LTEInspector: A systematic approach for adversarial testing of 4G LTE S Hussain, O Chowdhury, S Mehnaz, E Bertino Network and Distributed Systems Security (NDSS) Symposium 2018, 2018 | 240 | 2018 |
Privacy attacks to the 4G and 5G cellular paging protocols using side channel information SR Hussain, M Echeverria, O Chowdhury, N Li, E Bertino Network and distributed systems security (NDSS) symposium2019, 2019 | 167 | 2019 |
5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol SR Hussain, M Echeverria, I Karim, O Chowdhury, E Bertino Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 137 | 2019 |
A case study on runtime monitoring of an autonomous research vehicle (ARV) system A Kane, O Chowdhury, A Datta, P Koopman Runtime Verification: 6th International Conference, RV 2015, Vienna, Austria …, 2015 | 91 | 2015 |
Symcerts: Practical symbolic execution for exposing noncompliance in X. 509 certificate validation implementations SY Chau, O Chowdhury, E Hoque, H Ge, A Kate, C Nita-Rotaru, N Li 2017 IEEE Symposium on Security and Privacy (SP), 503-520, 2017 | 73 | 2017 |
Insecure connection bootstrapping in cellular networks: the root of all evil SR Hussain, M Echeverria, A Singla, O Chowdhury, E Bertino Proceedings of the 12th conference on security and privacy in wireless and …, 2019 | 56 | 2019 |
An empirical study of mnemonic sentence-based password generation strategies W Yang, N Li, O Chowdhury, A Xiong, RW Proctor Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 52 | 2016 |
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule O Chowdhury, A Gampe, J Niu, J von Ronne, J Bennatt, A Datta, L Jia, ... Proceedings of the 18th ACM symposium on Access control models and …, 2013 | 44 | 2013 |
Expat: Expectation-based policy analysis and enforcement for appified smart-home platforms M Yahyazadeh, P Podder, E Hoque, O Chowdhury Proceedings of the 24th ACM symposium on access control models and …, 2019 | 43 | 2019 |
Protecting the 4G and 5G cellular paging protocols against security and privacy attacks A Singla, SR Hussain, O Chowdhury, E Bertino, N Li Proceedings on Privacy Enhancing Technologies, 2020 | 30 | 2020 |
Analyzing operational behavior of stateful protocol implementations for detecting semantic bugs E Hoque, O Chowdhury, SY Chau, C Nita-Rotaru, N Li 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 27 | 2017 |
Temporal mode-checking for runtime monitoring of privacy policies O Chowdhury, L Jia, D Garg, A Datta Computer Aided Verification: 26th International Conference, CAV 2014, Held …, 2014 | 25 | 2014 |
Noncompliance as deviant behavior: An automated black-box noncompliance checker for 4g lte cellular devices SR Hussain, I Karim, AA Ishtiaq, O Chowdhury, E Bertino Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 24 | 2021 |
On the management of user obligations M Pontual, O Chowdhury, WH Winsborough, T Yu, K Irwin Proceedings of the 16th ACM symposium on Access control models and …, 2011 | 23 | 2011 |
Phoenix: Device-centric cellular network protocol monitoring using runtime verification M Echeverria, Z Ahmed, B Wang, MF Arif, SR Hussain, O Chowdhury arXiv preprint arXiv:2101.00328, 2021 | 20 | 2021 |
Architectural and behavioral analysis for cyber security K Siu, A Moitra, M Li, M Durling, H Herencia-Zapana, J Interrante, B Meng, ... 2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), 1-10, 2019 | 20 | 2019 |
SYSLITE: syntax-guided synthesis of PLTL formulas from finite traces MF Arif, D Larraz, M Echeverria, A Reynolds, O Chowdhury, C Tinelli # PLACEHOLDER_PARENT_METADATA_VALUE# 1, 93-103, 2020 | 19 | 2020 |
Verdict: a language and framework for engineering cyber resilient and safe system B Meng, D Larraz, K Siu, A Moitra, J Interrante, W Smith, S Paul, D Prince, ... Systems 9 (1), 18, 2021 | 17 | 2021 |
Analyzing semantic correctness with symbolic execution: A case study on pkcs# 1 v1. 5 signature verification SY Chau, M Yahyazadeh, O Chowdhury, A Kate, N Li Network and Distributed Systems Security (NDSS) Symposium 2019, 2019 | 16 | 2019 |
On XACML's Adequacy to Specify and to Enforce HIPAA. O Chowdhury, H Chen, J Niu, N Li, E Bertino HealthSec, 2012 | 16 | 2012 |