Zobrazeno 1 - 10
of 41
pro vyhledávání: '"Omar Chowdhury"'
Autor:
Baoluo Meng, Daniel Larraz, Kit Siu, Abha Moitra, John Interrante, William Smith, Saswata Paul, Daniel Prince, Heber Herencia-Zapana, M. Fareed Arif, Moosa Yahyazadeh, Vidhya Tekken Valapil, Michael Durling, Cesare Tinelli, Omar Chowdhury
Publikováno v:
Systems, Vol 9, Iss 1, p 18 (2021)
The ever-increasing complexity of cyber-physical systems is driving the need for assurance of critical infrastructure and embedded systems. However, traditional methods to secure cyber-physical systems—e.g., using cyber best practices, adapting mec
Externí odkaz:
https://doaj.org/article/6825ed7474254a9d9534394cae950d01
Autor:
Monica Emelko, Omar Chowdhury, Xiaohui Sun, Allie Kennington, Philip Schmidt, Uldis Silins, Micheal Stone
Climate change-associated wildfires are increasing in frequency and severity, causing increasingly variable or deteriorated water quality, and challenging in-plant treatment processes beyond design and operational response capacities, to the point of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::adbb7f74b75ee3c3af12891dd3917795
https://doi.org/10.5194/egusphere-egu23-10824
https://doi.org/10.5194/egusphere-egu23-10824
Autor:
Mitziu Echeverria, Omar Chowdhury
Publikováno v:
Proceedings of the 22nd ACM Internet Measurement Conference.
Publikováno v:
Digital Threats: Research and Practice. 1:1-29
Application processors of modern smartphones use the AT interface for issuing high-level commands (or AT-commands) to the baseband processor for performing cellular network operations (e.g., placing a phone call). Vulnerabilities in this interface ca
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2020, Iss 1, Pp 126-142 (2020)
This paper focuses on protecting the cellular paging protocol — which balances between the quality-of-service and battery consumption of a device — against security and privacy attacks. Attacks against this protocol can have severe repercussions,
Publikováno v:
CCS
The X.509 Public-Key Infrastructure (PKI) standard is widely used as a scalable and flexible authentication mechanism. Flaws in X.509 implementations can make relying applications susceptible to impersonation attacks or interoperability issues. In pr
Autor:
Kin Man Leung, Endadul Hoque, Mohsen Minaei, Omar Chowdhury, Man Hong Hue, Joyanta Debnath, Kailiang Xian, Sze Yiu Chau, M. Hammad Mazhar, Li Li
Publikováno v:
CCS
In this paper, we perform the first multifaceted measurement study to investigate the widespread insecure practices employed by tertiary education institutes (TEIs) around the globe when offering WPA2-Enterprise Wi-Fi services. The security of such s
Publikováno v:
CCS
The paper focuses on developing an automated black-box testing approach called DIKEUE that checks 4G Long Term Evolution (LTE) control-plane protocol implementations in commercial-off-the-shelf (COTS) cellular devices (also, User Equipments or UEs) f
Autor:
Mitziu Echeverria, Zeeshan Ahmed, Bincheng Wang, M. Fareed Arif, Omar Chowdhury, Syed Rafiul Hussain
Publikováno v:
NDSS
End-user-devices in the current cellular ecosystem are prone to many different vulnerabilities across different generations and protocol layers. Fixing these vulnerabilities retrospectively can be expensive, challenging, or just infeasible. A pragmat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cf9d1bcada2fad3d57e0eafdffde7a78
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030578077
Increasingly more mobile browsers are developed to use proxies for traffic compression and censorship circumvention. While these browsers can offer such desirable features, their security implications are, however, not well understood, especially whe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d215cce407228fd780988de71051c73d
https://doi.org/10.1007/978-3-030-57808-4
https://doi.org/10.1007/978-3-030-57808-4