About Us

PolySec lab is a center for education and research in Information assurance, security and forensics at the department of Computer Science of Cal Poly Pomona led by Prof. Mohammad Husain. Our educational goal is to develop and implement a well-balanced curriculum in Information assurance, security and forensics based on ACM Computer Science Curriculum 2013 and NSA/CSS Cyber Ops program. Our research focus is in cognitive cyber security solutions based on psychology, physiology and neuroscience  as well as  assessing and addressing security vulnerabilities in emerging technologies. California State Polytechnic University, Pomona has been designated as a National Center of Academic Excellence in  Information Assurance/Cyber Defense (CAE-IA/CD) Education for academic years 2014-2021 by NSA/DHS.

We have received a NSF Cyber Corps Scholarship for Service grant for academic years 2015-2019 to support our cyber security students and train them to protect critical national infrastructure from cyber threats.  We also thank Sandia National Lab, Northrop Grumman Corporation and Microsoft Corporation for their generous support for our cloud and UAV research.

Publications

  • Refereed Conference Proceedings

    • B. Wu, T. Nguyen, and Mohammad I Husain, Implementation Vulnerability Associated with OAuth 2.0: A Case Study on Dropbox, 6th Symposium on Security and Privacy in Next Generation Networks in conjunction with 12th International Conference on Information Technology : New Generations (ITNG'15), Nevada, 2015.
    • S. Fang, D. Rajamanthri and Mohammad I Husain, Facebook Privacy Management Simplified, 6th Symposium on Security and Privacy in Next Generation Networks in conjunction with 12th International Conference on Information Technology : New Generations (ITNG'15), Nevada, 2015.
    • K. Ding, N. Pantic, Y. Lu, S. Manna, and Mohammad I Husain, Towards Building a Word Similarity Dictionary for Personality Bias Classification of Phishing Email Contents.Ninth IEEE International Conference on Semantic Computing (ICSC'15), Anaheim, 2015.
    • M.Wolotsky and Mohammad Iftekhar Husain. Coercion Resistant Authentication Systems (CRAS) using Physiological Responses to Chill Music. 23rd Usenix Security Symposium (poster session), San Diego, 2014.
    •  N. Pantic, J. Mansur, and Mohammad Iftekhar Husain, Twitter Covert Channel: How to Hide in Human Behavior. 23rd Usenix Security Symposium (poster session), San Diego, 2014.
    • Mohammad Iftekhar Husain, K. Courtright and R. Sridhar: Reconfigurable Encryption Architecture for Moving Target Defense. Proceeding of the IEEE Military Communications Conference (MILCOM'13), San Diego, 2013.
    • L. Mandvekar, C. Qiao and Mohammad Iftekhar Husain: Enabling Wide Area Single System Image Experimentation on the GENI Platform. Proceeding of the 2013 GENI Research and Educational Experiment Workshop (GREE'13), Utah, 2013.
    • M. Alam, S. Salloum and Mohammad Iftekhar Husain: Improving Network Management by XML to Relational Data Translation. Proceeding of the 2013 IEEE Wireless Telecommunications Symposium (WTS'13), Arizona, 2013.
    • Mohammad Iftekhar Husain, S. Mahant and R. Sridhar: CD-PHY: Physical Layer Security in Wireless Networks through Constellation Diversity. Proceeding of the IEEE Military Communications Conference (MILCOM’12), Florida, 2012.
    • Mohammad Iftekhar Husain, S. Ko, S. Uurtamo, A. Rudra, and R. Sridhar. PGV: Pretty Good Verification of Remote Storage. Proceeding of the 31st IEEE International Symposium on Reliable Distributed Systems (SRDS’12), California, 2012.
    • Mohammad Iftekhar Husain, R. Sridhar: Protection Profile-Based Scenario-Centric Taxonomy of Secure Routing Protocols in Ad hoc Networks, Proceeding of the 7th Annual Symposium on Information Assurance (ASIA'11), Albany, 2011.
    • Mohammad Iftekhar Husain, R. Sridhar and I. Baggili: A Simple Cost-Effective Framework for iPhone Forensic Analysis. Proceedings of the International Conference on Digital Forensics & Cyber Crime (ICDF2C'10), UAE, 2010.
    • Mohammad Iftekhar Husain, R. Sridhar: D-RNA: Towards a DDoS Resistant Network Architecture using Social Network Analysis. Proceeding of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering (CAINE'09), San Fransisco, 2009.
    • Mohammad Iftekhar Husain, R. Sridhar: iForensics: Forensic Analysis of Instant Messaging on Smart Phones. Proceedings of the International Conference on Digital Forensics & Cyber Crime (ICDF2C'09), Albany, 2009.
    • S. Sankaran, Mohammad Iftekhar Husain, R. Sridhar: IDKEYMAN: An Identity-Based Key Management Scheme for Wireless Ad Hoc Body Area Network. Proceeding of the 5th Annual Symposium on Information Assurance (ASIA'09), Albany, 2009.
    • A. Parameswaran, Mohammad Iftekhar Husain and S. Upadhyaya: Is RSSI a Reliable Parameter in Sensor Localization Algorithms: An Experimental Study. Field Failure Data Analysis Workshop (F2DA'09), New York, 2009.
    • Mohammad Iftekhar Husain, S. Upadhyaya and M. Chandrasekaran: A Novel Approach for Security and Robustness in Wireless Embedded Systems. Proceedings of the 6th IFIP WG 10.2 International Workshop on Software Technologies for Embedded and Ubiquitous Systems. (SEUS'08), Italy, 2008.

