default search action
Sazzadur Rahaman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Jesse Chen, Dharun Anandayuvaraj, James C. Davis, Sazzadur Rahaman:
On the Contents and Utility of IoT Cybersecurity Guidelines. Proc. ACM Softw. Eng. 1(FSE): 1400-1423 (2024) - [c20]Easton Kelso, Ananta Soneji, Sazzadur Rahaman, Yan Shoshitaishvili, Rakibul Hasan:
Trust, Because You Can't Verify: Privacy and Security Hurdles in Education Technology Acquisition Practices. CCS 2024: 1656-1670 - [c19]Saiful Islam Salim, Rubin Yuchan Yang, Alexander Cooper, Suryashree Ray, Saumya Debray, Sazzadur Rahaman:
Impeding LLM-assisted Cheating in Introductory Programming Assignments via Adversarial Perturbation. EMNLP 2024: 445-463 - [i10]Easton Kelso, Ananta Soneji, Sazzadur Rahaman, Yan Shoshitaishvili, Rakibul Hasan:
Trust, Because You Can't Verify:Privacy and Security Hurdles in Education Technology Acquisition Practices. CoRR abs/2405.11712 (2024) - [i9]Tanner Finken, Jesse Chen, Sazzadur Rahaman:
An Investigation into Protestware. CoRR abs/2409.19849 (2024) - [i8]Saiful Islam Salim, Rubin Yuchan Yang, Alexander Cooper, Suryashree Ray, Saumya Debray, Sazzadur Rahaman:
Impeding LLM-assisted Cheating in Introductory Programming Assignments via Adversarial Perturbation. CoRR abs/2410.09318 (2024) - 2023
- [j4]Sharmin Afrose, Ya Xiao, Sazzadur Rahaman, Barton P. Miller, Danfeng Yao:
Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks. IEEE Trans. Software Eng. 49(2): 485-497 (2023) - [c18]Sazzadur Rahaman, Miles Frantz, Barton P. Miller, Danfeng (Daphne) Yao:
SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis Compositions. ACNS Workshops 2023: 515-529 - [c17]Fahad Shaon, Sazzadur Rahaman, Murat Kantarcioglu:
The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms. ACSAC 2023: 241-255 - [c16]Muaz Ali, Muhammad Muzammil, M. Faraz Karim, Ayesha Naeem, Rukhshan Haroon, Muhammad Haris, Huzaifah Nadeem, Waseem Sabir, Fahad Shaon, Fareed Zaffar, Vinod Yegneswaran, Ashish Gehani, Sazzadur Rahaman:
SoK: A Tale of Reduction, Security, and Correctness - Evaluating Program Debloating Paradigms and Their Compositions. ESORICS (4) 2023: 229-249 - [c15]Muaz Ali, Rumaisa Habib, Ashish Gehani, Sazzadur Rahaman, Zartash Afzal Uzmi:
BLADE: Towards Scalable Source Code Debloating. SecDev 2023: 75-87 - [c14]Muhammad Hassan, Talha Tahir, Muhammad Farrukh, Abdullah Naveed, Anas Naeem, Fareed Zaffar, Fahad Shaon, Ashish Gehani, Sazzadur Rahaman:
Evaluating Container Debloaters. SecDev 2023: 88-98 - [c13]Cristian-Alexandru Staicu, Sazzadur Rahaman, Ágnes Kiss, Michael Backes:
Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages. USENIX Security Symposium 2023: 6133-6150 - [i7]Jesse Chen, Dharun Anandayuvaraj, James C. Davis, Sazzadur Rahaman:
A Unified Taxonomy and Evaluation of IoT Security Guidelines. CoRR abs/2310.01653 (2023) - 2022
- [j3]Danfeng Daphne Yao, Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Miles Frantz, Ke Tian, Na Meng, Cristina Cifuentes, Yang Zhao, Nicholas Allen, Nathan Keynes, Barton P. Miller, Elisa Heymann, Murat Kantarcioglu, Fahad Shaon:
Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding. IEEE Secur. Priv. 20(6): 43-52 (2022) - [j2]Sazzadur Rahaman, Haipeng Cai, Omar Chowdhury, Danfeng Yao:
From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in C/C++. IEEE Trans. Dependable Secur. Comput. 19(6): 3790-3803 (2022) - [c12]Nikhil Krishna Gopalakrishna, Dharun Anandayuvaraj, Annan Detti, Forrest Lee Bland, Sazzadur Rahaman, James C. Davis:
