Feedback

Journal Papers

CVEs:

  1. CVE-2024-7408: "Vulnerability in Airveda Air Quality Monitor PM2.5 PM10", CVSS-B 8.6 HIGH, https://nvd.nist.gov/vuln/detail/CVE-2024-7408

  2. CVE-2024-46040: "IoT Haat Smart Plug IH-IN-16A-S IH-IN-16A-S v5.16.1 suffers from Insufficient Session Expiration", https://nvd.nist.gov/vuln/detail/CVE-2024-46040

  3. CVE-2024-46041: "IoT Haat Smart Plug IH-IN-16A-S v5.16.1 is vulnerable to authentication Bypass", https://nvd.nist.gov/vuln/detail/CVE-2024-46041

  4. CVE-2024-41623: "D3D Security D3D IP Camera (D8801) v.V9.1.17.1.4-20180428 allows a local attacker to execute arbitrary code",

    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41623

  5. CVE-2024-42531: "Ezviz Internet PT Camera CS-CV246 D15655150 allows an unauthenticated host to access its live video stream",

    https://nvd.nist.gov/vuln/detail/CVE-2024-42531

Journal Papers:

  1. A.K. Chillara, P. Saxena, R.R. Maiti, M. Gupta, R. Kondapalli, Z. Zhang, K. Kesavan, "Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards", Springer International Journal of Information Security, June, 2024, Impact Factor: 2.4.

  2. A. Agrawal, R. R. Maiti, "TinyAP: An Intelligent Access Point to Combat Wi-Fi Attacks Using TinyML," in IEEE Internet of Things Journal, September, 2024, doi: 10.1109/JIOT.2024.3467328, Impact Factor: 10.2

  3. A. Agrawal, R. R. Maiti, "iTieProbe: How Vulnerable Your IoT Provisioning via Wi-Fi AP mode or EZ Mode?," in IEEE Transactions on Information Forensics and Security, September, 2024, doi: 10.1109/TIFS.2024.3471080, Impact Factor: 7.23

  4. A. Agrawal, U. Chatterjee and R. R. Maiti, "CheckShake: Passively Detecting Anomaly in Wi-Fi Security Handshake using Gradient Boosting based Ensemble Learning," in IEEE Transactions on Dependable and Secure Computing, 2023, doi: 10.1109/TDSC.2023.3236355.

  5. R. R. Maiti, C. H. Yoong, V. R. Palleti, A. Silva and C. M. Poskitt, "Mitigating Adversarial Attacks on Data-Driven Invariant Checkers for Cyber-Physical Systems," in IEEE Transactions on Dependable and Secure Computing, 2022, doi: 10.1109/TDSC.2022.3194089.

  6. Cheah Huei Yoong, Venkata Reddy Palleti, Rajib Ranjan Maiti, Arlindo Silva and Christopher M Poskitt, "Deriving invariant checkers for critical infrastructure using axiomatic design principles", in Journal of CyberSecuritySpringer, 2021

  7. Gianpiero Costantino, Rajib Ranjan Maiti, Fabio Martinelli, Paolo Santi, “LoSeRO: A Locality Sensitive Routing Protocol in Opportunistic Networks with Contact Profiles”, in IEEE Transaction on Mobile Computing, 2019

  8. Gianpiero Costantino, Rajib Ranjan Maiti, Fabio Martinelli, Paolo Santi, “Private mobility-cast for opportunistic networks”, Elsevier Computer Networks 120: 28-42 (2017)

  9. Rajib Ranjan Maiti, Arun Mallya, Animesh Mukherjee, Niloy Ganguly, “Understanding the Correlation of the Properties of Human movement Patterns”, World Scientific Advances in Complex Systems 17(6) (2014)

 

Conference Papers:

  1. Priyanka Rushikesh Chaudhary, Anand Agrawal, Rajib Ranjan Maiti, "TinyDevID: TinyML-Driven IoT Devices IDentification Using Network Flow Data", in CSP@COMSNETS 2025, Best Paper
  2. Anand Agrawal, Rajib Ranjan Maiti, "TinyAP: A Smart Access Point to detect KRACK on WPA2 Handshake in Wi-Fi using TinyML", in MINDS@COMSNETS 2025, 6th January, 2025, Best Paper.  

