Uncovering ‘NASty’ 5G Baseband Vulnerabilities through Dependency-Aware Fuzzing
            
                          BlackHat USA, 2025  
                        
                          
Ali Ranjbar, Tianchang Yang, Kai Tu, Saaman Khalilollahi, Kanika Gupta, and Syed Rafiul Hussain
          
                      
                                        Ali Ranjbar, Tianchang Yang, Kai Tu, Saaman Khalilollahi, Kanika Gupta, and Syed Rafiul Hussain
From Control to Chaos: A Comprehensive Formal Analysis of 5G’s Access Control
            
                          IEEE Symposium on Security and Privacy (IEEE S&P), 2025
                        
                          
Mujtahid Akon, Md Toufikuzzaman, and Syed Rafiul Hussain
          
                      
                                        Mujtahid Akon, Md Toufikuzzaman, and Syed Rafiul Hussain
Stateful Analysis and Fuzzing of Commercial Baseband Firmware
            
                          IEEE Symposium on Security and Privacy (IEEE S&P), 2025
                        
                          
Ali Ranjbar, Tianchang Yang, Kai Tu, Saaman Khalilollahi, and Syed Rafiul Hussain
          
                      
                                        Ali Ranjbar, Tianchang Yang, Kai Tu, Saaman Khalilollahi, and Syed Rafiul Hussain
CoreCrisis: Threat-Guided and Context-Aware Iterative Learning and Fuzzing of 5G Core Networks
            
                          USENIX Security Symposium (USENIX Security), 2025
                        
                          
Yilu Dong, Tianchang Yang, Abdullah Al Ishtiaq, Syed Md Mukit Rashid\advisee, Ali Ranjbar\advisee, Kai Tu\advisee, Tianwei Wu\advisee, Md Sultan Mahmud, and Syed Rafiul Hussain
          
                      
                                        Yilu Dong, Tianchang Yang, Abdullah Al Ishtiaq, Syed Md Mukit Rashid\advisee, Ali Ranjbar\advisee, Kai Tu\advisee, Tianwei Wu\advisee, Md Sultan Mahmud, and Syed Rafiul Hussain
Cloud Nine Connectivity: Security Analysis of In-Flight Wi-Fi Paywall Systems
            
                          18th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2025
                        
                          
Abdullah Al Ishtiaq, Raja Hasnain Anwar, Yasra Chandio, Fatima Anwar, Syed Rafiul Hussain, and Taqi Raza
          
                      
                                        Abdullah Al Ishtiaq, Raja Hasnain Anwar, Yasra Chandio, Fatima Anwar, Syed Rafiul Hussain, and Taqi Raza
Evaluating Time-Bounded Defense Against RRC Relay in 5G Broadcast Messages
            
                          18th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2025
                        
                          
Yilu Dong, Tianwei Wu, Tao Wan, and Syed Rafiul Hussain
          
                      
                                        Yilu Dong, Tianwei Wu, Tao Wan, and Syed Rafiul Hussain
FeedbackPublications Guided API Fuzzing of 5G Network
            
                          Proceedings of the 1st Workshop on Security and Privacy of Next-Generation Networks (FutureG’25), co-located with NDSS’25
                        
                          
Tianchang Yang, KS Sathiyajith, Ashwin Senthil Arumugam, and Syed Rafiul Hussain
          
                      
                                        Tianchang Yang, KS Sathiyajith, Ashwin Senthil Arumugam, and Syed Rafiul Hussain
State Machine Mutation-based Testing Framework for Wireless Communication Protocols
            
                          The ACM Conference on Computer and Communications Security (CCS), 2024
                        
                          
Syed Md Mukit Rashid, Tianwei Wu, Kai Tu, Abdullah Al Ishtiaq, Ridwanul Hasan Tanvir, Yilu Publications Dong, Omar Chowdhury, and Syed Rafiul Hussain
          
                      
                                        Syed Md Mukit Rashid, Tianwei Wu, Kai Tu, Abdullah Al Ishtiaq, Ridwanul Hasan Tanvir, Yilu Publications Dong, Omar Chowdhury, and Syed Rafiul Hussain
Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator
            
                          The ACM Conference on Computer and Communications Security (CCS), 2024
                        
                          
Rabiah Alnashwan, Yang Yang, Yilu Dong, Prosanta Gope, Behzad Abdolmaleki, and Syed Rafiul Hussain
          
