Follow
Omar Haider Chowdhury
Omar Haider Chowdhury
Assistant Professor at University of Iowa
Verified email at uiowa.edu - Homepage
Title
Cited by
Cited by
Year
LTEInspector: A systematic approach for adversarial testing of 4G LTE
S Hussain, O Chowdhury, S Mehnaz, E Bertino
Network and Distributed Systems Security (NDSS) Symposium 2018, 2018
1572018
Privacy attacks to the 4G and 5G cellular paging protocols using side channel information
SR Hussain, M Echeverria, O Chowdhury, N Li, E Bertino
Network and Distributed Systems Security (NDSS) Symposium2019, 2019
1092019
A case study on runtime monitoring of an autonomous research vehicle (ARV) system
A Kane, O Chowdhury, A Datta, P Koopman
Runtime Verification, 102-117, 2015
702015
5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol
SR Hussain, M Echeverria, I Karim, O Chowdhury, E Bertino
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
612019
Symcerts: Practical symbolic execution for exposing noncompliance in X. 509 certificate validation implementations
SY Chau, O Chowdhury, E Hoque, H Ge, A Kate, C Nita-Rotaru, N Li
2017 IEEE Symposium on Security and Privacy (SP), 503-520, 2017
482017
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule
O Chowdhury, A Gampe, J Niu, J von Ronne, J Bennatt, A Datta, L Jia, ...
Proceedings of the 18th ACM symposium on Access control models and …, 2013
442013
An empirical study of mnemonic sentence-based password generation strategies
W Yang, N Li, O Chowdhury, A Xiong, RW Proctor
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
402016
Insecure connection bootstrapping in cellular networks: the root of all evil
SR Hussain, M Echeverria, A Singla, O Chowdhury, E Bertino
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
312019
On the management of user obligations
M Pontual, O Chowdhury, WH Winsborough, T Yu, K Irwin
Proceedings of the 16th ACM symposium on Access control models and …, 2011
242011
Expat: Expectation-based policy analysis and enforcement for appified smart-home platforms
M Yahyazadeh, P Podder, E Hoque, O Chowdhury
Proceedings of the 24th ACM symposium on access control models and …, 2019
222019
Temporal mode-checking for runtime monitoring of privacy policies
O Chowdhury, L Jia, D Garg, A Datta
International Conference on Computer Aided Verification, 131-149, 2014
212014
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks.
A Singla, SR Hussain, O Chowdhury, E Bertino, N Li
Proc. Priv. Enhancing Technol. 2020 (1), 126-142, 2020
172020
Analyzing semantic correctness with symbolic execution: A case study on pkcs# 1 v1. 5 signature verification
SY Chau, M Yahyazadeh, O Chowdhury, A Kate, N Li
Network and Distributed Systems Security (NDSS) Symposium 2019, 2019
142019
Analyzing operational behavior of stateful protocol implementations for detecting semantic bugs
E Hoque, O Chowdhury, SY Chau, C Nita-Rotaru, N Li
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
142017
On XACML's Adequacy to Specify and to Enforce HIPAA.
O Chowdhury, H Chen, J Niu, N Li, E Bertino
HealthSec, 2012
132012
Toward practical authorization-dependent user obligation systems
M Pontual, O Chowdhury, WH Winsborough, T Yu, K Irwin
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
132010
Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones
I Karim, F Cicala, SR Hussain, O Chowdhury, E Bertino
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
92019
Architectural and behavioral analysis for cyber security
K Siu, A Moitra, M Li, M Durling, H Herencia-Zapana, J Interrante, B Meng, ...
2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), 1-10, 2019
82019
SYSLITE: syntax-guided synthesis of PLTL formulas from finite traces
MF Arif, D Larraz, M Echeverria, A Reynolds, O Chowdhury, C Tinelli
# PLACEHOLDER_PARENT_METADATA_VALUE# 1, 93-103, 2020
72020
Phoenix: Device-centric cellular network protocol monitoring using runtime verification
M Echeverria, Z Ahmed, B Wang, MF Arif, SR Hussain, O Chowdhury
arXiv preprint arXiv:2101.00328, 2021
62021
The system can't perform the operation now. Try again later.
Articles 1–20