News

This link won't be updated after May 2013.

Please visit my new webpage at  www.csupomona.edu/~mihusain for updated information.

  • Wide Area Single System Image paper has been accepted for the 2013 GENI Research and Educational Experiment Workshop (GREE 2013).
  • XML-based Network Management paper has been accepted for the 2013 IEEE Wireless Telecommunications Symposium (WTS 2013).
  • Received President’s Research, Scholarship and Creativity Award (PRSCA 2012-2013).
  • Cloud Storage Security paper has been accepted for 31st IEEE International Symposium on Reliable Distributed Systems (SRDS'12).
  • Wireless Network Security paper has been accepted for IEEE Military Communications Conference (MILCOM'12).

About Me

I am with California State Polytechnic University, Pomona (Cal Poly Pomona) as an Assistant Professor starting from Fall, 2012. I have graduated with a PhD in Computer Science and Engineering from the University at Buffalo, The State University of New York (2012). I have completed my Masters from the same department (2008) and my Bachelors degree was from Yamagata University, Japan (2006).

Teaching

All course contents are maintained on Blackboard.

  • Fall 2012
    • CS 141: Introduction to Programming and Problem Solving.
  • Winter 2013
    • CS 460: Secure Communication.
    • CS 463: Undergraduate Seminar on Smartphone Security.
  • Spring 2013
    • CS 140: Introduction to Computer Science.
    • CS 141: Introduction to Programming and Problem Solving.

Research

My broad research interest is in the field of Security & Forensics. As a part of my doctoral research, I have developed a holistic approach of data security in embedded cloud computing by securing the data throughout the life-cycle.  Some of the problems that I have studied in this regard include: reconfigurable encryption for embedded systems, remote verification of storage integrity in cloud, channel independent physical layer security in wireless networks, smartphone and cloud forensics, and securing the key management and routing in wireless ad hoc network.

I have also worked closely with several Socially Relevant Computing projects where the goal is to solve problems of societal interest using the knowledge of Computer Science.

 Research Projects

  • Security & Forensics:
    • Digital Forensic Analysis of Devices Containing Cloud-Supported Software Applications.
    • Experimental Support for Smarphone Security Education.
    • Preserving Data Integrity and Confidentiality in the Cloud.
    • Vulnerabilities of Lightweight Operating Systems such as Chromium and Android OS.
    • Socio-technical Approach to Address Spear Phishing Attack.
    • Hactivism Predication through Online Social Network Analysis.
    • Threat Modelling of Cyber Physical Systems.
    • Smart Vehicle Forensics.
    • Securing the Communication of Unmanned Aerial Vehicle (UAV).
  • Socially Relevant Computing:
    • Mobile E-commerce for the Rural Economy.
    • Bronco Locator.
    • Activity Prediction at Smart Homes.

Students

  • Undergraduate:
    • Max Wolotsky
    • Kyle Spence
    • Antonio Blanco
    • Sean Esparza
  • Graduate:
    • Nick Pantic

