Follow
Imtiaz Karim
Imtiaz Karim
Postdoctoral Research Associate, Computer Science, Purdue University
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol
SR Hussain, M Echeverria, I Karim, O Chowdhury, E Bertino
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1312019
Noncompliance as deviant behavior: An automated black-box noncompliance checker for 4g lte cellular devices
SR Hussain, I Karim, AA Ishtiaq, O Chowdhury, E Bertino
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
212021
ProChecker: An Automated Security and Privacy Analysis Framework for 4G LTE Protocol Implementations
I Karim, SR Hussain, E Bertino
41st IEEE International Conference on Distributed Computing Systems, 2021
212021
Maximizing heterogeneous coverage in over and under provisioned visual sensor networks
A Al Zishan, I Karim, SS Shubha, A Rahman
Journal of Network and Computer Applications 124, 44-62, 2018
162018
Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones
I Karim, F Cicala, SR Hussain, O Chowdhury, E Bertino
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
112019
Vwanalyzer: A systematic security analysis framework for the voice over wifi protocol
H Lee, I Karim, N Li, E Bertino
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
72022
BLEDiff: Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations
I Karim, A Al Ishtiaq, SR Hussain, E Bertino
2023 IEEE Symposium on Security and Privacy (SP), 3209-3227, 2023
52023
SPEC5G: A dataset for 5G cellular network protocol analysis
I Karim, KS Mubasshir, MM Rahman, E Bertino
arXiv preprint arXiv:2301.09201, 2023
32023
ATFuzzer: dynamic analysis framework of AT interface for Android smartphones
I Karim, F Cicala, SR Hussain, O Chowdhury, E Bertino
Digital Threats: Research and Practice 1 (4), 1-29, 2020
32020
Machine Learning Techniques for Cybersecurity
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Springer Nature, 2023
22023
FBSDetector: Fake Base Station and Multi Step Attack Detection in Cellular Networks using Machine Learning
KS Mubasshir, I Karim, E Bertino
arXiv preprint arXiv:2401.04958, 2024
2024
Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode
Z Shen, I Karim, E Bertino
arXiv preprint arXiv:2312.07877, 2023
2023
Challenges in the Use of ML for Security
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 131-143, 2023
2023
Hardware Security Analysis
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 71-77, 2023
2023
Security Policy Learning
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 23-45, 2023
2023
Software Security Analysis
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 47-69, 2023
2023
Background on Machine Learning Techniques
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 9-21, 2023
2023
Attack Management
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 105-114, 2023
2023
A Systematic Framework for Analyzing the Security and Privacy of Wireless Communication Protocol Implementations
I Karim
Purdue University, 2023
2023
AI-powered Network Security: Approaches and Research Directions
E Bertino, I Karim
Proceedings of the 8th International Conference on Networking, Systems and …, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20