Md Sadek Ferdous, PhD
Associate Professor
Dr. Md Sadek Ferdous is an Associate Professor at the Department of Computer Science and Engineering of BRAC University. Previously, he was an Assistant Professor at the Department of Computer Science and Engineering of the Shahjalal University of Science and Technology (SUST), Sylhet Bangladesh. He advises the Government of Bangladesh in different capacities, particularly in Blockchain. He is the principal author of the National Blockchain Strategy document of Bangladesh.
Before joining SUST he worked as a Research Associate at the Centre for Financial Technology of the Imperial College Business School, Imperial College London, UK. He is still associated with the Centre to continue this research remotely.
While at Imperial, he had the opportunity to work at the UK Cabinet Office as their first Technology Fellow. He was a part of a joint-project involving the UK Cabinet Office, UK Ministry of Justice and UK Police in which he explored how the blockchain technology could be leveraged for securing digital evidences. He designed and developed a proof of concept which the UK ministry of Justice exploring the possibility for real-life trial. This had been a very successful project which received world-wide media attention.
He also worked as a Research Fellow at the Electronics and Computer Science Department of the University of Southampton, UK and as a Post-doctoral Research Assistant at the School of Computing Science of the University of Glasgow.
He was a SICSA (Scottish Informatics and Computer Science Alliance) Funded, PhD student at the University of Glasgow. His thesis title was “User-controlled Identity Management Systems using Mobile Devices.
He has a double masters in Security and Mobile Computing from the Norwegian University of Science and Technology, Norway and University of Tartu, Estonia. I was awarded with the prestigious Erasmus Mundus Scholarship to pursue my masters study.
He completed his BSc. in Computer Science & Engineering from the Department of Computer Science and Engineering at Shahjalal University of Science & Technology, Bangladesh.
His current research interests include Blockchain, Identity Management, Trust Management, Security and Privacy.
Address
Level: 4
Kha-224 Merul Badda
Dhaka 1212. Bangladesh
-
Education
+–• PhD in Computing Science, University of Glasgow, 2015
• MSc. in Security and Mobile Computing, Norwegian University of Science and Technology (NTNU), Norway, 2009
• MSc. in Engineering (Computer Science) University of Tartu, Estonia, 2009
• BSc. Engineering in Computer Science and Engineering, Shahjalal University of Science and Technology, Bangladesh. 2004 -
Publications
+–Book Chapters
Ferdous, M. S., Biswas, K., Chowdhury, M. J. M., Chowdhury, N., & Muthukkumarasamy, V. (2019). Integrated platforms for blockchain enablement. In S. Kim, G. C. Deka, & P. Zhang (Eds.), Advances in Computers (Vol. 115, pp. 41–72). Academic Press Inc. https://doi.org/10.1016/bs.adcom.2019.01.001
Ferdous, M. S., Chowdhury, F., & Poet, R. (2017). A hybrid model of attribute aggregation in federated identity management. In V. Chang, M. Ramachandran, R. J. Walters, & G. Wills (Eds.), Enterprise Security. Springer. https://doi.org/10.1007/978-3-319-54380-2_6
Ferdous, M. S., Hussein Khalid Hussein, R., Alassafi Obad, M., Alharthi Ayad, A., Walters, R., & Wills, G. (2016). Threat taxonomy for cloud of things. In A. Al-Sabbagh & R. Alsabah (Eds.), Internet of Things and Big Data Analysis: Recent Trends and Challenges (pp. 149–190). United Scholars Publications. https://eprints.soton.ac.uk/404527/
Ferdous, M. S., & Jøsang, A. (2013). Entity authentication and trust validation in PKI using petname systems. In A. Elçi, J. Pieprzyk, A. G. Chefranov, M. A. Orgun, H. Wang, & R. Shankaran (Eds.), Theory and Practice of Cryptography Solutions for Secure Information Systems (pp. 302–333). IGI Global. https://doi.org/10.4018/978-1-4666-4030-6.ch013
Journals