Publications

  • Refereed Conference Proceedings
    • Mohammad Iftekhar Husain, S. Mahant and R. Sridhar: CD-PHY: Physical Layer Security in Wireless Networks through Constellation Diversity. Proceeding of the IEEE Military Communications Conference (MILCOM’12), Florida, 2012.
    • Mohammad Iftekhar Husain, S. Ko, S. Uurtamo, A. Rudra, and R. Sridhar. PGV: Pretty Good Verification of Remote Storage. Proceeding of the 31st IEEE International Symposium on Reliable Distributed Systems (SRDS’12), California, 2012.
    • Mohammad Iftekhar Husain, R. Sridhar: Protection Profile-Based Scenario-Centric Taxonomy of Secure Routing Protocols in Ad hoc Networks, Proceeding of the 7th Annual Symposium on Information Assurance (ASIA'11), Albany, 2011.
    • Mohammad Iftekhar Husain, R. Sridhar and I. Baggili: A Simple Cost-Effective Framework for iPhone Forensic Analysis. Proceedings of the International Conference on Digital Forensics & Cyber Crime (ICDF2C'10), UAE, 2010.
    • Mohammad Iftekhar Husain, R. Sridhar: D-RNA: Towards a DDoS Resistant Network Architecture using Social Network Analysis. Proceeding of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering (CAINE'09), San Fransisco, 2009.
    • Mohammad Iftekhar Husain, R. Sridhar: iForensics: Forensic Analysis of Instant Messaging on Smart Phones. Proceedings of the International Conference on Digital Forensics & Cyber Crime (ICDF2C'09), Albany, 2009.
    • S. Sankaran, Mohammad Iftekhar Husain, R. Sridhar: IDKEYMAN: An Identity-Based Key Management Scheme for Wireless Ad Hoc Body Area Network. Proceeding of the 5th Annual Symposium on Information Assurance (ASIA'09), Albany, 2009.
    • A. Parameswaran, Mohammad Iftekhar Husain and S. Upadhyaya: Is RSSI a Reliable Parameter in Sensor Localization Algorithms: An Experimental Study. Field Failure Data Analysis Workshop (F2DA'09), New York, 2009.
    • Mohammad Iftekhar Husain, S. Upadhyaya and M. Chandrasekaran: A Novel Approach for Security and Robustness in Wireless Embedded Systems. Proceedings of the 6th IFIP WG 10.2 International Workshop on Software Technologies for Embedded and Ubiquitous Systems. (SEUS'08), Italy, 2008.
  • Journal / Lecture Notes/ Online Archive
    • Mohammad Iftekhar Husain, L. Mandvekar, C. Qiao and R. Sridhar: How to Bypass Verified Boot Security in Chromium OS. CoRR abs/1202.5282, arXiv:1202.5282. 2012.
    • Mohammad Iftekhar Husain, S. Ko, A. Rudra, and S. Uurtamo: Almost Universal Functions are also Storage Enforcing. CoRR abs/1205.1462, arXiv:1205.1462. 2012.
    • Mohammad Iftekhar Husain, S. Ko, A. Rudra, and S. Uurtamo: Storage Enforcement with Kolmogorov Complexity and List Decoding. Electronic Colloquium on Computational Complexity (ECCC) 18: 80, 2011.
    • Mohammad Iftekhar Husain, R. Sridhar and I. Baggili: A Simple Cost-Effective Framework for iPhone Forensic Analysis. Digital Forensics and Cyber Crime, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Revised Selected Papers from ICDF2C), Vol. 53, pp. 27-37, 2011.
    • Mohammad Iftekhar Husain, M. Chandrasekaran, S. Upadhyaya and R. Sridhar: Cross-layer Soft Security Framework for Wireless Embedded Systems. Accepted for IJWCN: International Journal of Wireless Communications and Networking, 2011.
    • Mohammad Iftekhar Husain, R. Sridhar: iForensics: Forensic Analysis of Instant Messaging on Smart Phones. : Digital Forensics and Cyber Crime, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Revised Selected Papers from ICDF2C), Vol. 31, pp. 9-18, 2010.
    • K. Courtright, Mohammad Iftekhar Husain, R. Sridhar, LASE: Latency Aware Simple Encryption for Embedded Systems Security. IJCSNS: International Journal of Computer Science and Network Security, Vol.9 No.10, pp. 1-6, 2009.
    • K. Courtright, Mohammad Iftekhar Husain, R. Sridhar, Latency Aware General Encryption Hardware for Secure Real-time Embedded System, IJESC: International Journal of Embedded Systems and Computer Engineering, Vol. 1 No. 2, pp 89-97, December, 2009.
    • Mohammad Iftekhar Husain, S. Upadhyaya and M. Chandrasekaran: A Novel Approach for Security and Robustness in Wireless Embedded Systems. Information Systems and Applications, incl. Internet/Web, and HCI, Lecture Notes in Computer Science, Vol. 5287, pp 323-335, 2008.

Professional Activity

Honors & Awards

Copyright: Mohammad Iftekhar Husain, 2012