Skip to content

Commit 1e976db

Browse files
Publication list
1 parent 15d97ff commit 1e976db

17 files changed

+291
-119
lines changed

_data/gallery.yml

Lines changed: 5 additions & 70 deletions
Original file line numberDiff line numberDiff line change
@@ -1,71 +1,6 @@
1-
- title: CQN Annual Retreat'25
2-
date: March 13, 2025
3-
loc: Tucson, Arizona
4-
alt: Ali Hamza presenting our work on Quantum protocol security.
5-
image: IMG_1342.jpeg
1+
- title: Usenix Security, 2024
2+
date: August 16, 2024
3+
loc: Philadelphia, PA
4+
alt: Mirza presenting CellularLint
5+
image: Mirza_Usenix.jpg
66

7-
- title: Talk @ Graduate Research Symposium
8-
date: March 11, 2025
9-
loc: Amherst, Massachusetts
10-
alt: Hasnain delivering a lightning talk humans-in-the-loop for digital wallets security.
11-
image: IMG-20250403-WA0035.jpg
12-
13-
- title: UMass Graduate Research Symposium
14-
date: March 11, 2025
15-
loc: Amherst, Massachusetts
16-
alt: Hasnain presenting our work on digital wallets security.
17-
image: IMG-20250403-WA0012.jpg
18-
19-
- title: Presentation @ IEEE MASS'24
20-
date: September 13, 2024
21-
loc: Seoul, South Korea
22-
alt: Hasnain presenting our paper 'Characterizing Encrypted Application Traffic through Cellular Radio Interface Protocol'.
23-
image: PXL_20240923_064009852~2.jpg
24-
25-
- title: ARAthon - ARAFest @ Iowa State University
26-
date: August 25, 2024
27-
loc: Ames, Iowa
28-
alt: Shayan presenting his project on the impact of various weather metrics—such as humidity, temperature, and rain—on 5G channel performance.
29-
image: 1724803088833.jfif
30-
31-
- title: Presentation @ USENIX Security'24
32-
date: August 13, 2024
33-
loc: Philadelphia, Pennsylvania
34-
alt: Hasnain presenting our paper 'In Wallet We Trust'.
35-
image: IMG_9375.jpg
36-
37-
- title: Lightning Talk @ SOUPS'24
38-
date: August 13, 2024
39-
loc: Philadelphia, Pennsylvania
40-
alt: Hasnain delivering a lightning talk on 'Human-in-the-loop for Secure Digital Wallets Transactions'.
41-
image: IMG_9341.jpg
42-
43-
- title: CQN Annual Retreat'24
44-
date: March 22, 2024
45-
loc: Tucson, Arizona
46-
alt: Ali Hamza presenting our work on Quantum protocol security.
47-
image: IMG_8481.jpg
48-
49-
- title: Talk @ CQN Annual Retreat'24
50-
date: March 21, 2024
51-
loc: Tucson, Arizona
52-
alt: Ali Hamza presenting our work on Quantum protocol security.
53-
image: IMG_8479.jpg
54-
55-
- title: Thanksgiving 2023
56-
date: November 25, 2023
57-
loc: Amherst, Massachusetts
58-
alt: Group celebrates Thanksgiving 2023.
59-
image: PXL_20231125_203033767.jpg
60-
61-
- title: Talk @ MSWiM'23
62-
date: October 31, 2023
63-
loc: Montreal, Canada
64-
alt: Hasnain presenting our paper on attention gauge in semi-autonomous vehicles.
65-
image: PXL_20231101_210858504.MP.jpg
66-
67-
- title: Luncheon
68-
date: October 30, 2021
69-
loc: Tucson, Arizona
70-
alt: Group meets at The Cheese Cake Factory for lunch.
71-
image: image_from_ios-1.jpg

_data/publist.yml

Lines changed: 90 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,18 @@
6666
highlight: 0
6767