Chowdhury, M. J. M., Usman, M., Ferdous, M. S., Chowdhury, N., Harun, A. I., Jannat, U. S., & Biswas, K. (2021). A cross-layer trust-based consensus protocol for peer-to-peer energy trading using fuzzy logic. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2021.3063710
Shammee, T. I., Akter, T., Mou, M., Chowdhury, F., & Ferdous, M. S. (2020). A systematic literature review of graphical password schemes. Journal of Computing Science and Engineering, 16(4), 163–185. https://doi.org/10.5626/JCSE.2020.14.4.163
Chowdhury, M. J. M., Ferdous, M. S., Biswas, K., Chowdhury, N., & Muthukkumarasamy, V. (2020). COVID-19 contact tracing: Challenges and future directions. IEEE Access, 8, 225703–225729. https://doi.org/10.1109/ACCESS.2020.3036718
Ferdous, M. S., Chowdhury, F., Alassafi, M. O., Alshdadi, A. A., & Chang, V. (2020). Social anchor: Privacy-friendly attribute aggregation from social networks. IEEE Access, 8, 61844–61871. https://doi.org/10.1109/ACCESS.2020.2981553
Ferdous, M. S., Chowdhury, M. J. M., Biswas, K., Chowdhury, N., & Muthukkumarasamy, V. (2020). Immutable autobiography of smart cars leveraging blockchain technology. Knowledge Engineering Review. https://doi.org/10.1017/S0269888920000028
Ferdous, M. S., Chowdhury, F., & Alassafi, M. O. (2019). In search of self-sovereign identity leveraging blockchain technology. IEEE Access, 7, 103059–103079. https://doi.org/10.1109/ACCESS.2019.2931173
Chowdhury, M. J. M., Ferdous, M. S., Biswas, K., Chowdhury, N., Kayes, A. S. M., Alazab, M., & Watters, P. (2019). A comparative analysis of distributed ledger technology platforms. IEEE Access, 7, 167930–167943. https://doi.org/10.1109/ACCESS.2019.2953729
Chowdhury, F., & Ferdous, M. S. (2017). Performance analysis of R/Kademlia, Pastry and Bamboo using recursive routing in mobile networks. International Journal of Computer Networks and Communications, 9(5), 41–54. https://doi.org/10.5121/ijcnc.2017.9504
Ferdous, M. S., Chowdhury, S., & Jose, J. M. (2017). Analysing privacy in visual lifelogging. Pervasive and Mobile Computing, 40, 430–449. https://doi.org/10.1016/j.pmcj.2017.03.003
Ferdous, M. S., & Poet, R. (2015). Managing dynamic identity federations using Security Assertion Markup Language. Journal of Theoretical and Applied Electronic Commerce Research, 10(2), 53–76. https://doi.org/10.4067/S0718-18762015000200005
Ferdous, M. S., Chowdhury, M. J. M., & Hoque, M. A. (2021). A survey of consensus algorithms in public blockchain systems for crypto-currencies. Journal of Network and Computer Applications, 182, 103035. https://doi.org/https://doi.org/10.1016/j.jnca.2021.103035
Chowdhury, M. J. M., Ferdous, M. S., Biswas, K., Chowdhury, N., & Muthukkumarasamy, V. (2020). A survey on blockchain-based platforms for IoT use-cases. The Knowledge Engineering Review, 35, e19. https://doi.org/10.1017/S0269888920000284
Ferdous, M. S., Chowdhury, S., & Jose, J. M. (2017). Geo-tagging news stories using contextual modelling. International Journal of Information Retrieval Research, 7(4), 50–71. https://doi.org/10.4018/IJIRR.2017100104
Conferences
Alom, I., Eshita, R. M., Harun, A. I., Ferdous, M. S., Shuhan, M. K. B., Chowdhury, M. J. M., & Rahman, M. S. (2021). Dynamic management of identity federations using blockchain. 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1–9. https://doi.org/10.1109/ICBC51069.2021.9461128
Chowdhury, A. A., Chowdhury, F., & Ferdous, M. S. (2020). A study of password security factors among Bangladeshi government websites. 23rd International Conference on Computer and Information Technology, ICCIT 2020. https://doi.org/10.1109/ICCIT51783.2020.9392745
Shahriar, M. A., Bappy, F. H., Hossain, A. K. M. F., Saikat, D. D., Ferdous, M. S., Chowdhury, M. J. M., & Bhuiyan, M. Z. A. (2020). Modelling attacks in blockchain systems using petri nets. 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, 1069–1078. https://doi.org/10.1109/TrustCom50675.2020.00142
