Publications

ATFuzzer: Dynamic Analysis Framework of AT Interface for Android Smartphones

Digital Threats: Research and Practice (DTRAP), 2020
Imtiaz Karim, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, and Elisa Bertino

PatrIoT: Policy Assisted Resilient Programmable IoT System

20th International Conference on Runtime Verification (RV), 2020 (Conditionally Accepted)
Moosa Yahyazadeh, Syed Rafiul Hussain, Endadul Hoque, and Omar Chowdhury

Analyzing the Attack Landscape of Zigbee-enabled IoT System sand Reinstating Users’ Privacy

13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2020
Weicheng Wang, Fabrizio Cicala, Syed Rafiul Hussain, Elisa Bertino, and Ninghui Li

5G Security and Privacy: A Research Roadmap

Computing Community Consortium (CCC), 2020
Elisa Bertino, Syed Rafiul Hussain, and Omar Chowdhury

Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks

To appear in the 20th Privacy Enhancing Technologies Symposium (PETS), 2020
Ankush Singla, Syed Rafiul Hussain, Omar Chowdhury, Ninghui Li, and Elisa Bertino

Opening Pandora’s Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones

The 35th Annual Computer Security Applications Conference (ACSAC), 2019.
Imtiaz Karim, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, and Elisa Bertino

5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol

The 26th ACM Conference on Computer and Communications Security (CCS), 2019
Syed Rafiul Hussain, Mitziu Echeverria, Imtiaz Karim, Omar Chowdhury, and Elisa Bertino

Insecure Connection Bootstrapping in Cellular Networks: The Root of All Evil

The 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2019
Syed Rafiul Hussain, Mitziu Echeverria, Ankush Singla, Omar Chowdhury, and Elisa Bertino

Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information

The 26th Network and Distributed System Security Symposium (NDSS), 2019.
Best Paper Award Honorable Mention
Syed Rafiul Hussain, Mitziu Echeverria, Omar Chowdhury, Ninghui Li, and Elisa Bertino

Securing the Insecure Link of Internet-of-Things Using Next-Generation Smart Gateways

The 5th IEEE International Conference on Distributed Computing in Sensor Systems, (DCOSS), 2019
Syed Rafiul Hussain, Shahriar Nirjon, and Elisa Bertino

LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE

The 25th Network and Distributed System Security Symposium (NDSS), 2018
Syed Rafiul Hussain, Omar Chowdhury, Shagufta Mehnaz, and Elisa Bertino

Deterrence of User Equipment Device Location Tracking

US Patent App. 15/369,508 and 10/154,369, 2018.
Syed Rafiul Hussain, Shruti Sanadhya, and Kyu-Han Kim

Mobile Virtual Private Network Configuration

US Patent App. 16/070,948
Syed Rafiul Hussain, and Kyu-Han Kim

A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection

IEEE Transaction on Software Engineering (TSE), 2016.
Lorenzo Bossi, Elisa Bertino, and Syed Rafiul Hussain

Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices

IEEE Transaction on Mobile Computing (TMC), 2017
Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, and Elisa Bertino

SeamBlue: Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices

ACM SIGBED International Conference on Embedded Wireless Systems and Networks (EWSN), 2017
Best Paper Award Nomination
Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, and Elisa Bertino,

Seamless and Secure Bluetooth LE Connection Migration

Seventh ACM on Conference on Data and Application Security and Privacy (CODASPY), 2017
Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, and Elisa Bertino

DBSAFE – An Anomaly Detection System to Protect Databases from Exfiltration Attempts

IEEE Systems Journal (Systems), 2015
Asmaa Sallam, Elisa Bertino, Syed Rafiul Hussain, David Landers, R. Michael Lefler, and Donald Steiner,

Monitoring DBMS Activity for Detecting Data Exfiltration by Insiders

The 16th Annual Information Security Symposium, 2015
✪ Best Poster Award Runner-up
Elisa Bertino, Lorenzo Bossi, Syed Rafiul Hussain, and Asmaa Sallam

DetAnom: Detecting Anomalous Database Transaction by Insiders

Fifth ACM Conference on Data and Application Security and Privacy (CODASPY), 2015
Syed Rafiul Hussain, Asmaa Sallam, and Elisa Bertino

Secure Data Provenance Compression Using Arithmetic Coding in Wireless Sensor Networks

The 33rd IEEE International Performance Computing and Communications Conference (IPCCC), 2014
Syed Rafiul Hussain, Changda Wang, Salmin Sultana, and Elisa Bertino

Dictionary Based Secure Provenance Compression for Wireless Sensor Networks

IEEE Transaction on Parallel and Distributed Systems (TPDS), 2014
Syed Rafiul Hussain*, Changda Wang*, and Elisa Bertino (* indicates equal contribution)

Real-time Traffic Congestion Management and Deadlock Avoidance for Vehicular Ad Hoc Networks

The 10th International Conference on High-Capacity Optical Networks and Emerging/Enabling Technology (HONET), 2013.
Syed Rafiul Hussain, Ala Odeh, Amrut Shivakumar, Shalini Chauhan, and Khaled Harfoush

SAAMAN: Scalable Address Autoconfiguration in Mobile Ad Hoc Networks

Journal of Network and Systems Management (JNSM), Springer, Volume 19, Issue 3, 2011
Syed Rafiul Hussain, Subrata Saha and Ashikur Rahman

RBP: Reliable Broadcasting Protocol in Large Scale Mobile Ad Hoc Networks

The 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2010.
Subrata Saha, Syed Rafiul Hussain and Ashikur Rahman,

An Efficient and Scalable Address Autoconfiguration in Mobile Ad Hoc Networks

The 8th International Conference on Ad-Hoc, Mobile and Wireless Networks (ADHOC-NOW), 2009
Syed Rafiul Hussain, Subrata Saha and Ashikur Rahman,