6868

69+
- title: "SPEC5G: A Dataset for 5G Cellular Network Protocol Analysis"
70+
year: 2023
71+
description: "5G is the 5th generation cellular network protocol. It is the state-of-the-art global wireless standard that enables an advanced kind of network designed to connect virtually everyone and everything with increased speed and reduced latency. Therefore, its development, analysis, and security are critical. However, all approaches to the 5G protocol development and security analysis, e.g., property extraction, protocol summarization, and semantic analysis of the protocol specifications and implementations are completely manual. To reduce such manual effort, in this paper, we curate SPEC5G the first-ever public 5G dataset for NLP research. The dataset contains 3,547,586 sentences with 134M words, from 13094 cellular network specifications and 13 online websites. By leveraging large-scale pre-trained language models that have achieved state-of-the-art results on NLP tasks, we use this dataset for security-related text classification and summarization. Security-related text classification can be used to extract relevant security-related properties for protocol testing. On the other hand, summarization can help developers and practitioners understand the high level of the protocol, which is itself a daunting task. Our results show the value of our 5G-centric dataset in 5G protocol analysis automation. We believe that SPEC5G will enable a new research direction into automatic analyses for the 5G cellular network protocol and numerous related downstream tasks. Our data and code are publicly available."
72+
authors: "<b>Imtiaz Karim</b>, <b>Kazi Samin Mubasshir</b>, <b>Mirza Masfiqur Rahman</b>, and Elisa Bertino "
73+
link:
74+
url: https://arxiv.org/abs/2301.09201
75+
display: International Joint Conference on Natural Language Processing and the Conference of the Asia-Pacific Chapter of the Association for Computational Linguistics (IJCNLP-AACL), 2023.
76+
pdf: spec5g.pdf
77+
highlight: 0
78+
79+
80+
6981
- title: "BLEDiff: Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations"
7082
year: 2023
7183
image: BLEDiff.png
@@ -78,6 +90,27 @@
7890
<!-- slides: -->
7991
highlight: 1
8092

