About Us

PolySec lab is a center for education and research in Information assurance, security and forensics at the department of Computer Science of Cal Poly Pomona lead by Prof. Mohammad Husain. Our educational goal is to develop and implement a well-balanced curriculum in Information assurance, security and forensics based on ACM Computer Science Curriculum 2013 and NSA/CSS Cyber Ops program. Our research focus is in cognitive cyber security solutions based on psychology, physiology and neuroscience  as well as  assessing and addressing security vulnerabilities in emerging technologies.

 

Research Projects

  • Security & Forensics:
    • Digital Forensic Analysis of Devices Containing Cloud-Supported Software Applications.
    • Experimental Support for Smarphone Security Education.
    • Preserving Data Integrity and Confidentiality in the Cloud.
    • Vulnerabilities of Lightweight Operating Systems such as Chromium and Android OS.
    • Socio-technical Approach to Address Spear Phishing Attack.
    • Hactivism Predication through Online Social Network Analysis.
    • Threat Modelling of Cyber Physical Systems.
    • Smart Vehicle Forensics.
    • Securing the Communication of Unmanned Aerial Vehicle (UAV).
  • Socially Relevant Computing:
    • Mobile E-commerce for the Rural Economy.
    • Bronco Locator.
    • Activity Prediction at Smart Homes.

Research Students

  • Undergraduate:
    • Max Wolotsky
    • Ka-Chun (Ivan) Chiu
    • Anthony Portante
    • Alex Segal
  • Graduate:
    • Nick Pantic
    • Shih-Wei Fang
    • Tung Nguyen
  • Alumni:
    • Kyle Spence, now with Hitachi
    • Antonio Blanco, now with Microsoft
    • Sean Esparza, now with ESRI

Publications

  • Refereed Conference Proceedings
    • Mohammad Iftekhar Husain, K. Courtright and R. Sridhar: Reconfigurable Encryption Architecture for Moving Target Defense. Proceeding of the IEEE Military Communications Conference (MILCOM'13), San Diego, 2013.
    • L. Mandvekar, C. Qiao and Mohammad Iftekhar Husain: Enabling Wide Area Single System Image Experimentation on the GENI Platform. Proceeding of the 2013 GENI Research and Educational Experiment Workshop (GREE'13), Utah, 2013.
    • M. Alam, S. Salloum and Mohammad Iftekhar Husain: Improving Network Management by XML to Relational Data Translation. Proceeding of the 2013 IEEE Wireless Telecommunications Symposium (WTS'13), Arizona, 2013.
    • Mohammad Iftekhar Husain, S. Mahant and R. Sridhar: CD-PHY: Physical Layer Security in Wireless Networks through Constellation Diversity. Proceeding of the IEEE Military Communications Conference (MILCOM’12), Florida, 2012.
    • Mohammad Iftekhar Husain, S. Ko, S. Uurtamo, A. Rudra, and R. Sridhar. PGV: Pretty Good Verification of Remote Storage. Proceeding of the 31st IEEE International Symposium on Reliable Distributed Systems (SRDS’12), California, 2012.
    • Mohammad Iftekhar Husain, R. Sridhar: Protection Profile-Based Scenario-Centric Taxonomy of Secure Routing Protocols in Ad hoc Networks, Proceeding of the 7th Annual Symposium on Information Assurance (ASIA'11), Albany, 2011.
    • Mohammad Iftekhar Husain, R. Sridhar and I. Baggili: A Simple Cost-Effective Framework for iPhone Forensic Analysis. Proceedings of the International Conference on Digital Forensics & Cyber Crime (ICDF2C'10), UAE, 2010.
    • Mohammad Iftekhar Husain, R. Sridhar: D-RNA: Towards a DDoS Resistant Network Architecture using Social Network Analysis. Proceeding of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering (CAINE'09), San Fransisco, 2009.
    • Mohammad Iftekhar Husain, R. Sridhar: iForensics: Forensic Analysis of Instant Messaging on Smart Phones. Proceedings of the International Conference on Digital Forensics & Cyber Crime (ICDF2C'09), Albany, 2009.
    • S. Sankaran, Mohammad Iftekhar Husain, R. Sridhar: IDKEYMAN: An Identity-Based Key Management Scheme for Wireless Ad Hoc Body Area Network. Proceeding of the 5th Annual Symposium on Information Assurance (ASIA'09), Albany, 2009.
    • A. Parameswaran, Mohammad Iftekhar Husain and S. Upadhyaya: Is RSSI a Reliable Parameter in Sensor Localization Algorithms: An Experimental Study. Field Failure Data Analysis Workshop (F2DA'09), New York, 2009.
    • Mohammad Iftekhar Husain, S. Upadhyaya and M. Chandrasekaran: A Novel Approach for Security and Robustness in Wireless Embedded Systems. Proceedings of the 6th IFIP WG 10.2 International Workshop on Software Technologies for Embedded and Ubiquitous Systems. (SEUS'08), Italy, 2008.
  • Journal / Lecture Notes/ Online Archive
    • Alam, M., Salloum, S., & Mohammad Iftekhar Husain. Improving Network Management by XML to Relational Data Translation. International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 5(3), 34-48. 2013.
    • Mohammad Iftekhar Husain, L. Mandvekar, C. Qiao and R. Sridhar: How to Bypass Verified Boot Security in Chromium OS. CoRR abs/1202.5282, arXiv:1202.5282. 2012.
    • Mohammad Iftekhar Husain, S. Ko, A. Rudra, and S. Uurtamo: Almost Universal Functions are also Storage Enforcing. CoRR abs/1205.1462, arXiv:1205.1462. 2012.
    • Mohammad Iftekhar Husain, S. Ko, A. Rudra, and S. Uurtamo: Storage Enforcement with Kolmogorov Complexity and List Decoding. Electronic Colloquium on Computational Complexity (ECCC) 18: 80, 2011.
    • Mohammad Iftekhar Husain, R. Sridhar and I. Baggili: A Simple Cost-Effective Framework for iPhone Forensic Analysis. Digital Forensics and Cyber Crime, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Revised Selected Papers from ICDF2C), Vol. 53, pp. 27-37, 2011.
    • Mohammad Iftekhar Husain, M. Chandrasekaran, S. Upadhyaya and R. Sridhar: Cross-layer Soft Security Framework for Wireless Embedded Systems. Accepted for IJWCN: International Journal of Wireless Communications and Networking, 2011.
    • Mohammad Iftekhar Husain, R. Sridhar: iForensics: Forensic Analysis of Instant Messaging on Smart Phones. : Digital Forensics and Cyber Crime, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Revised Selected Papers from ICDF2C), Vol. 31, pp. 9-18, 2010.
    • K. Courtright, Mohammad Iftekhar Husain, R. Sridhar, LASE: Latency Aware Simple Encryption for Embedded Systems Security. IJCSNS: International Journal of Computer Science and Network Security, Vol.9 No.10, pp. 1-6, 2009.
    • K. Courtright, Mohammad Iftekhar Husain, R. Sridhar, Latency Aware General Encryption Hardware for Secure Real-time Embedded System, IJESC: International Journal of Embedded Systems and Computer Engineering, Vol. 1 No. 2, pp 89-97, December, 2009.
    • Mohammad Iftekhar Husain, S. Upadhyaya and M. Chandrasekaran: A Novel Approach for Security and Robustness in Wireless Embedded Systems. Information Systems and Applications, incl. Internet/Web, and HCI, Lecture Notes in Computer Science, Vol. 5287, pp 323-335, 2008.

Copyright: Mohammad Iftekhar Husain, 2012