Skip to main content

Showing 1–12 of 12 results for author: Rahman, M L

.
  1. Smishing Dataset I: Phishing SMS Dataset from Smishtank.com

    Authors: Daniel Timko, Muhammad Lutfor Rahman

    Abstract: While smishing (SMS Phishing) attacks have risen to become one of the most common types of social engineering attacks, there is a lack of relevant smishing datasets. One of the biggest challenges in the domain of smishing prevention is the availability of fresh smishing datasets. Additionally, as time persists, smishing campaigns are shut down and the crucial information related to the attack are… ▽ More

    Submitted 28 April, 2024; v1 submitted 28 February, 2024; originally announced February 2024.

  2. A Huffman based short message service compression technique using adjacent distance array

    Authors: Pranta Sarker, Mir Lutfur Rahman

    Abstract: The short message service (SMS) is a wireless medium of transmission that allows you to send brief text messages. Cell phone devices have an uttermost SMS capacity of 1,120 bits in the traditional system. Moreover, the conventional SMS employs seven bits for each character, allowing the highest 160 characters for an SMS text message to be transmitted. This research demonstrated that an SMS message… ▽ More

    Submitted 19 December, 2023; originally announced December 2023.

    Comments: 19 pages, 9 figures, peer reviewed, accepted, in press, Journal article

  3. arXiv:2311.06911  [pdf, other

    cs.CR cs.HC

    A Quantitative Study of SMS Phishing Detection

    Authors: Daniel Timko, Daniel Hernandez Castillo, Muhammad Lutfor Rahman

    Abstract: With the booming popularity of smartphones, threats related to these devices are increasingly on the rise. Smishing, a combination of SMS (Short Message Service) and phishing has emerged as a treacherous cyber threat used by malicious actors to deceive users, aiming to steal sensitive information, money or install malware on their mobile devices. Despite the increase in smishing attacks in recent… ▽ More

    Submitted 29 May, 2024; v1 submitted 12 November, 2023; originally announced November 2023.

  4. Commercial Anti-Smishing Tools and Their Comparative Effectiveness Against Modern Threats

    Authors: Daniel Timko, Muhammad Lutfor Rahman

    Abstract: Smishing, also known as SMS phishing, is a type of fraudulent communication in which an attacker disguises SMS communications to deceive a target into providing their sensitive data. Smishing attacks use a variety of tactics; however, they have a similar goal of stealing money or personally identifying information (PII) from a victim. In response to these attacks, a wide variety of anti-smishing t… ▽ More

    Submitted 28 April, 2024; v1 submitted 14 September, 2023; originally announced September 2023.

    Journal ref: Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 1-12, 2023

  5. arXiv:2309.00776  [pdf, other

    cs.CR

    Are Current CCPA Compliant Banners Conveying User's Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners

    Authors: Torsha Mazumdar, Daniel Timko, Muhammad Lutfor Rahman

    Abstract: The California Consumer Privacy Act (CCPA) secures the right to Opt-Out for consumers in California. However, websites may implement complex consent mechanisms that potentially do not capture the user's true choices. We investigated the user choices in Cookie Consent Banner of US residents, the plurality of whom were from California, through an online experiment of 257 participants and compared th… ▽ More

    Submitted 1 September, 2023; originally announced September 2023.

  6. arXiv:2307.07671  [pdf, other

    cs.CR

    Saudi Arabian Perspective of Security, Privacy, and Attitude of Using Facial Recognition Technology

    Authors: Amani Mohammed Alqarni, Daniel Timko, Muhammad Lutfor Rahman

    Abstract: Facial Recognition Technology (FRT) is a pioneering field of mass surveillance that sparks privacy concerns and is considered a growing threat in the modern world. FRT has been widely adopted in the Kingdom of Saudi Arabia to improve public services and surveillance. Accordingly, the following study aims to understand the privacy and security concerns, trust, and acceptance of FRT in Saudi Arabia.… ▽ More

    Submitted 14 July, 2023; originally announced July 2023.

  7. arXiv:2212.13312  [pdf, other

    cs.CR

    Users really do respond to smishing

    Authors: Muhammad Lutfor Rahman, Daniel Timko, Hamid Wali, Ajaya Neupane

    Abstract: Text phish messages, referred to as Smishing is a type of social engineering attack where fake text messages are created, and used to lure users into responding to those messages. These messages aim to obtain user credentials, install malware on the phones, or launch smishing attacks. They ask users to reply to their message, click on a URL that redirects them to a phishing website, or call the pr… ▽ More

    Submitted 26 December, 2022; originally announced December 2022.