93+
- title: "VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol"
94+
year: 2022
95+
description: "In this paper, we evaluate the security of the Voice over WiFi (VoWiFi) protocol by proposing the VWAnalyzer framework. We model five critical procedures of the VoWiFi protocol and deploy a model-based testing approach to uncover potential design flaws. Since the standards of the VoWiFi protocol contain underspecifications that can lead to vulnerable scenarios, VWAnalyzer explicitly deals with them. Unlike prior approaches that do not consider the underspecifications, VWAnalyzer adopts a systematic approach that constructs diverse and viable scenarios based on the underspecifications and substantially reduces the number of possible scenarios. Then the scenarios are verified against security properties. VWAnalyzer automatically generates 960 viable scenarios to be analyzed among 10,368 scenarios (91% decrease) from the initial models. We demonstrate the effectiveness of VWAnalyzer by verifying 38 properties and uncovering 3 new attacks. Notable among our findings is the denial-of-cellular-connectivity attack, due to insecure handover that disconnects the user through both VoWiFi and VoLTE. To ensure that the exposed attacks pose real threats and are indeed realizable in practice, we have validated the attacks in a real-world testbed. We also report several implementations issues that were uncovered during the testbed evaluation."
96+
authors: "Hyunwoo Lee, <b>Imtiaz Karim</b>, Ninghui Li, and Elisa Bertino"
97+
link:
98+
url: https://dl.acm.org/doi/10.1145/3488932.3517425
99+
display: ACM ASIA Conference on Computer and Communications Security (ASIACCS), 2022.
100+
pdf: asiaccs_2022_vwanalyzer.pdf
101+
highlight: 0
102+
103+
104+
- title: "AI-powered Network Security: Approaches and Research Directions"
105+
year: 2021
106+
description: "In this paper, we evaluate the security of the Voice over WiFi (VoWiFi) protocol by proposing the VWAnalyzer framework. We model five critical procedures of the VoWiFi protocol and deploy a model-based testing approach to uncover potential design flaws. Since the standards of the VoWiFi protocol contain underspecifications that can lead to vulnerable scenarios, VWAnalyzer explicitly deals with them. Unlike prior approaches that do not consider the underspecifications, VWAnalyzer adopts a systematic approach that constructs diverse and viable scenarios based on the underspecifications and substantially reduces the number of possible scenarios. Then the scenarios are verified against security properties. VWAnalyzer automatically generates 960 viable scenarios to be analyzed among 10,368 scenarios (91% decrease) from the initial models. We demonstrate the effectiveness of VWAnalyzer by verifying 38 properties and uncovering 3 new attacks. Notable among our findings is the denial-of-cellular-connectivity attack, due to insecure handover that disconnects the user through both VoWiFi and VoLTE. To ensure that the exposed attacks pose real threats and are indeed realizable in practice, we have validated the attacks in a real-world testbed. We also report several implementations issues that were uncovered during the testbed evaluation."
107+
authors: "Elisa Bertino and <b>Imtiaz Karim</b>"
108+
link:
109+
url: https://dl.acm.org/doi/abs/10.1145/3491371.3491384
110+
display: International Conference on Networking, Systems, and Security (NSysS), 2021 (Research directional paper).
111+
pdf: nsyss_2021_ai_network.pdf
112+
highlight: 0
113+
81114
- title: "Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices"
82115
year: 2021
83116
image: DIKEUE.png
@@ -89,3 +122,60 @@
89122
pdf: ccs_2021_dikeue.pdf
90123
<!-- slides: -->
91124
highlight: 1
125+
126+
127+
- title: "ProChecker: An Automated Security and Privacy Analysis Framework for 4G LTE Protocol Implementations"
128+
year: 2021
129+
description: "In this paper, we evaluate the security of the Voice over WiFi (VoWiFi) protocol by proposing the VWAnalyzer framework. We model five critical procedures of the VoWiFi protocol and deploy a model-based testing approach to uncover potential design flaws. Since the standards of the VoWiFi protocol contain underspecifications that can lead to vulnerable scenarios, VWAnalyzer explicitly deals with them. Unlike prior approaches that do not consider the underspecifications, VWAnalyzer adopts a systematic approach that constructs diverse and viable scenarios based on the underspecifications and substantially reduces the number of possible scenarios. Then the scenarios are verified against security properties. VWAnalyzer automatically generates 960 viable scenarios to be analyzed among 10,368 scenarios (91% decrease) from the initial models. We demonstrate the effectiveness of VWAnalyzer by verifying 38 properties and uncovering 3 new attacks. Notable among our findings is the denial-of-cellular-connectivity attack, due to insecure handover that disconnects the user through both VoWiFi and VoLTE. To ensure that the exposed attacks pose real threats and are indeed realizable in practice, we have validated the attacks in a real-world testbed. We also report several implementations issues that were uncovered during the testbed evaluation."
130+
authors: "Elisa Bertino and <b>Imtiaz Karim</b>"
131+
link:
132+
url: https://dl.acm.org/doi/abs/10.1145/3491371.3491384
133+
display: International Conference on Networking, Systems, and Security (NSysS), 2021 (Research directional paper).
134+
pdf: nsyss_2021_ai_network.pdf
135+
highlight: 0
136+
nomination: 1
137+
138+
- title: "ATFuzzer: Dynamic Analysis Framework of AT Interface for Android Smartphones "
139+
year: 2020
140+
description: "Application processors of modern smartphones use the AT interface for issuing high-level commands (or AT-commands) to the baseband processor for performing cellular network operations (e.g., placing a phone call). Vulnerabilities in this interface can be leveraged by malicious USB or Bluetooth peripherals to launch pernicious attacks. In this article, we propose ATFuzzer, which uses a grammar-guided evolutionary fuzzing approach that mutates production rules of the AT-command grammar instead of concrete AT commands to evaluate the correctness and robustness of the AT-command execution process. To automate each step of the analysis pipeline, ATFuzzer first takes as input the 3GPP and other vendor-specific standard documents and, following several heuristics, automatically extracts the seed AT command grammars for the fuzzer. ATFuzzer uses the seed to generate both valid and invalid grammars, following our cross-over and mutation strategies to evaluate both the integrity and execution of AT-commands. Empirical evaluation of ATFuzzer on 10 Android smartphones from 6 vendors revealed 4 invalid AT command grammars over Bluetooth and 14 over USB with implications ranging from DoS, downgrade of cellular protocol version, to severe privacy leaks. The vulnerabilities along with the invalid AT-command grammars were responsibly disclosed to affected vendors and assigned CVEs."
