Publications

Conference Papers

  1. Morpheus: Bringing The (PKCS) One To Meet the Oracle
    Moosa Yahyazadeh; Sze Yiu Chau; Li Li; Man Hong Hue; Joyanta Debnath; Sheung Chiu Ip; Li Chun Ngai; Endadul Hoque; Omar Chowdhury
    [The 28th ACM Conference on Computer and Communications Security (CCS 2021)] (To Appear)

  2. On Reengineering the X.509 PKI with Executable Specification for Better Implementation Guarantees
    Joyanta Debnath; Sze Yiu Chau; Omar Chowdhury
    [The 28th ACM Conference on Computer and Communications Security (CCS 2021)] (To Appear)

  3. All your credentials are belong to us: On Insecure WPA2-Enterprise Configurations
    Man Hong Hue; Joyanta Debnath; Kin Man Leung; Li Li; Mohsen Minaei; M. Hammad Mazhar; Kailiang Xian; Endadul Hoque; Omar Chowdhury; Sze Yiu Chau
    [The 28th ACM Conference on Computer and Communications Security (CCS 2021)] (To Appear)

  4. Monet: Impressionism as A Defense Against Adversarial Examples
    Huangyi Ge; Sze Yiu Chau; Ninghui Li
    [The 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems,
    and Applications (IEEE TPS-ISA 2020)]
    (Paper)

  5. When TLS Meets Proxy on Mobile
    Joyanta Debnath; Sze Yiu Chau; Omar Chowdhury
    [The 18th International Conference on Applied Cryptography and Network Security (ACNS 2020)] (Paper)
    ※ Best Student Paper Award from ACNS 2020

  6. Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples
    Huangyi Ge; Sze Yiu Chau; Bruno Ribeiro; Ninghui Li
    [The 10th ACM Conference on Data and Application Security and Privacy (CODASPY 2020)] (Paper)

  7. Koinonia: Verifiable E-Voting with Long-term Privacy
    Huangyi Ge; Sze Yiu Chau; Victor Gonsalves; Huian Li; Tianhao Wang; Xukai Zou; Ninghui Li
    [The 35th Annual Computer Security Applications Conference (ACSAC 2019)] (Paper)

  8. Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification
    Sze Yiu Chau; Moosa Yahyazadeh; Omar Chowdhury; Aniket Kate; Ninghui Li
    [The Network and Distributed System Security Symposium (NDSS) 2019] (Paper|Talk)
    WIRED coverage

  9. Why Johnny Can’t Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps
    Sze Yiu Chau; Bincheng Wang; Jianxiong Wang; Omar Chowdhury; Aniket Kate; Ninghui Li
    [The 34th Annual Computer Security Applications Conference (ACSAC 2018)] (Paper)

  10. Adaptive Deterrence of DNS Cache Poisoning
    Sze Yiu Chau; Omar Chowdhury; Victor Gonsalves; Huangyi Ge; Weining Yang; Sonia Fahmy; Ninghui Li
    [The 14th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2018)] (Paper)

  11. Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs
    Endadul Hoque; Omar Chowdhury; Sze Yiu Chau; Cristina Nita-Rotaru; Ninghui Li
    [IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2017] (Paper)

  12. SymCerts: Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation Implementations
    Sze Yiu Chau; Omar Chowdhury; Endadul Hoque; Huangyi Ge; Aniket Kate; Cristina Nita-Rotaru; Ninghui Li
    [IEEE Symposium on Security and Privacy (Oakland) 2017] (Paper|Talk)
    ※ One of the 10 CSAW '17 (Applied Research) Finalists

Workshop Papers and Posters

  1. Detecting Specification Noncompliance in Network Protocol Implementations
    Endadul Hoque; Omar Chowdhury; Sze Yiu Chau; Cristina Nita-Rotaru; Ninghui Li
    [USENIX ATC '16 Poster]