What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Syed Rafiul Hussain
Google Scholar
25
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
From Control to Chaos: A Comprehensive Formal Analysis of 5G's Access Control.
Mujtahid Akon
Md. Toufikuzzaman
Syed Rafiul Hussain
2025
conf/sp
Stateful Analysis and Fuzzing of Commercial Baseband Firmware.
Ali Ranjbar
Tianchang Yang
Kai Tu
Saaman Khalilollahi
Syed Rafiul Hussain
2025
conf/wisec
Evaluating Time-Bounded Defense Against RRC Relay in 5G Broadcast Messages.
Yilu Dong
Tao Wan
Tianwei Wu
Syed Rafiul Hussain
2025
conf/wisec
Cloud Nine Connectivity: Security Analysis of In-Flight Wi-Fi Paywall Systems.
Abdullah Al Ishtiaq
Raja Hasnain Anwar
Yasra Chandio
Fatima Muhammad Anwar
Syed Rafiul Hussain
Muhammad Taqi Raza
2025
conf/uss
CoreCrisis: Threat-Guided and Context-Aware Iterative Learning and Fuzzing of 5G Core Networks.
Yilu Dong
Tianchang Yang
Abdullah Al Ishtiaq
Syed Md. Mukit Rashid
Ali Ranjbar
Kai Tu
Tianwei Wu
Md. Sultan Mahmud
Syed Rafiul Hussain
2024
conf/ccs
State Machine Mutation-based Testing Framework for Wireless Communication Protocols.
Syed Md. Mukit Rashid
Tianwei Wu
Kai Tu
Abdullah Al Ishtiaq
Ridwanul Hasan Tanvir
Yilu Dong
Omar Chowdhury
Syed Rafiul Hussain
2024
conf/ccs
Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator.
Rabiah Alnashwan
Yang Yang
Yilu Dong
Prosanta Gope
Behzad Abdolmaleki
Syed Rafiul Hussain
2024
conf/uss
Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications.
Abdullah Al Ishtiaq
Sarkar Snigdha Sarathi Das
Syed Md. Mukit Rashid
Ali Ranjbar
Kai Tu
Tianwei Wu
Zhezheng Song
Weixuan Wang
Mujtahid Akon
Rui Zhang
Syed Rafiul Hussain
2024
conf/uss
In Wallet We Trust: Bypassing the Digital Wallets Payment Security for Free Shopping.
Raja Hasnain Anwar
Syed Rafiul Hussain
Muhammad Taqi Raza
2024
conf/uss
ORANalyst: Systematic Testing Framework for Open RAN Implementations.
Tianchang Yang
Syed Md. Mukit Rashid
Ali Ranjbar
Gang Tan
Syed Rafiul Hussain
2024
conf/uss
Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands.
Kai Tu
Abdullah Al Ishtiaq
Syed Md. Mukit Rashid
Yilu Dong
Weixuan Wang
Tianwei Wu
Syed Rafiul Hussain
2024
conf/uss
Athena: Analyzing and Quantifying Side Channels of Transport Layer Protocols.
Feiyang Yu
Quan Zhou
Syed Rafiul Hussain
Danfeng Zhang
2023
conf/ccs
Formal Analysis of Access Control Mechanism of 5G Core Network.
Mujtahid Akon
Tianchang Yang
Yilu Dong
Syed Rafiul Hussain
2023
conf/sp
BLEDiff: Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations.
Imtiaz Karim
Abdullah Al Ishtiaq
Syed Rafiul Hussain
Elisa Bertino
2022
journals/popets
Building a Privacy-Preserving Smart Camera System.
Yohan Beugin
Quinn Burke
Blaine Hoak
Ryan Sheatsley
Eric Pauley
Gang Tan
Syed Rafiul Hussain
Patrick D. McDaniel
2021
conf/ccs
Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices.
Syed Rafiul Hussain
Imtiaz Karim
Abdullah Al Ishtiaq
Omar Chowdhury
Elisa Bertino
2021
conf/asiaccs
Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations.
Ankush Singla
Rouzbeh Behnia
Syed Rafiul Hussain
Attila A. Yavuz
Elisa Bertino
2021
conf/ndss
PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification.
Mitziu Echeverria
Zeeshan Ahmed
Bincheng Wang
M. Fareed Arif
Syed Rafiul Hussain
Omar Chowdhury
2020
journals/popets
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks.
Ankush Singla
Syed Rafiul Hussain
Omar Chowdhury
Elisa Bertino
Ninghui Li
2020
conf/wisec
Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy.
Weicheng Wang
Fabrizio Cicala
Syed Rafiul Hussain
Elisa Bertino
Ninghui Li
2019
conf/ccs
5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol.
Syed Rafiul Hussain
Mitziu Echeverria
Imtiaz Karim
Omar Chowdhury
Elisa Bertino
2019
conf/ndss
Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information.
Syed Rafiul Hussain
Mitziu Echeverria
Omar Chowdhury
Ninghui Li
Elisa Bertino
2019
conf/acsac
Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones.
Imtiaz Karim
Fabrizio Cicala
Syed Rafiul Hussain
Omar Chowdhury
Elisa Bertino
2019
conf/wisec
Insecure connection bootstrapping in cellular networks: the root of all evil.
Syed Rafiul Hussain
Mitziu Echeverria
Ankush Singla
Omar Chowdhury
Elisa Bertino
2018
conf/ndss
LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE.
Syed Rafiul Hussain
Omar Chowdhury
Shagufta Mehnaz
Elisa Bertino
Coauthors
Abdullah Al Ishtiaq
(7)
Ali Ranjbar
(4)
Ankush Singla
(3)
Attila A. Yavuz
(1)
Behzad Abdolmaleki
(1)
Bincheng Wang
(1)
Blaine Hoak
(1)
Danfeng Zhang
(1)
Elisa Bertino
(10)
Eric Pauley
(1)
Fabrizio Cicala
(2)
Fatima Muhammad Anwar
(1)
Feiyang Yu
(1)
Gang Tan
(2)
Imtiaz Karim
(4)
Kai Tu
(5)
M. Fareed Arif
(1)
Md. Sultan Mahmud
(1)
Md. Toufikuzzaman
(1)
Mitziu Echeverria
(4)
Muhammad Taqi Raza
(2)
Mujtahid Akon
(3)
Ninghui Li
(3)
Omar Chowdhury
(9)
Patrick D. McDaniel
(1)
Prosanta Gope
(1)
Quan Zhou
(1)
Quinn Burke
(1)
Rabiah Alnashwan
(1)
Raja Hasnain Anwar
(2)
Ridwanul Hasan Tanvir
(1)
Rouzbeh Behnia
(1)
Rui Zhang
(1)
Ryan Sheatsley
(1)
Saaman Khalilollahi
(1)
Sarkar Snigdha Sarathi Das
(1)
Shagufta Mehnaz
(1)
Syed Md. Mukit Rashid
(5)
Syed Rafiul Hussain
(25)
Tao Wan
(1)
Tianchang Yang
(4)
Tianwei Wu
(5)
Weicheng Wang
(1)
Weixuan Wang
(2)
Yang Yang
(1)
Yasra Chandio
(1)
Yilu Dong
(6)
Yohan Beugin
(1)
Zeeshan Ahmed
(1)
Zhezheng Song
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to