Bhuiyan, M. S. I., Razzak, A., Ferdous, M. S., Chowdhury, M. J. M., Hoque, M. A., & Tarkoma, S. (2020). BONIK: A blockchain empowered chatbot for financial transactions. In G. Wang, R. Ko, M. Z. A. Bhuiyan, & Y. Pan (Eds.), 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020 (pp. 1079–1088). IEEE. https://doi.org/10.1109/TrustCom50675.2020.00143
Moniruzzaman, M., Chowdhury, F., & Ferdous, M. S. (2020). Examining usability issues in blockchain-based cryptocurrency wallets. In T. Bhuiyan, M. M. Rahman, & M. A. Ali (Eds.), 2nd International Conference on Computer Science and Cyber Security, ICONCS 2020 (pp. 631–643). Springer. https://doi.org/10.1007/978-3-030-52856-0_50
Sarker, S., Saha, A. K., & Ferdous, M. S. (2020, December). A survey on blockchain cloud integration. 23rd International Conference on Computer and Information Technology, ICCIT 2020. https://doi.org/10.1109/ICCIT51783.2020.9392748
Moniruzzaman, M., Chowdhury, F., & Ferdous, M. S. (2019, February). Measuring vulnerabilities of Bangladeshi websites. 2nd International Conference on Electrical, Computer and Communication Engineering, ECCE 2019. https://doi.org/10.1109/ECACE.2019.8679426
Chowdhury, M. J. M., Ferdous, M. S., Biswas, K., Chowdhury, N., Kayes, A. S. M., Watters, P., & Ng, A. (2019). Trust modeling for blockchain-based wearable data market. In J. Chen & L. T. Yang (Eds.), 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) (pp. 411–417). IEEE. https://doi.org/10.1109/CloudCom.2019.00070
Jannat, U. S., Hasnayeen, S. M., Bashar Shuhan, M. K., & Ferdous, M. S. (2019, February). Analysis and detection of malware in android applications using machine learning. 2nd International Conference on Electrical, Computer and Communication Engineering, ECCE 2019. https://doi.org/10.1109/ECACE.2019.8679493
Siddiki, M. R., Talha, M. A., Chowdhury, F., & Ferdous, M. S. (2018). CrowdsouRS: A crowdsourced reputation system for identifying deceptive online contents. 20th International Conference of Computer and Information Technology, ICCIT 2017, 1–6. https://doi.org/10.1109/ICCITECHN.2017.8281829
Chowdhury, M., Ferdous, M. S., & Biswas, K. (2018, July 5). Blockchain platforms for IoT Use-cases. 2nd Symposium on Distributed Ledger Technology (SDLT), 2019. https://doi.org/10.13140/RG.2.2.26129.94562
Ferdous, M. S., Chowdhury, M., Biswas, K., & Chowdhury, N. (2018, October 19). Immutable autobiography of smart cars. 3rd Symposium on Distributed Ledger Technology (SDLT), 2018.
Margheri, A., Ferdous, M. S., Yang, M., & Sassone, V. (2017). A distributed infrastructure for democratic cloud federations. In G. C. Fox (Ed.), 10th IEEE International Conference on Cloud Computing, CLOUD 2017 (pp. 688–691). IEEE. https://doi.org/10.1109/CLOUD.2017.93
Ferdous, M. S., Margheri, A., Paci, F., Yang, M., & Sassone, V. (2017). Decentralised runtime monitoring for access control systems in cloud federations. In K. Lee & L. Liu (Eds.), 37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017 (pp. 2632–2633). IEEE. https://doi.org/10.1109/ICDCS.2017.178
Ferdous, M. S., Chowdhury, F., & Poet, R. (2017). A hybrid model of attribute aggregation in federated identity management. In V. Chang, M. Ramachandran, R. J. Walters, & G. Wills (Eds.), International Workshop on Enterprise Security, ES 2015 (Vol. 10131, pp. 120–154). Springer. https://doi.org/10.1007/978-3-319-54380-2_6
Chowdhury, S., Ferdous, M. S., & Jose, J. M. (2016). Understanding lifelog sharing preferences of lifeloggers. In P. C. (Ed.), 28th Australian Computer-Human Interaction Conference, OzCHI 2016 (pp. 649–651). ACM Digital Library. https://doi.org/10.1145/3010915.3011852
Chowdhury, S., Ferdous, M. S., & Jose, J. M. (2016). Exploring lifelog sharing and privacy. In C. Parker (Ed.), 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2016 (pp. 553–558). ACM Digital Library. https://doi.org/10.1145/2968219.2968320
Ferdous, M. S., Chowdhury, S., & Jose, J. M. (2016). Privacy threat model in lifelogging. 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2016, 576–581. https://doi.org/10.1145/2968219.2968324
