Omar Chowdhury

Orcid: 0000-0002-1356-6279

According to our database1, Omar Chowdhury authored at least 42 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Maverick: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

CRV: Automated Cyber-Resiliency Reasoning for System Design Models.
Proceedings of the Formal Methods in Computer-Aided Design, 2023

VetIoT: On Vetting IoT Defenses Enforcing Policies at Runtime.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in C/C++.
IEEE Trans. Dependable Secur. Comput., 2022

Demystifying the presence of cellular network attacks and misbehaviors.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

2021
VERDICT: A Language and Framework for Engineering Cyber Resilient and Safe System.
Syst., 2021

PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Morpheus: Bringing The (PKCS) One To Meet the Oracle.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

On Re-engineering the X.509 PKI with Executable Specification for Better Implementation Guarantees.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks.
Proc. Priv. Enhancing Technol., 2020

5G Security and Privacy: A Research Roadmap.
CoRR, 2020

PatrIoT: Policy Assisted Resilient Programmable IoT System.
Proceedings of the Runtime Verification - 20th International Conference, 2020

SYSLITE: Syntax-Guided Synthesis of PLTL Formulas from Finite Traces.
Proceedings of the 2020 Formal Methods in Computer Aided Design, 2020

When TLS Meets Proxy on Mobile.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Insecure connection bootstrapping in cellular networks: the root of all evil.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Expat: Expectation-based Policy Analysis and Enforcement for Appified Smart-Home Platforms.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Adaptive Deterrence of DNS Cache Poisoning.
Proceedings of the Security and Privacy in Communication Networks, 2018

How Inadequate Specification, Buggy Implementation, and Deficient Platform-Support Hinder Security.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Tri-Modularization of Firewall Policies.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

An Empirical Study of Mnemonic Sentence-based Password Generation Strategies.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
A Case Study on Runtime Monitoring of an Autonomous Research Vehicle (ARV) System.
Proceedings of the Runtime Verification - 6th International Conference, 2015

Towards quantification of firewall policy complexity.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
Proceedings of the Computer Aided Verification - 26th International Conference, 2014

2013
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

2012
On XACML's Adequacy to Specify and to Enforce HIPAA.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

Ensuring authorization privileges for cascading user obligations.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

The privacy in the time of the internet: secrecy vs transparency.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
On the management of user obligations.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

2010
Failure Feedback for User Obligation Systems.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Toward practical authorization-dependent user obligation systems.
Proceedings of the 5th ACM Symposium on Information, 2010


  Loading...