Posters

Visible to the public 

# Lead PI Name NSF Project Award Number(s) Name of Poster Session Presenter(s) Poster Title
1 William Adams 1422078 Samir Tout Integrated Smart Grid Analytics for Anomaly Detection
2 Mustaque Ahamad 1514035 Mustaque Ahamad Exposing and Mitigating Cross-Channel Attacks
3 Irfan Ahmed 1500101 Irfan Ahmed EAGER: Peer Instruction for Cybersecurity Education
4 Kemal Akkaya 1550313 Kemal Akkaya Privacy-Preserving Data Collection and Access for IEEE 802.11s-Based Smart Grid Applications
5 Ehab Al-Shaer 1352238 Ehab Al-Shaer Adversary-aware Host Address Mutation
6 Theodore Allen 1409214 Theodore Allen Data-Driven Cyber Vulnerability Maintenance
7 Raul Aranovich 1445079 Raul Aranovich Risk detection in OSS teams with NLP
8 Reza Azarderakhsh 1661557 Reza Azarderakhsh Post-quantum Cryptography
9 Michael Bachmann 1500077 Adam Shniderman Education Initiative TECH MeD: Transdisciplinary Education for Critical Hacks of Medical Devices
10 Saurabh Bagchi 1548114 Modeling Deception In Information Security As A Hypergame - A Primer
11 Emery Berger 1525888, 1525992 Tim Wood EVADE: EVidence-Assisted Detection and Elimination of Vulnerabilities
12 Swarup Bhunia 1441667, 1603483 Prabhat Mishra IPTrust: A Comprehensive Framework for IP Integrity Validation
13 Matthieu Bloch 1527387 Matthieu Bloch Towards Stealth Networks
14 Alexandra Boldyreva 1421815 Cristina Nita-Rotaru A Unifying Framework For Theoretical and Empirical Analysis of Secure Communication Protocols
15 Travis Breaux 1330596 Travis Breaux Privacy Policy Ambiguity and Privacy Risk
16 Jean Camp 1565375, 1565252 Jean Camp Give people controls they can understand and trust, for the privacy and security they want
17 Ran Canetti 1414119, 1413920, 1413964, 1413996 Ran Canetti and Mayank Varia Modular Approach to Cloud Security
18 Justin Cappos 1223588 Justin Cappos Lock-in-Pop Design: Only Access Popular Paths in the Kernel
19 Cornelia Caragea 1421970 Cornelia Caragea Image Privacy Prediction Using Deep Features
20 Bogdan Carbunar 1527153, 1526254 Bogdan Carbunar TWC: Small: Collaborative: Cracking Down Online Deception Ecosystems
21 Alvaro Cardenas 1553683 Limiting the Impact of Stealthy Attacks in Industrial Control Systems
22 Shantanu Chakrabartty 1525476, 1524520 Jian Ren Zero-power Dynamic Signature for Trust Verification of Passive Sensors and Tags
23 Rui Chen 1554373, 15544801 Rui Chen Response to OPM Data Breach
24 Hsinchun Chen 1314631 Sagar Samtani Identifying SCADA Devices and their Vulnerabilities on the IoT
25 Hsinchun Chen 1314631 Sagar Samtani Hacker Community Collection and Analytics
26 Tim Cheng 1526695 Cetin Koc Detection of Hardware Trojans Hidden in Unspecified Design Functionality
27 David Choffnes 1618955 David Choffnes Enabling Practical Traffic Analysis Resistance
28 David Cok 1314674 David Cok Library annotations and tools for checking software
29 Harry Crane 1523785 Harry Crane Edge exchangeability: a new framework for network modeling
30 Anton Dahbura 1544493 Anton Dahbura Modeling Security/Incentive Behaviors
31 Alberto Dainotti 1423659 Alberto Dainotti HIJACKS: Detecting and Characterizing Internet Traffic Interception based on BGP Hijacking
32 Alberto Dainotti 1228994 Alberto Dainotti Internet Outage Detection and Analysis
33 Anupam Datta 1423168 Frank Pfenning Accountability via Deviance and Causal Determination
34 Srini Devadas 1523572 Srini Devadas Trapdoor Computational Fuzzy Extractors
35 Srini Devadas 1411208 Srini Devadas TWC: Small: Ascend: Architecture for Secure Computation on Encrypted Data
36 Jintai Ding 1565748 Jintai Ding Implementing Practical Provably Secure Authenticated Key Exchange for the Post-Quantum World
37 Roger Dingledine 1619454, 1619067 Matthew Wright TTP: Defending Against Website Fingerprinting in Tor
38 Yevgeniy Dodis 1619158 Yevgeniy Dodis Designing Secure Hash Functions and Block Ciphers
39 Adam Doupe 1623269 Adam Doupe Educating the Security Workforce through On-Demand Live Competitions
40 Tudor Dumitras 1464163 Tudor Dumitras Measuring Patching at Scale
41 Sara Eftekharnejad 1600058 Brian Johnson Securing Smart Power Grids under Data Measurement Cyber Threats