141+
authors: "<b>Imtiaz Karim</b>, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, and Elisa Bertino </b>"
142+
link:
143+
url: https://dl.acm.org/doi/abs/10.1145/3491371.3491384
144+
display: ACM Digital Threats Research and Practice (DTRAP), 2020.
145+
pdf: dtrap_2020_atfuzzer_journal.pdf
146+
highlight: 0
147+
nomination: 0
148+
149+
- title: "Opening Pandora’s Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones "
150+
year: 2019
151+
description: "This paper focuses on checking the correctness and robustness of the AT command interface exposed by the cellular baseband processor through Bluetooth and USB. A device's application processor uses this interface for issuing high-level commands (or, AT commands) to the baseband processor for performing cellular network operations (e.g., placing a phone call). Vulnerabilities in this interface can be leveraged by malicious Bluetooth peripherals to launch pernicious attacks including DoS and privacy attacks. To identify such vulnerabilities, we propose ATFuzzer that uses a grammar-guided evolutionary fuzzing approach which mutates production rules of the AT command grammar instead of concrete AT commands. Empirical evaluation with ATFuzzer on 10 Android smartphones from 6 vendors revealed 4 invalid AT command grammars over Bluetooth and 13 over USB with implications ranging from DoS, downgrade of cellular protocol version (e.g., from 4G to 3G/2G) to severe privacy leaks. The vulnerabilities along with the invalid AT command grammars were responsibly disclosed to affected vendors and two of the reported vulnerabilities have been already assigned CVEs (CVE-2019-16400 and CVE-2019-16401)."
152+
authors: "<b>Imtiaz Karim</b>, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, and Elisa Bertino </b>"
153+
link:
154+
url: https://dl.acm.org/doi/10.1145/3359789.3359833
155+
display: Annual Computer Security Applications Conference (ACSAC), 2019.
156+
pdf: acsac_2019_atfuzzer.pdf
157+
highlight: 0
158+
award: 1
159+
160+
- title: "5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol "
161+
year: 2019
162+
description: "The paper proposes 5GReasoner, a framework for property-guided formal verification of control-plane protocols spanning across multiple layers of the 5G protocol stack. The underlying analysis carried out by 5GReasoner can be viewed as an instance of the model checking problem with respect to an adversarial environment. Due to an effective use of behavior-specific abstraction in our manually extracted 5G protocol, 5GReasoner's analysis generalizes prior analyses of cellular protocols by reasoning about properties not only regarding packet payload but also multi-layer protocol interactions. We instantiated 5GReasoner with two model checkers and a cryptographic protocol verifier, lazily combining them through the use of abstraction-refinement principle. Our analysis of the extracted 5G protocol model covering 6 key control-layer protocols spanning across two layers of the 5G protocol stack with 5GReasoner has identified 11 design weaknesses resulting in attacks having both security and privacy implications. Our analysis also discovered 5 previous design weaknesses that 5G inherits from 4G, and can be exploited to violate its security and privacy guarantees."
163+
authors: "Syed Rafiul Hussain, Mitziu Echeverria, <b>Imtiaz Karim</b>, Omar Chowdhury, and Elisa Bertino"
164+
link:
165+
url: https://dl.acm.org/doi/10.1145/3319535.3354263
166+
display: ACM Conference on Computer and Communications Security (CCS), 2019.
167+
pdf: ccs_2019_5greasoner.pdf
168+
highlight: 0
169+
nomination: 0
170+
171+
172+
- title: "Maximizing Heterogeneous Coverage in Over and Under Provisioned Visual Sensor Networks "
173+
year: 2018
174+
description: "We address “heterogeneous coverage” in visual sensor networks where coverage requirements of some randomly deployed targets vary from target to target. The main objective is to maximize the coverage of all the targets to achieve their respective coverage requirement by activating minimal sensors. The problem can be viewed as an interesting variation of the classical Max-Min problem (i.e., Maximum Coverage with Minimum Sensors (MCMS)). Therefore, we study the existing Integer Linear Programming (ILP) formulation for single and k-coverage MCMS problem in the state-of-the-art and modify them to solve the heterogeneous coverage problem. We also propose a novel Integer Quadratic Programming (IQP) formulation that minimizes the Euclidean distance between the achieved and the required coverage vectors. Both ILP and IQP give exact solution when the problem is solvable but as they are non-scalable due to their computational complexity, we devise a Sensor Oriented Greedy Algorithm (SOGA) that approximates the formulations. For under-provisioned networks where there exist insufficient number of sensors to meet the coverage requirements, we propose prioritized IQP and reduced-variance IQP formulations to capture prioritized and group wise balanced coverage respectively. Moreover, we develop greedy heuristics to tackle under provisioned networks. Extensive evaluations based on simulation illustrate the efficiency and efficacy of the proposed formulations and heuristics under various network settings. Additionally, we compare our methodologies and algorithm with two state-of-the-art algorithms available for target coverage and show that our methodologies and algorithm substantially outperform both the algorithms."
175+
authors: "Abdullah Al Zishan, <b>Imtiaz Karim</b>, Sudipta Saha Shubha, Ashikur Rahman "
176+
link:
177+
url: https://www.sciencedirect.com/science/article/abs/pii/S1084804518302972
178+
display: The Journal of Network and Computer Applications, Elsevier (JNCA), Volume 124, 15 December 2018, Pages 44-62.
179+
pdf: jnca_2018_coverage.pdf
180+
highlight: 0
181+
nomination: 0

