Syed Rafiul Hussain
Orcid: 0000-0001-9222-8544
According to our database1,
Syed Rafiul Hussain
authored at least 38 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator.
CoRR, 2024
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands.
Proceedings of the 33rd USENIX Security Symposium, 2024
Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications.
Proceedings of the 33rd USENIX Security Symposium, 2024
In Wallet We Trust: Bypassing the Digital Wallets Payment Security for Free Shopping.
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
BLEDiff: Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the IEEE International Conference on Industrial Technology, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Proc. Priv. Enhancing Technol., 2022
2021
PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
ProChecker: An Automated Security and Privacy Analysis Framework for 4G LTE Protocol Implementations.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks.
Proc. Priv. Enhancing Technol., 2020
Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Proceedings of the Runtime Verification - 20th International Conference, 2020
2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Securing the Insecure Link of Internet-of-Things Using Next-Generation Smart Gateways.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019
5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices.
IEEE Trans. Mob. Comput., 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
2017
A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection.
IEEE Trans. Software Eng., 2017
DBSAFE - An Anomaly Detection System to Protect Databases From Exfiltration Attempts.
IEEE Syst. J., 2017
SeamBlue: Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices.
Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
2016
IEEE Trans. Parallel Distributed Syst., 2016
2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
2014
Secure data provenance compression using arithmetic coding in wireless sensor networks.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014
2011
J. Netw. Syst. Manag., 2011
2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
2009
Proceedings of the Ad-Hoc, Mobile and Wireless Networks, 8th International Conference, 2009