 

  • Journal / Lecture Notes/ Online Archive
    • Mohammad Iftekhar Husain, S. Ko, S. Uurtamo, A. Rudra, and R. Sridhar. Bidirectional Data Verification for Cloud Storage. Elsevier Journal of Networks and Computer Applications,Volume 45, October 2014, Pages 96-107.
    • Alam, M., Salloum, S., & Mohammad Iftekhar Husain. Improving Network Management by XML to Relational Data Translation. International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 5(3), 34-48. 2013.
    • Mohammad Iftekhar Husain, L. Mandvekar, C. Qiao and R. Sridhar: How to Bypass Verified Boot Security in Chromium OS. CoRR abs/1202.5282, arXiv:1202.5282. 2012.
    • Mohammad Iftekhar Husain, S. Ko, A. Rudra, and S. Uurtamo: Almost Universal Functions are also Storage Enforcing. CoRR abs/1205.1462, arXiv:1205.1462. 2012.
    • Mohammad Iftekhar Husain, S. Ko, A. Rudra, and S. Uurtamo: Storage Enforcement with Kolmogorov Complexity and List Decoding. Electronic Colloquium on Computational Complexity (ECCC) 18: 80, 2011.
    • Mohammad Iftekhar Husain, R. Sridhar and I. Baggili: A Simple Cost-Effective Framework for iPhone Forensic Analysis. Digital Forensics and Cyber Crime, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Revised Selected Papers from ICDF2C), Vol. 53, pp. 27-37, 2011.
    • Mohammad Iftekhar Husain, M. Chandrasekaran, S. Upadhyaya and R. Sridhar: Cross-layer Soft Security Framework for Wireless Embedded Systems. Accepted for IJWCN: International Journal of Wireless Communications and Networking, 2011.
    • Mohammad Iftekhar Husain, R. Sridhar: iForensics: Forensic Analysis of Instant Messaging on Smart Phones. : Digital Forensics and Cyber Crime, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Revised Selected Papers from ICDF2C), Vol. 31, pp. 9-18, 2010.
    • K. Courtright, Mohammad Iftekhar Husain, R. Sridhar, LASE: Latency Aware Simple Encryption for Embedded Systems Security. IJCSNS: International Journal of Computer Science and Network Security, Vol.9 No.10, pp. 1-6, 2009.
    • K. Courtright, Mohammad Iftekhar Husain, R. Sridhar, Latency Aware General Encryption Hardware for Secure Real-time Embedded System, IJESC: International Journal of Embedded Systems and Computer Engineering, Vol. 1 No. 2, pp 89-97, December, 2009.
    • Mohammad Iftekhar Husain, S. Upadhyaya and M. Chandrasekaran: A Novel Approach for Security and Robustness in Wireless Embedded Systems. Information Systems and Applications, incl. Internet/Web, and HCI, Lecture Notes in Computer Science, Vol. 5287, pp 323-335, 2008.

Research Projects

  • Security & Forensics:
    • Digital Forensic Analysis of Devices Containing Cloud-Supported Software Applications.
    • Experimental Support for Smarphone Security Education.
    • Preserving Data Integrity and Confidentiality in the Cloud.
    • Vulnerabilities of Lightweight Operating Systems such as Chromium and Android OS.
    • Socio-technical Approach to Address Spear Phishing Attack.
    • Hactivism Predication through Online Social Network Analysis.
    • Threat Modelling of Cyber Physical Systems.
    • Smart Vehicle Forensics.
    • Securing the Communication of Unmanned Aerial Vehicle (UAV).
  • Socially Relevant Computing:
    • Mobile E-commerce for the Rural Economy.
    • Bronco Locator.
    • Activity Prediction at Smart Homes.

 

Copyright: Mohammad Iftekhar Husain, 2012