Building a Privacy-Preserving Smart Camera System
Proceedings on Privacy Enhancing Technologies (PETS), 2022.
Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, and Patrick McDaniel
Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, and Patrick McDaniel
PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification
The Network and Distributed System Security Symposium (NDSS), 2021.
Mitziu Echeverria, Zeeshan Ahmed , Bincheng Wang , M. Fareed Arif , Syed Rafiul Hussain, Omar Chowdhury
Mitziu Echeverria, Zeeshan Ahmed , Bincheng Wang , M. Fareed Arif , Syed Rafiul Hussain, Omar Chowdhury
Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations
The 16th ACM ASIA Conference on Computer and Communications Security (ASIACCS), 2021.
Ankush Singla, Rouzbeh Behnia, Syed Rafiul Hussain, Attila Yavuz , and Elisa Bertino
Ankush Singla, Rouzbeh Behnia, Syed Rafiul Hussain, Attila Yavuz , and Elisa Bertino
ProChecker: An Automated Security and Privacy Analysis Framework for 4G LTE Protocol Implementations
The 41st IEEE International Conference on Distributed Computing Systems (ICDCS), 2021.
Imtiaz Karim, Syed Rafiul Hussain, Elisa Bertino
Imtiaz Karim, Syed Rafiul Hussain, Elisa Bertino
Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices
The ACM Conference on Computer and Communications Security (CCS), 2021
Syed Rafiul Hussain*, Imtiaz Karim*, Abdullah Al Ishtiaq, Omar Chowdhury, and Elisa Bertino (*=equal contribution)
Syed Rafiul Hussain*, Imtiaz Karim*, Abdullah Al Ishtiaq, Omar Chowdhury, and Elisa Bertino (*=equal contribution)
Analyzing the Attack Landscape of Zigbee-enabled IoT System sand Reinstating Users’ Privacy
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2020
Weicheng Wang, Fabrizio Cicala, Syed Rafiul Hussain, Elisa Bertino, and Ninghui Li
Weicheng Wang, Fabrizio Cicala, Syed Rafiul Hussain, Elisa Bertino, and Ninghui Li
5G Security and Privacy: A Research Roadmap
Computing Community Consortium (CCC), 2020
Elisa Bertino, Syed Rafiul Hussain, and Omar Chowdhury
Elisa Bertino, Syed Rafiul Hussain, and Omar Chowdhury
PatrIoT: Policy Assisted Resilient Programmable IoT System
20th International Conference on Runtime Verification (RV), 2020
Moosa Yahyazadeh, Syed Rafiul Hussain, Endadul Hoque, and Omar Chowdhury
Moosa Yahyazadeh, Syed Rafiul Hussain, Endadul Hoque, and Omar Chowdhury
ATFuzzer: Dynamic Analysis Framework of AT Interface for Android Smartphones
Digital Threats: Research and Practice (DTRAP) , 2020
Imtiaz Karim, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, and Elisa Bertino
Imtiaz Karim, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, and Elisa Bertino
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks
The 20th Privacy Enhancing Technologies Symposium (PETS), 2020
Ankush Singla, Syed Rafiul Hussain, Omar Chowdhury, Ninghui Li, and Elisa Bertino
Ankush Singla, Syed Rafiul Hussain, Omar Chowdhury, Ninghui Li, and Elisa Bertino
Mobile Virtual Private Network Configuration
US Patent App. 16/070,948
Syed Rafiul Hussain, and Kyu-Han Kim
Syed Rafiul Hussain, and Kyu-Han Kim
Opening Pandora’s Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones
The 35th Annual Computer Security Applications Conference (ACSAC), 2019
Imtiaz Karim, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, and Elisa Bertino
Imtiaz Karim, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, and Elisa Bertino
5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol
The 26th ACM Conference on Computer and Communications Security (CCS), 2019
Syed Rafiul Hussain, Mitziu Echeverria, Imtiaz Karim, Omar Chowdhury, and Elisa Bertino
Syed Rafiul Hussain, Mitziu Echeverria, Imtiaz Karim, Omar Chowdhury, and Elisa Bertino
Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information
The 26th Network and Distributed System Security Symposium (NDSS), 2019.
Best Paper Award Honorable Mention
Syed Rafiul Hussain, Mitziu Echeverria, Omar Chowdhury, Ninghui Li, and Elisa Bertino
Best Paper Award Honorable Mention
Syed Rafiul Hussain, Mitziu Echeverria, Omar Chowdhury, Ninghui Li, and Elisa Bertino
Insecure Connection Bootstrapping in Cellular Networks: The Root of All Evil
The 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2019
Syed Rafiul Hussain, Mitziu Echeverria, Ankush Singla, Omar Chowdhury, and Elisa Bertino
Syed Rafiul Hussain, Mitziu Echeverria, Ankush Singla, Omar Chowdhury, and Elisa Bertino
Securing the Insecure Link of Internet-of-Things Using Next-Generation Smart Gateways
The 5th IEEE International Conference on Distributed Computing in Sensor Systems, (DCOSS), 2019
Syed Rafiul Hussain, Shahriar Nirjon, and Elisa Bertino
Syed Rafiul Hussain, Shahriar Nirjon, and Elisa Bertino
Side Channel Attacks in 4G and 5G Cellular Networks
The Black Hat Europe, 2019
Syed Rafiul Hussain
Syed Rafiul Hussain
Deterrence of User Equipment Device Location Tracking
US Patent App. 15/369,508 and 10/154,369, 2018.
Syed Rafiul Hussain, Shruti Sanadhya, and Kyu-Han Kim
Syed Rafiul Hussain, Shruti Sanadhya, and Kyu-Han Kim
LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE
The 25th Network and Distributed System Security Symposium (NDSS), 2018
Syed Rafiul Hussain, Omar Chowdhury, Shagufta Mehnaz, and Elisa Bertino
Syed Rafiul Hussain, Omar Chowdhury, Shagufta Mehnaz, and Elisa Bertino
LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE
Qualcomm Security Summit, 2018
Syed Rafiul Hussain, Omar Chowdhury, Shagufta Mehnaz, and Elisa Bertino
Syed Rafiul Hussain, Omar Chowdhury, Shagufta Mehnaz, and Elisa Bertino
Seamless and Secure Bluetooth LE Connection Migration
Seventh ACM on Conference on Data and Application Security and Privacy (CODASPY), 2017
Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, and Elisa Bertino
Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, and Elisa Bertino
SeamBlue: Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices
ACM SIGBED International Conference on Embedded Wireless Systems and Networks (EWSN), 2017
Best Paper Award Nomination
Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, and Elisa Bertino,
Best Paper Award Nomination
Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, and Elisa Bertino,
Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices
IEEE Transaction on Mobile Computing (TMC), 2017
Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, and Elisa Bertino
Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, and Elisa Bertino
A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection
IEEE Transaction on Software Engineering (TSE), 2016
Lorenzo Bossi, Elisa Bertino, and Syed Rafiul Hussain
Lorenzo Bossi, Elisa Bertino, and Syed Rafiul Hussain
Monitoring DBMS Activity for Detecting Data Exfiltration by Insiders
The 16th Annual Information Security Symposium, 2015
✪ Best Poster Award Runner-up
Elisa Bertino, Lorenzo Bossi, Syed Rafiul Hussain, and Asmaa Sallam
✪ Best Poster Award Runner-up
Elisa Bertino, Lorenzo Bossi, Syed Rafiul Hussain, and Asmaa Sallam
DetAnom: Detecting Anomalous Database Transaction by Insiders
Fifth ACM Conference on Data and Application Security and Privacy (CODASPY), 2015
Syed Rafiul Hussain, Asmaa Sallam, and Elisa Bertino
Syed Rafiul Hussain, Asmaa Sallam, and Elisa Bertino
DBSAFE – An Anomaly Detection System to Protect Databases from Exfiltration Attempts
IEEE Systems Journal (Systems), 2015
Asmaa Sallam, Elisa Bertino, Syed Rafiul Hussain, David Landers, R. Michael Lefler, and Donald Steiner,
Asmaa Sallam, Elisa Bertino, Syed Rafiul Hussain, David Landers, R. Michael Lefler, and Donald Steiner,
Secure Data Provenance Compression Using Arithmetic Coding in Wireless Sensor Networks
The 33rd IEEE International Performance Computing and Communications Conference (IPCCC), 2014
Syed Rafiul Hussain, Changda Wang, Salmin Sultana, and Elisa Bertino
Syed Rafiul Hussain, Changda Wang, Salmin Sultana, and Elisa Bertino
Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
IEEE Transaction on Parallel and Distributed Systems (TPDS), 2014
Syed Rafiul Hussain*, Changda Wang*, and Elisa Bertino (* indicates equal contribution)
Syed Rafiul Hussain*, Changda Wang*, and Elisa Bertino (* indicates equal contribution)
Real-time Traffic Congestion Management and Deadlock Avoidance for Vehicular Ad Hoc Networks
The 10th International Conference on High-Capacity Optical Networks and Emerging/Enabling Technology (HONET), 2013.
Syed Rafiul Hussain, Ala Odeh, Amrut Shivakumar, Shalini Chauhan, and Khaled Harfoush
Syed Rafiul Hussain, Ala Odeh, Amrut Shivakumar, Shalini Chauhan, and Khaled Harfoush
SAAMAN: Scalable Address Autoconfiguration in Mobile Ad Hoc Networks
Journal of Network and Systems Management (JNSM), Springer, Volume 19, Issue 3, 2011
Syed Rafiul Hussain, Subrata Saha and Ashikur Rahman
Syed Rafiul Hussain, Subrata Saha and Ashikur Rahman
RBP: Reliable Broadcasting Protocol in Large Scale Mobile Ad Hoc Networks
The 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2010.
Subrata Saha, Syed Rafiul Hussain and Ashikur Rahman,
Subrata Saha, Syed Rafiul Hussain and Ashikur Rahman,
An Efficient and Scalable Address Autoconfiguration in Mobile Ad Hoc Networks
The 8th International Conference on Ad-Hoc, Mobile and Wireless Networks (ADHOC-NOW), 2009
Syed Rafiul Hussain, Subrata Saha and Ashikur Rahman,
Syed Rafiul Hussain, Subrata Saha and Ashikur Rahman,