News

  • Cloud Storage Security paper has been accepted for 31st IEEE International Symposium on Reliable Distributed Systems (SRDS'12).
  • Wireless Network Security paper has been accepted for IEEE Military Communications Conference (MILCOM'12).
  • Participated in ASCE Mini-EXCeed Teaching workshop organized by the Civil Engineering department of Cal Poly Pomona.

About Me

I work at California State Polytechnic University, Pomona (Cal Poly Pomona) as an Assistant Professor starting from Fall, 2012. I have graduated with a PhD in Computer Science and Engineering from the University at Buffalo, The State University of New York. I have completed my Masters from the same department and my Bachelors degree was from Yamagata University, Japan.

Teaching

  • Fall 2012
    • CS 141: Introduction to Programming and Problem Solving. (Link)
  • Winter 2013
    • CS 460: Secure Communication.
    • CS 463: Undergraduate Seminar on Smartphone Security.

Research

My broad research interest is in the field of Embedded Cloud Computing Security & Forensics. As a part of my doctoral research, I have developed a holistic approach of data security in embedded cloud computing by securing the data throughout the life-cycle.  Some of the recent problems that I have studied in this regard include:

  • Reconfigurable Encryption for Embedded Systems.
  • Remote Verification of Storage Integrity in Cloud.
  • Channel Independent Physical Layer Security in Wireless Networks.
  • Smartphone and Cloud Forensics.  
  • Securing the Key Management and Routing in Wireless Ad hoc Network.

I have also worked closely with several Socially Relevant Computing projects where the goal is to solve problems of societal interest using the knowledge of Computer Science.

Publications

  • Refereed Conference Proceedings
    • Mohammad Iftekhar Husain, S. Mahant and R. Sridhar: CD-PHY: Physical Layer Security in Wireless Networks through Constellation Diversity. Proceeding of the IEEE Military Communications Conference (MILCOM’12), Florida, 2012.
    • Mohammad Iftekhar Husain, S. Ko, S. Uurtamo, A. Rudra, and R. Sridhar. PGV: Pretty Good Verification of Remote Storage. Proceeding of the 31st IEEE International Symposium on Reliable Distributed Systems (SRDS’12), California, 2012.
    • Mohammad Iftekhar Husain, R. Sridhar: Protection Profile-Based Scenario-Centric Taxonomy of Secure Routing Protocols in Ad hoc Networks, Proceeding of the 7th Annual Symposium on Information Assurance (ASIA'11), Albany, 2011.
    • Mohammad Iftekhar Husain, R. Sridhar and I. Baggili: A Simple Cost-Effective Framework for iPhone Forensic Analysis. Proceedings of the International Conference on Digital Forensics & Cyber Crime (ICDF2C'10), UAE, 2010.
    • Mohammad Iftekhar Husain, R. Sridhar: D-RNA: Towards a DDoS Resistant Network Architecture using Social Network Analysis. Proceeding of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering (CAINE'09), San Fransisco, 2009.
    • Mohammad Iftekhar Husain, R. Sridhar: iForensics: Forensic Analysis of Instant Messaging on Smart Phones. Proceedings of the International Conference on Digital Forensics & Cyber Crime (ICDF2C'09), Albany, 2009.
    • S. Sankaran, Mohammad Iftekhar Husain, R. Sridhar: IDKEYMAN: An Identity-Based Key Management Scheme for Wireless Ad Hoc Body Area Network. Proceeding of the 5th Annual Symposium on Information Assurance (ASIA'09), Albany, 2009.
    • A. Parameswaran, Mohammad Iftekhar Husain and S. Upadhyaya: Is RSSI a Reliable Parameter in Sensor Localization Algorithms: An Experimental Study. Field Failure Data Analysis Workshop (F2DA'09), New York, 2009.
    • Mohammad Iftekhar Husain, S. Upadhyaya and M. Chandrasekaran: A Novel Approach for Security and Robustness in Wireless Embedded Systems. Proceedings of the 6th IFIP WG 10.2 International Workshop on Software Technologies for Embedded and Ubiquitous Systems. (SEUS'08), Italy, 2008.
  • Journal / Lecture Notes/ Online Archive
    • Mohammad Iftekhar Husain, L. Mandvekar, C. Qiao and R. Sridhar: How to Bypass Verified Boot Security in Chromium OS. CoRR abs/1202.5282, arXiv:1202.5282. 2012.
    • Mohammad Iftekhar Husain, S. Ko, A. Rudra, and S. Uurtamo: Almost Universal Functions are also Storage Enforcing. CoRR abs/1205.1462, arXiv:1205.1462. 2012.
    • Mohammad Iftekhar Husain, S. Ko, A. Rudra, and S. Uurtamo: Storage Enforcement with Kolmogorov Complexity and List Decoding. Electronic Colloquium on Computational Complexity (ECCC) 18: 80, 2011.
    • Mohammad Iftekhar Husain, R. Sridhar and I. Baggili: A Simple Cost-Effective Framework for iPhone Forensic Analysis. Digital Forensics and Cyber Crime, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Revised Selected Papers from ICDF2C), Vol. 53, pp. 27-37, 2011.
    • Mohammad Iftekhar Husain, M. Chandrasekaran, S. Upadhyaya and R. Sridhar: Cross-layer Soft Security Framework for Wireless Embedded Systems. Accepted for IJWCN: International Journal of Wireless Communications and Networking, 2011.
    • Mohammad Iftekhar Husain, R. Sridhar: iForensics: Forensic Analysis of Instant Messaging on Smart Phones. : Digital Forensics and Cyber Crime, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Revised Selected Papers from ICDF2C), Vol. 31, pp. 9-18, 2010.
    • K. Courtright, Mohammad Iftekhar Husain, R. Sridhar, LASE: Latency Aware Simple Encryption for Embedded Systems Security. IJCSNS: International Journal of Computer Science and Network Security, Vol.9 No.10, pp. 1-6, 2009.
    • K. Courtright, Mohammad Iftekhar Husain, R. Sridhar, Latency Aware General Encryption Hardware for Secure Real-time Embedded System, IJESC: International Journal of Embedded Systems and Computer Engineering, Vol. 1 No. 2, pp 89-97, December, 2009.
    • Mohammad Iftekhar Husain, S. Upadhyaya and M. Chandrasekaran: A Novel Approach for Security and Robustness in Wireless Embedded Systems. Information Systems and Applications, incl. Internet/Web, and HCI, Lecture Notes in Computer Science, Vol. 5287, pp 323-335, 2008.

Honors & Awards

Copyright: Mohammad Iftekhar Husain, 2012