What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Omar Chowdhury
Google Scholar
27
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Saecred: A State-Aware, Over-the-Air Protocol Testing Approach for Discovering Parsing Bugs in SAE Handshake Implementations of COTS Wi-Fi Access Points.
Muhammad Daniyal Pirwani Dar
Robert Lorch
Aliakbar Sadeghi
Vincenzo Sorcigli
Héloïse Gollier
Cesare Tinelli
Mathy Vanhoef
Omar Chowdhury
2025
conf/wisec
On the Performance and Consistency Trade-off of the eSIM M2M Remote Provisioning Protocol.
Mitziu Echeverria
Aliakbar Sadeghi
G. M. Tasnim Alam
Omar Chowdhury
2024
conf/ccs
State Machine Mutation-based Testing Framework for Wireless Communication Protocols.
Syed Md. Mukit Rashid
Tianwei Wu
Kai Tu
Abdullah Al Ishtiaq
Ridwanul Hasan Tanvir
Yilu Dong
Omar Chowdhury
Syed Rafiul Hussain
2024
conf/sp
ARMOR: A Formally Verified Implementation of X.509 Certificate Chain Validation.
Joyanta Debnath
Christa Jenkins
Yuteng Sun
Sze Yiu Chau
Omar Chowdhury
2023
conf/cns
VetIoT: On Vetting IoT Defenses Enforcing Policies at Runtime.
Akib Jawad Nafis
Omar Chowdhury
Md. Endadul Hoque
2023
conf/wisec
Maverick: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime.
M. Hammad Mazhar
Li Li
Md. Endadul Hoque
Omar Chowdhury
2021
conf/ccs
On Re-engineering the X.509 PKI with Executable Specification for Better Implementation Guarantees.
Joyanta Debnath
Sze Yiu Chau
Omar Chowdhury
2021
conf/ccs
All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations.
Man Hong Hue
Joyanta Debnath
Kin Man Leung
Li Li
Mohsen Minaei
M. Hammad Mazhar
Kailiang Xian
Md. Endadul Hoque
Omar Chowdhury
Sze Yiu Chau
2021
conf/ccs
Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices.
Syed Rafiul Hussain
Imtiaz Karim
Abdullah Al Ishtiaq
Omar Chowdhury
Elisa Bertino
2021
conf/ccs
Morpheus: Bringing The (PKCS) One To Meet the Oracle.
Moosa Yahyazadeh
Sze Yiu Chau
Li Li
Man Hong Hue
Joyanta Debnath
Sheung Chiu Ip
Chun Ngai Li
Md. Endadul Hoque
Omar Chowdhury
2021
conf/ndss
PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification.
Mitziu Echeverria
Zeeshan Ahmed
Bincheng Wang
M. Fareed Arif
Syed Rafiul Hussain
Omar Chowdhury
2020
journals/popets
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks.
Ankush Singla
Syed Rafiul Hussain
Omar Chowdhury
Elisa Bertino
Ninghui Li
2020
conf/acns
When TLS Meets Proxy on Mobile.
Joyanta Debnath
Sze Yiu Chau
Omar Chowdhury
2019
conf/ccs
5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol.
Syed Rafiul Hussain
Mitziu Echeverria
Imtiaz Karim
Omar Chowdhury
Elisa Bertino
2019
conf/ndss
Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification.
Sze Yiu Chau
Moosa Yahyazadeh
Omar Chowdhury
Aniket Kate
Ninghui Li
2019
conf/ndss
Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information.
Syed Rafiul Hussain
Mitziu Echeverria
Omar Chowdhury
Ninghui Li
Elisa Bertino
2019
conf/acsac
Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones.
Imtiaz Karim
Fabrizio Cicala
Syed Rafiul Hussain
Omar Chowdhury
Elisa Bertino
2019
conf/wisec
Insecure connection bootstrapping in cellular networks: the root of all evil.
Syed Rafiul Hussain
Mitziu Echeverria
Ankush Singla
Omar Chowdhury
Elisa Bertino
2018
conf/ndss
LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE.
Syed Rafiul Hussain
Omar Chowdhury
Shagufta Mehnaz
Elisa Bertino
2018
conf/acsac
Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps.
Sze Yiu Chau
Bincheng Wang
Jianxiong Wang
Omar Chowdhury
Aniket Kate
Ninghui Li
2017
conf/sp
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations.
Sze Yiu Chau
Omar Chowdhury
Md. Endadul Hoque
Huangyi Ge
Aniket Kate
Cristina Nita-Rotaru
Ninghui Li
2017
conf/dsn
Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs.
Md. Endadul Hoque
Omar Chowdhury
Sze Yiu Chau
Cristina Nita-Rotaru
Ninghui Li
2016
conf/ccs
An Empirical Study of Mnemonic Sentence-based Password Generation Strategies.
Weining Yang
Ninghui Li
Omar Chowdhury
Aiping Xiong
Robert W. Proctor
2016
conf/ccs
On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols.
Tianhao Wang
Huangyi Ge
Omar Chowdhury
Hemanta K. Maji
Ninghui Li
2015
conf/ccs
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
Omar Chowdhury
Deepak Garg
Limin Jia
Anupam Datta
2012
conf/uss
On XACML's Adequacy to Specify and to Enforce HIPAA.
Omar Chowdhury
Haining Chen
Jianwei Niu
Ninghui Li
Elisa Bertino
2010
conf/ccs
Toward practical authorization-dependent user obligation systems.
Murillo Pontual
Omar Chowdhury
William H. Winsborough
Ting Yu
Keith Irwin
Coauthors
Abdullah Al Ishtiaq
(2)
Aiping Xiong
(1)
Akib Jawad Nafis
(1)
Aliakbar Sadeghi
(2)
Aniket Kate
(3)
Ankush Singla
(2)
Anupam Datta
(1)
Bincheng Wang
(2)
Cesare Tinelli
(1)
Christa Jenkins
(1)
Chun Ngai Li
(1)
Cristina Nita-Rotaru
(2)
Deepak Garg
(1)
Elisa Bertino
(8)
Fabrizio Cicala
(1)
G. M. Tasnim Alam
(1)
Haining Chen
(1)
Héloïse Gollier
(1)
Hemanta K. Maji
(1)
Huangyi Ge
(2)
Imtiaz Karim
(3)
Jianwei Niu
(1)
Jianxiong Wang
(1)
Joyanta Debnath
(5)
Kai Tu
(1)
Kailiang Xian
(1)
Keith Irwin
(1)
Kin Man Leung
(1)
Li Li
(3)
Limin Jia
(1)
M. Fareed Arif
(1)
M. Hammad Mazhar
(2)
Man Hong Hue
(2)
Mathy Vanhoef
(1)
Md. Endadul Hoque
(6)
Mitziu Echeverria
(5)
Mohsen Minaei
(1)
Moosa Yahyazadeh
(2)
Muhammad Daniyal Pirwani Dar
(1)
Murillo Pontual
(1)
Ninghui Li
(9)
Omar Chowdhury
(27)
Ridwanul Hasan Tanvir
(1)
Robert Lorch
(1)
Robert W. Proctor
(1)
Shagufta Mehnaz
(1)
Sheung Chiu Ip
(1)
Syed Md. Mukit Rashid
(1)
Syed Rafiul Hussain
(9)
Sze Yiu Chau
(9)
Tianhao Wang
(1)
Tianwei Wu
(1)
Ting Yu
(1)
Vincenzo Sorcigli
(1)
Weining Yang
(1)
William H. Winsborough
(1)
Yilu Dong
(1)
Yuteng Sun
(1)
Zeeshan Ahmed
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to