Chowdhury, S., Ferdous, M. S., & Jose, J. M. (2016). Bystander privacy in lifelogging. 30th International BCS Human Computer Interaction Conference, HCI 2016. https://doi.org/10.14236/ewic/HCI2016.62
Ferdous, M. S., & Poet, R. (2016). Formalising identity management protocols. 14th Annual Conference on Privacy, Security and Trust, PST 2016, 137–146. https://doi.org/10.1109/PST.2016.7906948
Chowdhury, S., Ferdous, M. S., & Jose, J. M. (2016, June). A user-study examining visualization of lifelogs. 14th International Workshop on Content-Based Multimedia Indexing, CBMI 2016. https://doi.org/10.1109/CBMI.2016.7500236
Chowdhury, S., Ferdous, M. S., & Jose, J. M. (2016, July). Lifelogging user study: Bystander privacy. 30th International BCS Human Computer Interaction Conference, HCI 2016. https://doi.org/10.5555/3114770.3114810
Chowdhury, S., McParlane, P. J., Ferdous, M. S., & Jose, J. (2015). My day in review visually summarising noisy lifelog data. 5th ACM International Conference on Multimedia Retrieval, ICMR 2015, 607–610. https://doi.org/10.1145/2671188.2749393
Ferdous, M. S., Norman, G., Jøsang, A., & Poet, R. (2015). Mathematical modelling of trust issues in federated identity management. In C. D. Jensen, S. Marsh, T. Dimitrakos, & Y. Murayama (Eds.), 9th IFIP Working Group 11.11 International Conference on Trust Management, IFIPTM 2015 (Vol. 454, pp. 13–29). Springer. https://doi.org/10.1007/978-3-319-18491-3_2
Ferdous, M. S., & Poet, R. (2014). CAFS: A framework for context-aware federated services. 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 130–139. https://doi.org/10.1109/TrustCom.2014.21
Ferdous, M. S., Norman, G., & Poet, R. (2014). Mathematical modelling of identity, Identity Management and other related topics. In R. Poet (Ed.), 7th International Conference on Security of Information and Networks, SIN 2014 (pp. 9–16). ACM Digital Library. https://doi.org/10.1145/2659651.2659729
Ferdous, M. S., & Poet, R. (2013). Portable personal identity provider in mobile phones. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, 736–745. https://doi.org/10.1109/TrustCom.2013.89
Ferdous, M. S., & Poet, R. (2013). Analysing attribute aggregation models in federated identity management. 6th International Conference on Security of Information and Networks, SIN 2013, 181–188. https://doi.org/10.1145/2523514.2526998
Ferdous, M. S., & Poet, R. (2012). A comparative analysis of identity management systems. 2012 10th Annual International Conference on High Performance Computing and Simulation, HPCS 2012, 454–461. https://doi.org/10.1109/HPCSim.2012.6266958
Chadwick, D. W., Inman, G., Siu, K. W. S., & Ferdous, M. S. (2011). Leveraging social networks to gain access to organisational resources. 7th ACM Workshop on Digital Identity Management, DIM’11 - Co-Located with 18th ACM Conference on Computer and Communications Security, CCS 2011, 43–51. https://doi.org/10.1145/2046642.2046653
Moniruzzaman, M., Ferdous, M. S., & Hossain, R. (2010). A study of privacy policy enforcement in access control models. 2010 13th International Conference on Computer and Information Technology, ICCIT 2010, 352–357. https://doi.org/10.1109/ICCITECHN.2010.5723883
Ferdous, M. S., Jøsang, A., Singh, K., & Borgaonkar, R. (2009). Security usability of petname systems. In A. Jøsang, T. Maseng, & S. J. Knapskog (Eds.), 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age, NordSec 2009 (pp. 44–59). Springer. https://doi.org/10.1007/978-3-642-04766-4_4
Kuldeep, S., Audun, J., Ferdous, M. S., & Borgaonkar, R. (2009). Spam filter optimality based on signal detection theory. 2nd International Conference on Security of Information and Networks, SIN’09, 219–224. https://doi.org/10.1145/1626195.1626250
Ferdous, M. S., & Chowdhury, F. (2008). Covert channel communication in RFID (short paper). 1st International Conference on Security of Information and Networks, SIN 2007, 47–52.
