Syed Rafiul Hussain

764 posts

Syed Rafiul Hussain

Syed Rafiul Hussain

@SyedRafiul

Assistant Professor of Computer Science and Engineering (@PennStateEECS, @PSUEngineering), Pennsylvania State University (@penn_state)

State College, PA Katılım Mayıs 2011
1.2K Takip Edilen1K Takipçiler
Syed Rafiul Hussain
Syed Rafiul Hussain@SyedRafiul·
If you are working on 5G/6G/FutureG, consider submitting your work to the workshop on 6G and Spectrum Security for Critical Communication (6GSECC), co-located with IEEE MILCOM 2025 and co-chaired by Dr. Arup Bhuyan and me. CFP: milcom2025.ieee-milcom.org/workshop/ws04-…. Deadline is August 12, 2025
English
0
0
1
234
Syed Rafiul Hussain
Syed Rafiul Hussain@SyedRafiul·
Open RAN, Open Risks! Super excited to have our second talk accepted at BlackHat USA'25: #open-ran-open-risk-uncovering-threats-and-exposing-vulnerabilities-in-next-gen-cellular-ran-46100" target="_blank" rel="nofollow noopener">blackhat.com/us-25/briefing…. Proud of my students Tianchang Yang, Yilu Dong, Syed Md Mukit Rashid, and Ali Ranjbar! Joint work with Gang (Gary) Tan!
English
0
0
4
286
Syed Rafiul Hussain
Syed Rafiul Hussain@SyedRafiul·
Check out our recent paper presented by Yilu Dong at WiSec’25 where we demonstrated such solutions can be integrated with PKI based schemes. Joint work with Tao Wan. Great job, Yilu. dl.acm.org/doi/10.1145/37…
English
0
0
0
98
Syed Rafiul Hussain
Syed Rafiul Hussain@SyedRafiul·
Even if you sign the broadcast messages to prevent your phone from connecting to fake base stations, relay attackers can still launch attacks unless additional measures, e.g., distance/time bounded solutions are correctly enforced.
English
1
0
1
145
Syed Rafiul Hussain retweetledi
sergey bratus
sergey bratus@sergeybratus·
Cybersecurity is not about maintaining status quo, cost centers, and accepting risk. It is about creating safe code faster, cheaper, and changing it safely as fast as needed for the mission. Formal methods is the only path to winning in the cyber domain: darpa.mil/formal-methods
English
4
7
33
18.5K
Syed Rafiul Hussain retweetledi
sergey bratus
sergey bratus@sergeybratus·
Papers and slides from the 11th LangSec IEEE Security & Privacy workshop are now posted on the LangSec website: langsec.org/spw25/abstract…
English
0
7
17
2.1K
Syed Rafiul Hussain retweetledi
sergey bratus
sergey bratus@sergeybratus·
I am looking forward to sharing my thoughts and learnings from DARPA programs on the new kinds of tools we need for maintaining and sustaining software and firmware at @hardwear_io , hardwear.io/usa-2025/speak…
English
0
5
26
4K
Syed Rafiul Hussain
Syed Rafiul Hussain@SyedRafiul·
Super excited to have LORIS, a stateful analysis and fuzzing framework for commercial baseband firmware, accepted at @blackhatevent this year. See you all in Las Vegas! #BHUSA #uncovering-nasty-5g-baseband-vulnerabilities-through-dependency-aware-fuzzing-46485" target="_blank" rel="nofollow noopener">blackhat.com/us-25/briefing…
Syed Rafiul Hussain@SyedRafiul

Stateful fuzzing on emulated basebands is extremely challenging as it requires complex manual harnessing to identify state variables and to resolve task dependencies in the RTOS baseband. Also, identifying states and corresponding path constraints runs into state explosion issues

English
0
1
8
3.7K
Syed Rafiul Hussain
Syed Rafiul Hussain@SyedRafiul·
Today at @IEEESSP, Ali Ranjbar will present how we have addressed these challenges with a new technique called iterative symbolic execution to enable stateful and grammar-aware fuzzing of commercial basebands. Loris uncovered seven zero-days in 5 commercial basebands.
English
1
0
2
223
Syed Rafiul Hussain
Syed Rafiul Hussain@SyedRafiul·
Stateful fuzzing on emulated basebands is extremely challenging as it requires complex manual harnessing to identify state variables and to resolve task dependencies in the RTOS baseband. Also, identifying states and corresponding path constraints runs into state explosion issues
English
1
1
10
4.1K
Syed Rafiul Hussain retweetledi
Christina Garman
Christina Garman@CryptoGPS·
Embarking on a new project that needs physical access to an H100 GPU. Any chance anyone is willing to let us borrow one (we promise to return it), in exchange for a security exploration into the land of confidential computing? If so, DM me for further details. Thanks :)
English
1
2
9
720
Syed Rafiul Hussain
Syed Rafiul Hussain@SyedRafiul·
For this, we (Mujtahid, Toufik, and yours truly) developed CoreScan, an assume-guarantee style compositional verification technique that decomposes system model into multiple disjoint components and applies split assertion principle to identify local assumptions and guarantees.
English
1
0
0
71
Syed Rafiul Hussain
Syed Rafiul Hussain@SyedRafiul·
With the rollout of microservice-based 5G core networks and the provision of third-party tenants (e.g., MVNOs), the 3GPP's current access control design is not secure. Mujtahid Akon will highlight these design flaws and explain how we found them today at @IEEESSP.
English
1
0
2
102