Syed Rafiul Hussain

Orcid: 0000-0001-9222-8544

According to our database1, Syed Rafiul Hussain authored at least 32 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications.
CoRR, 2023

Verifiable Sustainability in Data Centers.
CoRR, 2023

BLEDiff: Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Adaptive Frequency Hopping for 5G New Radio mMTC Security.
Proceedings of the IEEE International Conference on Industrial Technology, 2023

Formal Analysis of Access Control Mechanism of 5G Core Network.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Building a Privacy-Preserving Smart Camera System.
Proc. Priv. Enhancing Technol., 2022

Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices.
CoRR, 2022

2021
PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

ProChecker: An Automated Security and Privacy Analysis Framework for 4G LTE Protocol Implementations.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks.
Proc. Priv. Enhancing Technol., 2020

5G Security and Privacy: A Research Roadmap.
CoRR, 2020

Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

PatrIoT: Policy Assisted Resilient Programmable IoT System.
Proceedings of the Runtime Verification - 20th International Conference, 2020

2019
Insecure connection bootstrapping in cellular networks: the root of all evil.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Securing the Insecure Link of Internet-of-Things Using Next-Generation Smart Gateways.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices.
IEEE Trans. Mob. Comput., 2018

LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection.
IEEE Trans. Software Eng., 2017

DBSAFE - An Anomaly Detection System to Protect Databases From Exfiltration Attempts.
IEEE Syst. J., 2017

SeamBlue: Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices.
Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, 2017

Seamless and Secure Bluetooth LE Connection Migration.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
Dictionary Based Secure Provenance Compression for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2016

2015
DetAnom: Detecting Anomalous Database Transactions by Insiders.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
Secure data provenance compression using arithmetic coding in wireless sensor networks.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

2011
SAAMAN: Scalable Address Autoconfiguration in Mobile Ad Hoc Networks.
J. Netw. Syst. Manag., 2011

2010
RBP: Reliable Broadcasting Protocol in Large Scale Mobile Ad Hoc Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
An Efficient and Scalable Address Autoconfiguration in Mobile Ad Hoc Networks.
Proceedings of the Ad-Hoc, Mobile and Wireless Networks, 8th International Conference, 2009


  Loading...