Ferdous, M. S., Chowdhury, F., & Acharjee, J. C. (2007). An extended algorithm to enhance the performance of the current NAPT. ICICT 2007: International Conference on Information and Communication Technology, 315–318. https://doi.org/10.1109/ICICT.2007.375401
-
Professional Activities
+–• Associate Professor, Department of Computer Science & Engineering, BRAC University, Dhaka, Bangladesh. May 2021 to date
• Assistant Professor, Department of Computer Science & Engineering, Shahjalal University of Science & Technology, Sylhet, Bangladesh. March 2018 to April 2021
• Research Associate, Centre for Financial Technology, Imperial College Business School, Imperial College London, UK. July 2017 to date
• Technology Fellow, Cabinet Office, UK. July 2017 to January 2018
• Research Fellow, Electronics and Computer Science, University of Southampton, UK. September 2015 to June 2016
• Post-doctoral Research Assistant, School of Computing Science, University of Glasgow, UK. July 2014 to August 2015
• Postgraduate Tutor, School of Computing Science, University of Glasgow, UK. March 2011 to June 2014
• Research Assistant, School of Computing, University of Kent, UK. April 2010 to February 2011
• Assistant Professor, Department of ICT, Metropolitan University, Bangladesh, October 2009 to March 2010.
• Lecturer, Department of ICT, Metropolitan University, Bangladesh, May 2006 to August 2007
• Lecturer, Department. of Information and Communication Engineering, Southeast University, Bangladesh. February 2005 to May 2006 -
Conferences, Talks, and Speaking Engagements
+–• Panel Speaker, Self-Sovereign Identity and Privacy of Data Blockchain Olympiad Bangladesh, 2021.
• Speaker, blockchain technical session for the participants of the Olympiad, 2021.
• Panel Speaker, 7th International Conference on Networking, Systems and Security (NSysS), 2020.
• Webinar Speaker, Recent research trends in ICT. Institute of Information Technology, Jhangirnagar University, 2020.
• Speaker, Identity Federation and Its Benefits. In collaboration with the Australian Access Federation (AAF) under Asi@Connect project of “Increasing Federated Identity, Roaming and E-infrastructure (iFIRE)”.
• Keynote Speaker, Versatility of Blockchain Technology. BdREN, 2020
• Keynote Speaker, Blockchain Masterclass: An Exploration of What, Why, How and Other Issues in Blockchain. SUST CSE Alumni Association , 2020.Conference & Workshops
• PC member, the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom, 2020.
• Reviewer, Australasian Conference on Information System, ACIS, 2020.
• Track chair, the IEEE Region 10 Symposium (TENSYMP), 2020.
• Joint Secretary, the 2nd International Conference on Bangla Speech and Language Processing (ICBSLP), 2019.
• Joint Secretary, the 1st International Conference on Bangla Speech and Language Processing (ICBSLP), 2018.• PC Member, the 3rd Symposium on Distributed Ledger Technology (SDLT), 2018.
• Program Co-Chair, the 8th International Conference on Security of Information and Networks (SIN’15), 2015.
• Local Arrangements Co-Chair, the 7th International Conference on Security of Information and Networks (SIN’14), 2014.
• PC Member (Poster Chair), the 6th International Conference on Security of Information and Networks (SIN’13), 2013.
• Organiser of the 1st SICSA Cyber Security Conference, 2013.
• PC Member of the 17th Nordic Conference on Secure IT Systems (NordSec 2012).
• Organiser of the workshop titled “Large Scale Experiments & Modelling” at the SICSA PhD Conference 2012.
4.4. Bangladesh Blockchain Olympiad, 2020 & 2021
• Distinguished Juror & Mentor -
Awards, Honors
+–• Recipient of the ERCIM Alain Bensoussan Fellowship for a year at Fraunhofer Institute for Applied Information Technology, Bonn, Germany, 2021.
• ICT Innovation Fund of 8 lakh BDT ( 9500 USD) from the Ministry of Information and Communication of the Government of Bangladesh with two other collaborators for researching on a blockchain based e-KYC and reputation system.
• AWS (Amazon Web Services) Cloud Credits for Research, a grant of 20,000 USD in order to deploy a private blockchain evaluation framework within Amazon Clouds.
• Shahjalal University grant of 4.5 lakh BDT ( 5300 USD) to develop an identity federation within Shahjalal University/
• Recipient of the Student Travel Grants to present a paper at the International Conference on High Performance Computing and Simulation (HPCS), 2012.
• Recipient of the Scottish Informatics and Computer Science Alliance (SICSA) PhD Studentship for the doctoral study.
• Joint-author of the Award winning poster “A text free mobile phone contact book with social touch” at the 13th Nordic Workshop on Secure IT-systems (NordSec, 2008), Copenhagen, Denmark.
• Recipient of the prestigious European Union funded Erasmus Mundus Scholarship for studying the Master’s in Security and Mobile Computing (NordSecMob).
• Awarded as the Best teacher of the Department of Information and Communication Engineering in Southeast University in the Fall Semester, 2006. -
Membership
+–• IEEE
-
Research Areas/Interests
+–• Blockchain, Identity Management, Trust Management, Security and Privacy.