Omar Haider Chowdhury

Omar Haider Chowdhury

University of Iowa

H-index: 16

North America-United States

About Omar Haider Chowdhury

Omar Haider Chowdhury, With an exceptional h-index of 16 and a recent h-index of 15 (since 2020), a distinguished researcher at University of Iowa, specializes in the field of Computer Security, Formal Verification, Access Control, Privacy.

His recent articles reflect a diverse array of research interests and contributions to the field:

Vetiot: On vetting iot defenses enforcing policies at runtime

Maverick: An app-independent and platform-agnostic approach to enforce policies in iot systems at runtime

CRV: Automated Cyber-Resiliency Reasoning for System Design Models

Demystifying the presence of cellular network attacks and misbehaviors

Phoenix: Device-centric cellular network protocol monitoring using runtime verification

On re-engineering the X. 509 PKI with executable specification for better implementation guarantees

All your credentials are belong to us: On insecure wpa2-enterprise configurations

From theory to code: identifying logical flaws in cryptographic implementations in C/C++

Omar Haider Chowdhury Information

University

Position

Assistant Professor at

Citations(all)

1167

Citations(since 2020)

1007

Cited By

471

hIndex(all)

16

hIndex(since 2020)

15

i10Index(all)

23

i10Index(since 2020)

20

Email

University Profile Page

University of Iowa

Google Scholar

View Google Scholar Profile

Omar Haider Chowdhury Skills & Research Interests

Computer Security

Formal Verification

Access Control

Privacy

Top articles of Omar Haider Chowdhury

Title

Journal

Author(s)

Publication Date

Vetiot: On vetting iot defenses enforcing policies at runtime

Akib Jawad Nafis

Omar Chowdhury

Endadul Hoque

2023/10/2

Maverick: An app-independent and platform-agnostic approach to enforce policies in iot systems at runtime

M Hammad Mazhar

Li Li

Endadul Hoque

Omar Chowdhury

2023/5/29

CRV: Automated Cyber-Resiliency Reasoning for System Design Models

CONFERENCE ON FORMAL METHODS IN COMPUTER-AIDED DESIGN–FMCAD 2023

Daniel Larraz

Robert Lorch

Moosa Yahyazadeh

M Fareed Arif

Omar Chowdhury

...

2023/10/24

Demystifying the presence of cellular network attacks and misbehaviors

Mitziu Echeverria

Omar Chowdhury

2022/10/25

Phoenix: Device-centric cellular network protocol monitoring using runtime verification

arXiv preprint arXiv:2101.00328

Mitziu Echeverria

Zeeshan Ahmed

Bincheng Wang

M Fareed Arif

Syed Rafiul Hussain

...

2021/1/1

On re-engineering the X. 509 PKI with executable specification for better implementation guarantees

Joyanta Debnath

Sze Yiu Chau

Omar Chowdhury

2021/11/12

All your credentials are belong to us: On insecure wpa2-enterprise configurations

Man Hong Hue

Joyanta Debnath

Kin Man Leung

Li Li

Mohsen Minaei

...

2021/11/12

From theory to code: identifying logical flaws in cryptographic implementations in C/C++

IEEE transactions on dependable and secure computing

Sazzadur Rahaman

Haipeng Cai

Omar Chowdhury

Danfeng Yao

2021/8/27

ACM SACMAT'21 Chairs' Message

Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT

Jorge Lobo

Roberto Di Pietro

Omar Chowdhury

2021/6/11

Noncompliance as deviant behavior: An automated black-box noncompliance checker for 4g lte cellular devices

Syed Rafiul Hussain

Imtiaz Karim

Abdullah Al Ishtiaq

Omar Chowdhury

Elisa Bertino

2021/11/12

Verdict: a language and framework for engineering cyber resilient and safe system

Systems

Baoluo Meng

Daniel Larraz

Kit Siu

Abha Moitra

John Interrante

...

2021/3/3

Morpheus: Bringing The (PKCS) One To Meet the Oracle

Moosa Yahyazadeh

Sze Yiu Chau

Li Li

Man Hong Hue

Joyanta Debnath

...

2021/11/12

ATFuzzer: dynamic analysis framework of AT interface for Android smartphones

Digital Threats: Research and Practice

Imtiaz Karim

Fabrizio Cicala

Syed Rafiul Hussain

Omar Chowdhury

Elisa Bertino

2020/12/10

Protecting the 4G and 5G cellular paging protocols against security and privacy attacks

Proceedings on Privacy Enhancing Technologies

Ankush Singla

Syed Rafiul Hussain

Omar Chowdhury

Elisa Bertino

Ninghui Li

2020

5G security and privacy: A research roadmap

arXiv preprint arXiv:2003.13604

Elisa Bertino

Syed Rafiul Hussain

Omar Chowdhury

2020/3/30

PatrIoT: Policy Assisted Resilient Programmable IoT System

Moosa Yahyazadeh

Syed Rafiul Hussain

Endadul Hoque

Omar Chowdhury

2020

SYSLITE: syntax-guided synthesis of PLTL formulas from finite traces

M Fareed Arif

Daniel Larraz

Mitziu Echeverria

Andrew Reynolds

Omar Chowdhury

...

2020

When tls meets proxy on mobile

Joyanta Debnath

Sze Yiu Chau

Omar Chowdhury

2020

See List of Professors in Omar Haider Chowdhury University(University of Iowa)

Co-Authors

H-index: 111
Elisa Bertino

Elisa Bertino

Purdue University

H-index: 75
Ninghui Li

Ninghui Li

Purdue University

H-index: 47
Anupam Datta

Anupam Datta

Carnegie Mellon University

H-index: 46
Cesare Tinelli

Cesare Tinelli

University of Iowa

H-index: 43
Cristina Nita-Rotaru

Cristina Nita-Rotaru

Northeastern University

academic-engine