Sazzadur Rahaman

Orcid: 0000-0002-1258-6470

According to our database1, Sazzadur Rahaman authored at least 30 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
On the Contents and Utility of IoT Cybersecurity Guidelines.
Proc. ACM Softw. Eng., 2024

An Investigation into Protestware.
CoRR, 2024

Trust, Because You Can't Verify:Privacy and Security Hurdles in Education Technology Acquisition Practices.
CoRR, 2024

Impeding LLM-assisted Cheating in Introductory Programming Assignments via Adversarial Perturbation.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

2023
Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks.
IEEE Trans. Software Eng., February, 2023

A Unified Taxonomy and Evaluation of IoT Security Guidelines.
CoRR, 2023

Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages.
Proceedings of the 32nd USENIX Security Symposium, 2023

Evaluating Container Debloaters.
Proceedings of the IEEE Secure Development Conference, 2023

BLADE: Towards Scalable Source Code Debloating.
Proceedings of the IEEE Secure Development Conference, 2023

SoK: A Tale of Reduction, Security, and Correctness - Evaluating Program Debloating Paradigms and Their Compositions.
Proceedings of the Computer Security - ESORICS 2023, 2023

The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms.
Proceedings of the Annual Computer Security Applications Conference, 2023

SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis Compositions.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in C/C++.
IEEE Trans. Dependable Secur. Comput., 2022

Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding.
IEEE Secur. Priv., 2022

"If security is required": Engineering and Security Practices for Machine Learning-based IoT Devices.
Proceedings of the 4th IEEE/ACM International Workshop on Software Engineering Research and Practices for the IoT, 2022

2021
SecureDL: Securing Code Execution and Access Control for Distributed Data Analytics Platforms.
CoRR, 2021

Optimization to the Rescue: Evading Binary Code Stylometry with Adversarial Use of Code Optimizations.
Proceedings of the Checkmate@CCS 2021, 2021

2020
From Theory to Practice: Deployment-grade Tools and Methodologies for Software Security.
PhD thesis, 2020

Tutorial: Principles and Practices of Secure Cryptographic Coding in Java.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020

Coding Practices and Recommendations of Spring Security for Enterprise Applications.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020

Deployment-quality and Accessible Solutions for Cryptography Code Development.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

A Comprehensive Benchmark on Java Cryptographic API Misuses.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
CryptoAPI-Bench: A Comprehensive Benchmark on Java Cryptographic API Misuses.
Proceedings of the 2019 IEEE Cybersecurity Development, 2019

Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
CHIRON: Deployment-quality Detection of Java Cryptographic Vulnerabilities.
CoRR, 2018

Tutorial: Principles and Practices of Secure Crypto Coding in Java.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

2017
Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation.
Proc. Priv. Enhancing Technol., 2017

Program Analysis of Cryptographic Implementations for Security.
Proceedings of the IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, 2017


  Loading...