Mahmud Hossain, Ph.D.

Cyber Security Researcher, Visa Inc, U.S.A.

Email: mahhossa@visa.com

Welcome

I am currently working as a researcher at the cyber security department of Visa Inc, U.S.A. I am doing research on computer and network security that focuses on Intrusion Detection Systems, Intrusion Prevention Systems, Network Monitoring Systems, and Digital Forensics.

I received my Ph.D. in Computer Science in April 2018 from the University of Alabama at Birmingham (UAB). I was supervised by Dr. Ragib Hasan towards my Ph.D. My doctoral committee members were Dr. Anthony Skjellum, Dr. Alan Sprague, Dr. Purushotham Bangalore, and Dr. Allen Jhonston. During my Ph.D., I engaged myself in diversified areas of computer security. Additionally, I served as a Teaching Assistant and Laboratory Instructor at UAB.

I completed my bachelor degree in Computer Science and Engineering from Bangladesh University of Engineering and Technology (BUET) in October 2009. I was supervised by Dr. Mostafa Akbar during my study at BUET.

Before joining UAB as a Ph.D student in Fall 2014, I had been working in software industry for five years. I served Samsung R&D Institute Bangladesh (SRBD) as a Lead Engineer at the Dept. of Solution Lab for the period June 2010 to August 2014. I developed a secure media (audio, video, and image) sharing framework using Windows Runtime platform while I was working at Samsung.


Research Interest

  • Security and privacy of clouds and IoT
  • Forensic investigation of cyber crimes
  • Cyber defense
  • Trustworthy edge, mobile, and cloud Computing
  • Secure provenance
  • Applied cryptography
  • Blockchain based security schemes
  • Distributed Systems
  • Secure software update schemes for resource-limited devices
  • Privacy-aware service discovery in ad hoc networks

Research Projects

  • Secure network admission schemes for IoT devices [HSC-IoT] [BooT-IoT]
  • Privacy-aware authentication for sensor nodes [P-HIP]
  • Resource-efficient authorization for low power and lossy networks [HPA] [CATComp]
  • Fragmentation attack mitigation in 6LoWPAN networks [SecuPAN]
  • Forensic investigation frameworks for IoT-based cyber crime [FIF-IoT] [Trust-IoV]
  • An ad hoc cloud using body area devices [Aura]
  • Testbed-as-a-Service [IoTbed]