    Comments: CODASPY'23

  8. arXiv:2201.00968  [pdf, ps, other

    cs.DM cs.DS

    Erdős-Selfridge Theorem for Nonmonotone CNFs

    Authors: Md Lutfar Rahman, Thomas Watson

    Abstract: In an influential paper, Erdős and Selfridge introduced the Maker-Breaker game played on a hypergraph, or equivalently, on a monotone CNF. The players take turns assigning values to variables of their choosing, and Breaker's goal is to satisfy the CNF, while Maker's goal is to falsify it. The Erdős-Selfridge Theorem says that the least number of clauses in any monotone CNF with $k$ literals per cl… ▽ More

    Submitted 3 January, 2022; originally announced January 2022.

  9. arXiv:2007.12525  [pdf, other

    eess.IV cs.CV cs.LG

    Study of Different Deep Learning Approach with Explainable AI for Screening Patients with COVID-19 Symptoms: Using CT Scan and Chest X-ray Image Dataset

    Authors: Md Manjurul Ahsan, Kishor Datta Gupta, Mohammad Maminur Islam, Sajib Sen, Md. Lutfar Rahman, Mohammad Shakhawat Hossain

    Abstract: The outbreak of COVID-19 disease caused more than 100,000 deaths so far in the USA alone. It is necessary to conduct an initial screening of patients with the symptoms of COVID-19 disease to control the spread of the disease. However, it is becoming laborious to conduct the tests with the available testing kits due to the growing number of patients. Some studies proposed CT scan or chest X-ray ima… ▽ More

    Submitted 24 July, 2020; originally announced July 2020.

    Comments: This is a work in progress, it should not be relied upon without context to guide clinical practice or health-related behavior and should not be reported in news media as established information without consulting multiple experts in the field

  10. arXiv:2006.07559  [pdf, other

    eess.SP cs.NI

    Enabling Joint Communication and Radar Sensing in Mobile Networks -- A Survey

    Authors: J. Andrew Zhang, Md Lushanur Rahman, Kai Wu, Xiao**g Huang, Y. Jay Guo, Shanzhi Chen, **hong Yuan

    Abstract: Mobile network is evolving from a communication-only network towards one with joint communication and radar/radio sensing (JCAS) capabilities, that we call perceptive mobile network (PMN). In PMNs, JCAS integrates sensing into communications, sharing a majority of system modules and the same transmitted signals. The PMN is expected to provide a ubiquitous radio sensing platform and enable a vast n… ▽ More

    Submitted 20 October, 2021; v1 submitted 13 June, 2020; originally announced June 2020.

    Comments: 41 pages, 15 figures, 17 tables, journal paper. IEEE Communications Surveys and Tutorials (Accepted for publication, Oct. 2021)

  11. arXiv:1905.09532  [pdf, other

    cs.CR

    SynFuzz: Efficient Concolic Execution via Branch Condition Synthesis

    Authors: Wookhyun Han, Md Lutfor Rahman, Yuxuan Chen, Chengyu Song, Byoungyoung Lee, Insik Shin

    Abstract: Concolic execution is a powerful program analysis technique for exploring execution paths in a systematic manner. Compare to random-mutation-based fuzzing, concolic execution is especially good at exploring paths that are guarded by complex and tight branch predicates (e.g., (a*b) == 0xdeadbeef). The drawback, however, is that concolic execution engines are much slower than native execution. One m… ▽ More

    Submitted 23 May, 2019; originally announced May 2019.

  12. arXiv:1901.05558  [pdf, other

    cs.NI

    Framework for a Perceptive Mobile Network using Joint Communication and Radar Sensing

    Authors: Md. Lushanur Rahman, J. Andrew Zhang, Xiao**g Huang, Y. Jay Guo, Robert W. Heath Jr

    Abstract: In this paper, we develop a framework for a novel perceptive mobile/cellular network that integrates radar sensing function into the mobile communication network. We propose a unified system platform that enables downlink and uplink sensing, sharing the same transmitted signals with communications. We aim to tackle the fundamental sensing parameter estimation problem in perceptive mobile networks,… ▽ More

    Submitted 16 January, 2019; originally announced January 2019.

    Comments: 14 pages, 12 figures, Journal paper