                      
                                        Rabiah Alnashwan, Yang Yang, Yilu Dong, Prosanta Gope, Behzad Abdolmaleki, and Syed Rafiul Hussain
ORANalyst: Systematic Testing Framework for Open RAN Implementations
            
                          USENIX Security Symposium (USENIX Security), 2024
                        
                          
Tianchang Yang, Syed Md Mukit Rashid, Ali Ranjbar, Gang Tan, and Syed Rafiul Hussain
          
                      
                                        Tianchang Yang, Syed Md Mukit Rashid, Ali Ranjbar, Gang Tan, and Syed Rafiul Hussain
Athena: Analyzing and Quantifying Side Channels of Transport Layer Protocols
            
                          USENIX Security Symposium (USENIX Security), 2024
                        
                          
Feiyang Yu, Quan Zhou, Syed Rafiul Hussain, and Danfeng Zhang
          
                      
                                        Feiyang Yu, Quan Zhou, Syed Rafiul Hussain, and Danfeng Zhang
Cracking the 5G Fortress: Peering Into 5G’s Vulnerability Abyss
            
                          BlackHat USA, 2024
                        
                          
Kai Tu, Abdullah Al Ishtiaq, Syed Md Mukit Rashid, Yilu Dong, Weixuan Wang, Tianwei Wu, and Syed Rafiul Hussain
          
                      
                          
              
                
                Publisher's website
              
                                        Kai Tu, Abdullah Al Ishtiaq, Syed Md Mukit Rashid, Yilu Dong, Weixuan Wang, Tianwei Wu, and Syed Rafiul Hussain
Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands
            
                          USENIX Security Symposium (USENIX Security), 2024
                        
                          
Kai Tu, Abdullah Al Ishtiaq, Syed Md Mukit Rashid, Yilu Dong, Weixuan Wang, Tianwei Wu, and Syed Rafiul Hussain
          
                      
                                        Kai Tu, Abdullah Al Ishtiaq, Syed Md Mukit Rashid, Yilu Dong, Weixuan Wang, Tianwei Wu, and Syed Rafiul Hussain
Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications
            
                          USENIX Security Symposium (USENIX Security), 2024
                        
                          
Abdullah Al Ishtiaq, Sarkar Snigdha Sarathi Das, Syed Md Mukit Rashid, Ali Ranjbar, Kai Tu, Tianwei Wu, Zhezheng Song, Weixuan Wang, Mujtahid Al-Islam Akon, Rui Zhang, and Syed Rafiul Hussain
          
                      
                          
              
                
                Publisher's website
              
                                        Abdullah Al Ishtiaq, Sarkar Snigdha Sarathi Das, Syed Md Mukit Rashid, Ali Ranjbar, Kai Tu, Tianwei Wu, Zhezheng Song, Weixuan Wang, Mujtahid Al-Islam Akon, Rui Zhang, and Syed Rafiul Hussain
Formal Analysis of Access Control Mechanism of 5G Core Network
            
                          The ACM Conference on Computer and Communications Security (CCS), 2023
                        
                          
Mujtahid Akon, Tianchang Yang, Yilu Dong, and Syed Rafiul Hussain
          
                      
                                        Mujtahid Akon, Tianchang Yang, Yilu Dong, and Syed Rafiul Hussain
Adaptive Frequency Hopping for 5G New Radio mMTC Security
            
                          The 24th IEEE International Conference on Industrial Technology (ICIT), 2023
                        
                          
Wai Ming Chan, Hyuck M. Kwon, R ́emi A. Chou, David J. Love, Sonia Fahmy, Syed Rafiul Hussain, Sang Wu Kim, Chris Vander Valk, Christopher G. Brinton, Vuk Marojevic, Khanh D. Pham, and Taejoon Kim
          
                      
                                        Wai Ming Chan, Hyuck M. Kwon, R ́emi A. Chou, David J. Love, Sonia Fahmy, Syed Rafiul Hussain, Sang Wu Kim, Chris Vander Valk, Christopher G. Brinton, Vuk Marojevic, Khanh D. Pham, and Taejoon Kim
BLEDiff: Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations
            
                          IEEE Symposium on Security and Privacy (IEEE S&P), 2023
                        
                          
Imtiaz Karim, Abdullah Al Ishtiaq, Syed Rafiul Hussain, and Elisa Bertino
          
                      
                                        Imtiaz Karim, Abdullah Al Ishtiaq, Syed Rafiul Hussain, and Elisa Bertino
BaseDiff: Differential Security Analysis of Cellular Basebands
            
                          Qualcomm Product Security Summit (QPSS), 2022.
                        
