Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian, M Frantz, M Kantarcioglu, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 152* | 2019 |
Security certification in payment card industry: Testbeds, measurements, and recommendations S Rahaman, G Wang, D Yao Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 44 | 2019 |
Provably secure anonymous-yet-accountable crowdsensing with scalable sublinear revocation S Rahaman, L Cheng, DD Yao, H Li, JMJ Park De Gruyter Open, 2017 | 33 | 2017 |
CryptoAPI-Bench: A comprehensive benchmark on Java cryptographic API misuses S Afrose, S Rahaman, D Yao 2019 IEEE Cybersecurity Development (SecDev), 49-61, 2019 | 31 | 2019 |
Evaluation of static vulnerability detection tools with Java cryptographic API benchmarks S Afrose, Y Xiao, S Rahaman, BP Miller, D Yao IEEE Transactions on Software Engineering 49 (2), 485-497, 2022 | 30 | 2022 |
Program Analysis of Cryptographic Implementations for Security S Rahaman, DD Yao IEEE Secure Development Conference, 2017 | 22 | 2017 |
" If security is required" engineering and security practices for machine learning-based IoT devices NK Gopalakrishna, D Anandayuvaraj, A Detti, FL Bland, S Rahaman, ... Proceedings of the 4th International Workshop on Software Engineering …, 2022 | 19 | 2022 |
Coding practices and recommendations of spring security for enterprise applications M Islam, S Rahaman, N Meng, B Hassanshahi, P Krishnan, DD Yao 2020 IEEE Secure Development (SecDev), 49-57, 2020 | 12 | 2020 |
Bilingual problems: Studying the security risks incurred by native extensions in scripting languages CA Staicu, S Rahaman, Á Kiss, M Backes 32nd USENIX Security Symposium (USENIX Security 23), 6133-6150, 2023 | 11 | 2023 |
A natural user interface classroom based on Kinect RR Noel, A Salekin, R Islam, S Rahaman, R Hasan, HS Ferdous IEEE Learning Technology 13 (4), 59-61, 2011 | 11 | 2011 |
A Novel Approach for Constructing Emulator for Microsoft Kinect XBOX 360 Sensor in the. NET Platform MR Islam, S Rahaman, R Hasan, RR Noel, A Salekin, HS Ferdous Intelligent Systems Modelling & Simulation (ISMS), 2013 4th International …, 2013 | 10 | 2013 |
Antibandwidth problem for itchy caterpillars MS Rahaman, TA Eshan, S Al Abdullah, MS Rahman Informatics, Electronics & Vision (ICIEV), 2014 International Conference, 1-6, 2014 | 7 | 2014 |
CHIRON: deployment-quality detection of Java cryptographic vulnerabilities S Rahaman, Y Xiao, K Tian, F Shaon, M Kantarcioglu, D Yao arXiv preprint arXiv:1806.06881, 2018 | 6 | 2018 |
SoK: A Tale of Reduction, Security, and Correctness-Evaluating Program Debloating Paradigms and Their Compositions M Ali, M Muzammil, F Karim, A Naeem, R Haroon, M Haris, H Nadeem, ... European Symposium on Research in Computer Security, 229-249, 2023 | 5 | 2023 |
From theory to code: identifying logical flaws in cryptographic implementations in C/C++ S Rahaman, H Cai, O Chowdhury, D Yao IEEE transactions on dependable and secure computing 19 (6), 3790-3803, 2021 | 5 | 2021 |
Being the developers’ friend: Our experience developing a high-precision tool for secure coding DD Yao, S Rahaman, Y Xiao, S Afrose, M Frantz, K Tian, N Meng, ... IEEE Security & Privacy 20 (6), 43-52, 2022 | 4 | 2022 |
A Comprehensive Benchmark on Java Cryptographic API Misuses S Afrose, S Rahaman, D Yao Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | 2 | 2020 |
Tutorial: Principles and Practices of Secure Crypto Coding in Java S Rahaman, N Meng, D Yao 2018 IEEE Cybersecurity Development (SecDev), 122-123, 2018 | 2 | 2018 |
Evaluating container debloaters M Hassan, T Tahir, M Farrukh, A Naveed, A Naeem, F Zaffar, F Shaon, ... 2023 IEEE Secure Development Conference (SecDev), 88-98, 2023 | 1 | 2023 |
Systems and methods for proactive and reactive data security F Shaon, S Rahaman US Patent App. 18/130,340, 2023 | 1 | 2023 |