"If security is required": Engineering and Security Practices for Machine Learning-based IoT Devices. SERP4IoT 2022: 1-8 - 2021
- [c11]Ben Jacobsen, Sazzadur Rahaman, Saumya Debray:
Optimization to the Rescue: Evading Binary Code Stylometry with Adversarial Use of Code Optimizations. Checkmate@CCS 2021: 1-10 - [i6]Fahad Shaon, Sazzadur Rahaman, Murat Kantarcioglu:
SecureDL: Securing Code Execution and Access Control for Distributed Data Analytics Platforms. CoRR abs/2106.13123 (2021) - [i5]Cristian-Alexandru Staicu, Sazzadur Rahaman, Ágnes Kiss, Michael Backes:
Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages. CoRR abs/2111.11169 (2021) - [i4]Sharmin Afrose, Ya Xiao, Sazzadur Rahaman, Barton P. Miller, Danfeng Yao:
Evaluation of Static Vulnerability Detection Tools with Java Cryptographic API Benchmarks. CoRR abs/2112.04037 (2021) - 2020
- [b1]Sazzadur Rahaman:
From Theory to Practice: Deployment-grade Tools and Methodologies for Software Security. Virginia Tech, Blacksburg, VA, USA, 2020 - [c10]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao:
Deployment-quality and Accessible Solutions for Cryptography Code Development. CODASPY 2020: 174-176 - [c9]Sharmin Afrose, Sazzadur Rahaman, Danfeng (Daphne) Yao:
A Comprehensive Benchmark on Java Cryptographic API Misuses. CODASPY 2020: 177-178 - [c8]Ya Xiao, Miles Frantz, Sharmin Afrose, Sazzadur Rahaman, Danfeng Daphne Yao:
Tutorial: Principles and Practices of Secure Cryptographic Coding in Java. SecDev 2020: 5-6 - [c7]Mazharul Islam, Sazzadur Rahaman, Na Meng, Behnaz Hassanshahi, Padmanabhan Krishnan, Danfeng Daphne Yao:
Coding Practices and Recommendations of Spring Security for Enterprise Applications. SecDev 2020: 49-57 - [i3]Sazzadur Rahaman, Gang Wang, Danfeng Yao:
Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations. CoRR abs/2002.02855 (2020) - [i2]Mazharul Islam, Sazzadur Rahaman, Na Meng, Behnaz Hassanshahi, Padmanabhan Krishnan, Danfeng Yao:
Coding Practices and Recommendations of Spring Security for Enterprise Applications. CoRR abs/2007.14319 (2020)
2010 – 2019
- 2019
- [c6]Sazzadur Rahaman, Gang Wang, Danfeng Daphne Yao:
Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations. CCS 2019: 481-498 - [c5]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Fahad Shaon, Ke Tian, Miles Frantz, Murat Kantarcioglu, Danfeng (Daphne) Yao:
CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects. CCS 2019: 2455-2472 - [c4]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao:
Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development. CCS 2019: 2545-2547 - [c3]Sharmin Afrose, Sazzadur Rahaman, Danfeng Yao:
CryptoAPI-Bench: A Comprehensive Benchmark on Java Cryptographic API Misuses. SecDev 2019: 49-61 - 2018
- [c2]Sazzadur Rahaman, Na Meng, Danfeng Yao:
Tutorial: Principles and Practices of Secure Crypto Coding in Java. SecDev 2018: 122-123 - [i1]Sazzadur Rahaman, Ya Xiao, Ke Tian, Fahad Shaon, Murat Kantarcioglu, Danfeng Yao:
CHIRON: Deployment-quality Detection of Java Cryptographic Vulnerabilities. CoRR abs/1806.06881 (2018) - 2017
- [j1]Sazzadur Rahaman, Long Cheng, Danfeng Daphne Yao, He Li, Jung-Min "Jerry" Park:
Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation. Proc. Priv. Enhancing Technol. 2017(4): 384-403 (2017) - [c1]Sazzadur Rahaman, Danfeng Yao:
Program Analysis of Cryptographic Implementations for Security. SecDev 2017: 61-68
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-22 18:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint