhoc networks.
Ad Hoc Networks, 2015

2014
Turret: A Platform for Automated Attack Finding in Unmodified Distributed System Implementations.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

2013
Adversarial testing of wireless routing implementations.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Preserving User Privacy in Pervasive Environments with a Collaborative Model.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

2012
User privacy protection in pervasive social networking applications using PCO.
Int. J. Soc. Comput. Cyber Phys. Syst., 2012

Closing the Pandora's box: Defenses for thwarting epidemic outbreaks in mobile adhoc networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

2011
ProQuPri: towards anonymity protection with privacy quantification for context-aware applications.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

REBIVE: a reliable private data aggregation scheme for wireless sensor networks.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

AnonPri: An efficient anonymous private authentication protocol.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

2010
Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments.
Wirel. Pers. Commun., 2010

Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments.
J. Syst. Softw., 2010

Preserve Your Privacy with PCO: A Privacy Sensitive Architecture for Context Obfuscation for Pervasive E-Community Based Applications.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

S-search: finding RFID tags using scalable and secure search protocol.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

UCFC - Ubiquitous personal Carbon Footprint Calculation Platform.
Proceedings of the International Green Computing Conference 2010, 2010

2009
Enhanced Partial Dominant Pruning (EPDP) Based Broadcasting in Ad hoc Wireless Networks.
J. Networks, 2009

Trust based security auto-configuration for smart assisted living environments.
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009

Supporting recovery, privacy and security in RFID systems using a robust authentication protocol.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

An Adaptive Initial Trust and Demand Aware Secure Resource Discovery (AID-SRD) Model for Pervasive Environments.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

2008
Secured tag identification using EDSA (enhanced distributed scalable architecture).
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Towards Secure Trust Bootstrapping in Pervasive Computing Environment.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

ERAP: ECC Based RFID Authentication Protocol.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008


  Loading...