                          
Syed Rafiul Hussain
          
                      
                                        Syed Rafiul Hussain
Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices
            
                          The ACM Conference on Computer and Communications Security (CCS), 2021
                        
                          
Syed Rafiul Hussain*, Imtiaz Karim*, Abdullah Al Ishtiaq, Omar Chowdhury, and Elisa Bertino (*=equal contribution)
          
                      
                                        Syed Rafiul Hussain*, Imtiaz Karim*, Abdullah Al Ishtiaq, Omar Chowdhury, and Elisa Bertino (*=equal contribution)
ProChecker: An Automated Security and Privacy Analysis Framework for 4G LTE Protocol Implementations
            
                          The 41st IEEE International Conference on Distributed Computing Systems (ICDCS), 2021.
                        
                          
Imtiaz Karim, Syed Rafiul Hussain, Elisa Bertino
          
                      
                                        Imtiaz Karim, Syed Rafiul Hussain, Elisa Bertino
Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations
            
                          The 16th ACM ASIA Conference on Computer and Communications Security (ASIACCS), 2021. 
                        
                          
Ankush Singla, Rouzbeh Behnia, Syed Rafiul Hussain, Attila Yavuz , and Elisa Bertino
          
                      
                                        Ankush Singla, Rouzbeh Behnia, Syed Rafiul Hussain, Attila Yavuz , and Elisa Bertino
PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification
            
                          The Network and Distributed System Security Symposium (NDSS), 2021. 
                        
                          
Mitziu Echeverria, Zeeshan Ahmed , Bincheng Wang , M. Fareed Arif , Syed Rafiul Hussain, Omar Chowdhury
          
                      
                                        Mitziu Echeverria, Zeeshan Ahmed , Bincheng Wang , M. Fareed Arif , Syed Rafiul Hussain, Omar Chowdhury
Analyzing the Attack Landscape of Zigbee-enabled IoT System sand Reinstating Users’ Privacy
            
                          13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2020
                        
                          
Weicheng Wang, Fabrizio Cicala, Syed Rafiul Hussain, Elisa Bertino, and Ninghui Li
          
                      
                                        Weicheng Wang, Fabrizio Cicala, Syed Rafiul Hussain, Elisa Bertino, and Ninghui Li
5G Security and Privacy: A Research Roadmap
            
                          Computing Community Consortium (CCC), 2020
                        
                          
Elisa Bertino, Syed Rafiul Hussain, and Omar Chowdhury
          
                      
                                        Elisa Bertino, Syed Rafiul Hussain, and Omar Chowdhury
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks
            
                          The 20th Privacy Enhancing Technologies Symposium (PETS), 2020
                        
                          
Ankush Singla, Syed Rafiul Hussain, Omar Chowdhury, Ninghui Li, and Elisa Bertino
          
                      
                                        Ankush Singla, Syed Rafiul Hussain, Omar Chowdhury, Ninghui Li, and Elisa Bertino
Side Channel Attacks in 4G and 5G Cellular Networks
            
                          The Black Hat Europe, 2019
                        
                          
Syed Rafiul Hussain
          
                      
                                        Syed Rafiul Hussain
5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol
            
                          The 26th ACM Conference on Computer and Communications Security (CCS), 2019
                        
                          
Syed Rafiul Hussain, Mitziu Echeverria, Imtiaz Karim, Omar Chowdhury, and Elisa Bertino
          
                      
                                        Syed Rafiul Hussain, Mitziu Echeverria, Imtiaz Karim, Omar Chowdhury, and Elisa Bertino
Insecure Connection Bootstrapping in Cellular Networks: The Root of All Evil
            
                          The 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2019
                        
                          
Syed Rafiul Hussain, Mitziu Echeverria, Ankush Singla, Omar Chowdhury, and Elisa Bertino
          