_data/publist_book.yml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
- title: " Machine Learning Techniques for Cybersecurity"
2+
year: 2023
3+
description: "Provides a detailed taxonomy of security tasks and related ML-based defenses. Uses case studies to illuminate instances in which ML-based defenses would have prevented or mitigated these attacks. Discusses the main challenges in using ML for security tasks, initial solutions, and open research directions"
4+
authors: "Elisa Bertino , Sonam Bhardwaj , Fabrizio Cicala , Sishuai Gong , <b>Imtiaz Karim</b> , Charalampos Katsis , Hyunwoo Lee , Adrian Shuai Li , Ashraf Y. Mahgoub"
5+
link:
6+
url: https://link.springer.com/book/10.1007/978-3-031-28259-1
7+
display: Synthesis Lectures on Information Security, Privacy, and Trust (SLISPT), Springer Nature, May 2023.
8+
highlight: 0
9+
nomination: 0

_data/publist_industry.yml

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
- title: "ProChecker: An Automated Security and Privacy Analysis Framework for Communication Protocol Implementations"
2+
year: 2020
3+
authors: "<b>Imtiaz Karim</b>, Sayak Ray, Arun Kanuparthi, and Jason M. Fung "
4+
link:
5+
display: Intel Software Practitioners Conference (Intel SWPC) 2020.
6+
highlight: 0
7+
nomination: 0
8+
9+
10+
- title: "Utilizing Symbolic Execution for Property-Guided Security and Privacy Testing in Communication Protocol Implementations"
11+
year: 2020
12+
authors: "<b>Imtiaz Karim</b>, Sayak Ray, Arun Kanuparthi, Stephan Heuser and Jason M. Fung "
13+
link:
14+
display: Intel Software Practitioners Conference (Intel SWPC) 2020.
15+
highlight: 0
16+
nomination: 0

0 commit comments

Comments
 (0)