Omar Chowdhury.jpg

Omar Haider Chowdhury

Assistant Professor
Department of Computer Science
The University of Iowa

omar-chowdhury@uiowa.edu

319-335-0745

201G MacLean Hall

Publications Publications

CHIRON-DSN17 Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs NEW
With Endadul Hoque (Purdue University), Sze Yiu Chau (Purdue University), Cristina Nita-Rotaru (Northeastern University), and Ninghui Li (Purdue University)
To appear in Proceedings of the 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2017) .

symcert-paper-OAKLAND17 SymCerts: Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation Implementations NEW
With Sze Yiu Chau (Purdue University), Endadul Hoque (Purdue University), Huangyi Ge (Purdue University), Aniket Kate (Purdue University), Cristina Nita-Rotaru (Northeastern University), and Ninghui Li (Purdue University)
Appeared in Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P 2017).
Selected PublicationsVideo of the presentation

password-paper-CCS16 An Empirical Study of Mnemonic Sentence-based Password Generation Strategies
With Weining Yang, Ninghui Li, Aiping Xiong, and Robert Proctor
Appeared in the Proceeding of 23rd ACM Conference on Computer and Communications Security (CCS), 2016.

passwindow-paper-CCS16 On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols
With Tianhao Wang, Huangyi Ge, Hemanta K. Maji, and Ninghui Li
Appeared in the Proceeding of 23rd ACM Conference on Computer and Communications Security (CCS), 2016.

firewall-SACMAT16 Tri-Modularization of Firewall Policies
With Haining Chen, Ninghui Li, Warut Khern-am-nuai, Suresh Chari, Ian Molloy, and Youngja Park
Appeared in the Proceeding of 21st ACM on Symposium on Access Control Models and Technologies (SACMAT), 2016.

ereduce-paper-CCS15 Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits
With Deepak Garg, Limin Jia, and Anupam Datta
Appeared in the Proceeding of 22nd ACM Conference on Computer and Communications Security (CCS), 2015.

monitoring-paper-RV15 A Case Study on Runtime Monitoring of an Autonomous Research Vehicle (ARV) System
With Aaron Kane, Anupam Datta, and Philip Koopman
Appeared in the Proceedings of 15th International Conference on Runtime Verification (RV), 2015.

ereduce-paper-CCS16 Temporal Mode-Checking for Runtime Monitoring of Privacy Policies
With Limin Jia, Deepak Garg, and Anupam Datta
Appeared in the Proceedings of 26th International Conference on Computer Aided Verification (CAV), 2014.

hipaa-paper-SACMAT13 Privacy Promises That Can Be Kept: A Policy Analysis Method with Application to the HIPAA Privacy Rule
With Andreas Gampe, Jianwei Niu, Jeffery von Ronne, Jared Bennatt, Anupam Datta, Limin Jia, and William H. Winsborough
Appeared in the Proceedings of the 18th ACM symposium on Access control models and technologies (SACMAT), 2013.

hipaa-paper-healthsec12 On XACML's Adequacy to Specify and to Enforce HIPAA
With Haining Chen, Jianwei Niu, Ninghui Li, and Elisa Bertino
Appeared in the Proceedings of the 3rd USENIX Workshop on Health Security and Privacy (HealthSec), 2012.

obligation-paper-SACMAT12 Ensuring Authorization Privileges for Cascading User Obligations Best Paper Award
With Murillo Pontual, William H. Winsborough, Ting Yu, Keith Irwin, and Jianwei Niu
Appeared in the Proceedings of the 17th ACM symposium on Access control models and technologies (SACMAT), 2012.

privacy-paper-CODASPY12 The Privacy in the Time of the Internet: Secrecy vs Transparency
With Murillo Pontual, Andreas Gampe, Bazoumana Kone, Md Shamim Ashik, and William H. Winsborough
Appeared in the second ACM conference on Data and Application Security and Privacy (CODASPY), 2012.

obligation-paper-SACMAT11 On the Management of User Obligations Nominee of the CSAW AT&T Best Paper Award
With Murillo Pontual, William H. Winsborough, Ting Yu, and Keith Irwin
Appeared in the Proceedings of the 16th ACM symposium on Access control models and technologies (SACMAT), 2011.

obligation-paper-PASSAT10 Failure Feedback for User Obligation Systems
With Murillo Pontual, Keith Irwin, William H. Winsborough, and Ting Yu
Appeared in the Proceedings of the IEEE Second International Conference on Social Computing (SocialCom), 2010.

obligation-paper-ASIACCS10 Toward Practical Authorization-dependent User Obligation Systems
With Murillo Pontual, Keith Irwin, William H. Winsborough, and Ting Yu
Appeared in the Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2010.