                      
                                        Syed Rafiul Hussain, Mitziu Echeverria, Ankush Singla, Omar Chowdhury, and Elisa Bertino
LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE
            
                          Qualcomm Security Summit, 2018
                        
                          
Syed Rafiul Hussain, Omar Chowdhury, Shagufta Mehnaz, and Elisa Bertino
          
                      
                                        Syed Rafiul Hussain, Omar Chowdhury, Shagufta Mehnaz, and Elisa Bertino
LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE
            
                          The 25th Network and Distributed System Security Symposium (NDSS), 2018
                        
                          
Syed Rafiul Hussain, Omar Chowdhury, Shagufta Mehnaz, and Elisa Bertino
          
                      
                                        Syed Rafiul Hussain, Omar Chowdhury, Shagufta Mehnaz, and Elisa Bertino
Deterrence of User Equipment Device Location Tracking
            
                          US Patent App. 15/369,508 and 10/154,369, 2018.
                        
                          
Syed Rafiul Hussain, Shruti Sanadhya, and Kyu-Han Kim
          
                      
                                        Syed Rafiul Hussain, Shruti Sanadhya, and Kyu-Han Kim
Mobile Virtual Private Network Configuration
            
                          US Patent App. 16/070,948
                        
                          
Syed Rafiul Hussain, and Kyu-Han Kim
          
                      
                                        Syed Rafiul Hussain, and Kyu-Han Kim
Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices
            
                          IEEE Transaction on Mobile Computing (TMC), 2017
                        
                          
Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, and Elisa Bertino
          
                      
                                        Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, and Elisa Bertino
Seamless and Secure Bluetooth LE Connection Migration
            
                          Seventh ACM on Conference on Data and Application Security and Privacy (CODASPY), 2017 
                        
                          
Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, and Elisa Bertino
          
                      
                                        Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, and Elisa Bertino
Secure Data Provenance Compression Using Arithmetic Coding in Wireless Sensor Networks
            
                          The 33rd IEEE International Performance Computing and Communications Conference (IPCCC), 2014
                        
                          
Syed Rafiul Hussain, Changda Wang, Salmin Sultana, and Elisa Bertino
          
                      
                                        Syed Rafiul Hussain, Changda Wang, Salmin Sultana, and Elisa Bertino
Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
            
                          IEEE Transaction on Parallel and Distributed Systems (TPDS), 2014
                        
                          
Syed Rafiul Hussain*, Changda Wang*, and Elisa Bertino (* indicates equal contribution)
          
                      
                                        Syed Rafiul Hussain*, Changda Wang*, and Elisa Bertino (* indicates equal contribution)
Real-time Traffic Congestion Management and Deadlock Avoidance for Vehicular Ad Hoc Networks
            
                          The 10th International Conference on High-Capacity Optical Networks and Emerging/Enabling Technology (HONET), 2013. 
                        
                          
Syed Rafiul Hussain, Ala Odeh, Amrut Shivakumar, Shalini Chauhan, and Khaled Harfoush
          
                      
                                        Syed Rafiul Hussain, Ala Odeh, Amrut Shivakumar, Shalini Chauhan, and Khaled Harfoush
SAAMAN: Scalable Address Autoconfiguration in Mobile Ad Hoc Networks
            
                          Journal of Network and Systems Management (JNSM), Springer, Volume 19, Issue 3, 2011
                        
                          
Syed Rafiul Hussain, Subrata Saha and Ashikur Rahman
          
                      
                                        Syed Rafiul Hussain, Subrata Saha and Ashikur Rahman
RBP: Reliable Broadcasting Protocol in Large Scale Mobile Ad Hoc Networks
            
                          The 24th  IEEE International Conference on Advanced Information Networking and Applications (AINA), 2010.
                        
                          
Subrata Saha, Syed Rafiul Hussain and Ashikur Rahman,
          
                      
                                        Subrata Saha, Syed Rafiul Hussain and Ashikur Rahman,
An Efficient and Scalable Address Autoconfiguration in Mobile Ad Hoc Networks
            
                          The 8th International Conference on Ad-Hoc, Mobile and Wireless Networks (ADHOC-NOW), 2009
                        
                          
Syed Rafiul Hussain, Subrata Saha and Ashikur Rahman,
          
                      
                                        Syed Rafiul Hussain, Subrata Saha and Ashikur Rahman,