Omar Chowdhury
Orcid: 0000-0002-1356-6279
According to our database1,
Omar Chowdhury
authored at least 45 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CoRR, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
A Comprehensive, Automated Security Analysis of the Uptane Automotive Over-the-Air Update Framework.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
2023
Maverick: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
Proceedings of the Formal Methods in Computer-Aided Design, 2023
Proceedings of the IEEE Conference on Communications and Network Security, 2023
2022
From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in C/C++.
IEEE Trans. Dependable Secur. Comput., 2022
Proceedings of the 22nd ACM Internet Measurement Conference, 2022
2021
Syst., 2021
PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
On Re-engineering the X.509 PKI with Executable Specification for Better Implementation Guarantees.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks.
Proc. Priv. Enhancing Technol., 2020
Proceedings of the Runtime Verification - 20th International Conference, 2020
Proceedings of the 2020 Formal Methods in Computer Aided Design, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Expat: Expectation-based Policy Analysis and Enforcement for Appified Smart-Home Platforms.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Proceedings of the Security and Privacy in Communication Networks, 2018
How Inadequate Specification, Buggy Implementation, and Deficient Platform-Support Hinder Security.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
2016
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the Runtime Verification - 6th International Conference, 2015
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the Computer Aided Verification - 26th International Conference, 2014
2013
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
2012
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the 5th ACM Symposium on Information, 2010