  3. Praneeta Maganti, Rajib Ranjan Maiti, Sridhar Adepu, "Identifying CIP-centric Attacks in CPS", in 17th IEEE International Conference on COMmunication Systems & NETworkS (COMSNETS), January 6 - 10, 2025, Bengaluru, India, Best Runners Up Poster Paper.
  4. Anil Kumar Chillara, Paresh Saxena, Rajib Ranjan Maiti, "Transformer-based GAN-augmented Defender for Adversarial USB Keystroke Injection Attacks", In ACM 26th International Conference on Distributed Computing and Networking (ICDCN), 4-7 January 2025, Hyderabad, India, 

  5. Priyanka Rushikesh Chaudhary, Jabez Christopher, Rajib Ranjan Maiti, " iCamInspector: Classify Video Traffic and Detect IoT (Spy) Camera Flows",  in IEEE Building a Secure & Empowered Cyberspace (BuildSec), 19th-20th December, 2024, New Delhi, India.
  6. Priyanka Rushikesh Chaudhary, N. Pranav Krishna, and Rajib Ranjan Maiti. "IoTFuzzSentry: Hunting Bugs In The IoT Wilderness In Operational Phase Using Payload Fuzzing", In Proceedings ACM Conference on Data and Application Security and Privacy (CODASPY). New York, NY, USA. June, 2024.

  7. Anand Agrawal, Rajib Ranjan Maiti, "Guarding the Wi-Fi 4-Way Handshake against Channel-based MiTM: A Case Study on KRACK Attack", in Proceedings of ACM CodaSpy, July, 2024.

  8. Anand Agrawal, Rajib Ranjan Maiti, "POSTER: iTieProbe: Is IoT Device Provisioning secure against MAC Layer authentication-token based replay attacks?", in Proceedings of ACM AsiaCCS, July, 2024.

  9. Priyanka Rushikesh Chaudhary, Avinash Narasimhan, and Rajib Ranjan Maiti, "Demystifying Video Traffic from IoT (Spy) Camera using Undecrypted Network Traffic", In Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy (CODASPY '22), New York, NY, USA, 361–363. https://doi.org/10.1145/3508398.3519356.

  10. Anand Agrawal, Urbi Chatterjee, and Rajib Ranjan Maiti, "KTRACKER: Passively Tracking KRACK using ML Model",
    In Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy (CODASPY '22),
    New York, NY, USA, 364–366. https://doi.org/10.1145/3508398.3519360.

  11. P. S. Darbha, M. Conti, E. Losiouk and R. R. Maiti, "Face Recognition Systems: Are you sure they only consider your face?," 2022 IEEE Security and Privacy Workshops (SPW), 2022, pp. 258-264, doi: 10.1109/SPW54247.2022.9833871.

  12. P. R. Chaudhary, R. R. Maiti, “IoTPerimeter: A Passive Fingerprinting of Smart Environment using Graph-based Features”, in MINDS Workshop in IEEE COMSNETS, 2021.

  13. Ragav Sridharan, Rajib Ranjan Maiti, Nils Ole Tippenhauer, “WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic”, WiSec 2018. 

  14. Sandra Siby, Rajib Ranjan Maiti, Nils Ole Tippenhauer, “IoTScanner: Detecting Privacy Threats in IoT Neighborhoods”, IoTPTS@AsiaCCS 2017: 23-30.

  15. Rajib Ranjan Maiti, Sandra Siby, Ragav Sridharan, Nils Ole Tippenhauer, “Link-LayerDevice Type Classification on Encrypted Wireless Traffic with COTS Radios”, ESORICS (2) 2017: 247-264.  

  16. Sandra Siby, Rajib Ranjan Maiti, Nils Ole Tippenhauer, “IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods”, CoRR abs/1701.05007 (2017).   

  17. Srikanth Kaka, V. N. Sastry, Rajib Ranjan Maiti, On the MitM vulnerability in mobile banking applications for android devices, ANTS 2016: 1-6, Bangalore, India.

  18. Gianpiero Costantino, Rajib Ranjan Maiti, Fabio Martinelli, Paolo Santi, LoSeRO: a locality sensitive routing protocol in opportunistic networks, SAC 2016: 644-650, 2015.

  19. Sandipan Sikdar, Marcin Bodych, Rajib Ranjan Maiti, Biswajit Paria, Niloy Ganguly, Tyll Krueger, Animesh Mukherjee, On the broadcast of segmented messages in dynamic networks, INFOCOM Workshops 2015: 426-431.

  20. Gianpiero Costantino, Rajib Ranjan Maiti, Fabio Martinelli, Paolo Santi, Location-Based Routing for Opportunistic Networks, MASS 2015: 452-453.

  21. Rajib Ranjan Maiti, Niloy Ganguly, Arobinda Gupta, Analyzing the performance of epidemic broadcasting in DTNs using directional antenna, COMSNETS 2013: 1-10.   

  22. Rajib Ranjan Maiti, Niloy Ganguly, Arobinda Gupta, POSTER: Using Directional Antennas for Epidemic Routing in DTNs in Practice, ICDCN 2013: 458-460.  

  23. Rajib Ranjan Maiti, Niloy Ganguly, Arobinda Gupta, Delay Tolerant Networks as Spatio-Temporal Networks, INFOCOM 2013, DOI:10.1109/INFOCOMW.2013.6970737.       

  24. Rajib Ranjan Maiti, Niloy Ganguly, Arobinda Gupta, Epidemic broadcasting in DTNs using directional antenna, COMSNETS 2012: 1-2.