42 Thomas Eisenbarth 1618837 Thomas Eisenbarth MIST: Systematic Analysis of Microarchitectural Information Leakage on Mobile Platforms
43 Kirsten Eisentraeger 1617802 Kirsten Eisentraeger Algorithms for number-theoretic problems in cryptography
44 Michalis Faloutsos 1314632,1314603, 1314935 Christos Faloutsos CoreScope
45 Fariborz Farahmand 1544090 Fariborz Farahmand A Mathematical Model of Privacy Decisions: A Behavioral Economic Perspective
46 Nick Feamster 1540066 Nick Feamster Facilitating Free and Open Access to Information on the Internet
47 Yunsi Fei 1563697 Yunsi Fei TWC: Medium: Automating Countermeasures and Security Evaluation against Software Side-channel Attacks
48 Yunsi Fei 1314655 Yunsi Fei A Unified Statistics-based Framework for Analysis and Evaluation of Side-channel Attacks in Cryptosystems
49 Sue Fitzgerald 1500055 CFEAR: Cyber Forensics Education via Augmented Reality
50 Michael Franz 1513837 Stijn Volckaert ENCORE: ENhanced program protection through COmpiler-REwriter cooperation
51 Michael Franz 1513837 Mathias Payer ENCORE: ENhanced program protection through COmpiler-REwriter cooperation
52 Rosanne Gamble 1619690, 1619641 Rose Gamble, Indrakshi Ray Toward a Test Bed for Heavy Vehicle
53 Siddharth Garg 1553419 Siddharth Garg Re-thinking Electronic Design Automation Algorithms for Secure Outsourced Integrated Circuit Fabrication
54 Siddharth Garg 1527072 Siddharth Garg New Attack Vectors and Formal Security Analysis for Integrated Circuit Logic Obfuscation
55 Paolo Gasti 1619023; 1618300 Paolo Gasti Energy-Efficient Privacy-Preserving Active Authentication of Smartphone Users
56 Ryan Gerdes 1410000 Ryan Gerdes Secure and Resilient Vehicular Platooning
57 Gabriel Ghinita 1523101 Gabriel Ghinita Capacity Building in Security, Privacy and Trust for Geospatial Applications
58 Grandon Gill 1418711 Grandon Gill Cybersecurity Discussion Cases
59 Michael Goodrich 1228639, 1228598, 1228485 Michael Goodrich Privacy-Preserving Distributed Storage and Computation
60 Venu Govindaraju 1314803 Shambhu Upadhyaya Long-term Active User Authentication Using Multi-modal Profiles
61 Yong Guan 1527579 George Amariucai Time-Advantage-Based Key Establishment
62 Mina Guirguis 1149397 Mina Guirguis Securing Mobile CPS against Stealthy Attacks
63 Andreas Haeberlen 1065130 Andreas Haeberlen Secure Network Provenance
64 John Hale 1524940 John Hale Scalable Hybrid Attack Graph Modeling and Analysis
65 Kevin Hamlen 1513704 Mathias Payer ENCORE: ENhanced program protection through COmpiler-REwriter cooperation
66 Michael Hay 1409125, 1409143, 1408982 Michael Hay Pythia: Algorithm Selection for Differential Privacy
67 Wu He 1318470 Wu He and Mohd Anwar Improving Security Behavior of Employees in Cyberspace through Evidence-based
68 Xiali Hei 1566166 Xiali Hei CPS security for insulin pumps
69 Jeffrey Hoffstein 1561709 Berk Sunar Development and Evaluation of Next Generation Homomorphic Encryption Schemes
70 Yuan Hong 1618221 Yuan Hong Privacy Preserving Cooperation among Microgrids for Efficient Load Management
71 Jason Hong 1347186 Jason Hong Social Cybersecurity
72 Jason Hong 1228813 Jason Hong PrivacyGrade.org Grading the Privacy of Smartphone Apps
73 Mark Horowitz 1563113 Ardavan Pedram PRISM: Platform for Rapid Investigation of efficient Scientific-computing & Machine-learning
74 Amir Houmansadr 1553301 Amir Houmansadr CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content
75 Fei Hu 1315328 Fei Hu Cyber-physical System and Big Data Security: Training National Warriors
76 Hongxin Hu 1537924 Hongxin Hu Defending Against Visual Cyberbullying Attacks in Emerging Mobile Social Networks
77 Dijiang Huang 1528099, 1523994, 1526299 Dijiang Huang SRN: Secure and Resilient Networking
78 Florence Hudson 1650445 Florence Hudson EAGER Cybersecurity TTP Acceleration
79 Warren Hunt 1525472 Warren Hunt Formal Analysis of x86 Machine-Code Programs
80 Trent Jaeger 1408880 Trent Jaeger Retrofitting Software for Defense-in-Depth
81 Matthew Jensen 1421580 Matthew Jensen Building the Human Firewall
82 Limin Jia 1320470 Limin Jia Provably Enforcing Practical Multi-Layer Policies in Today's Extensible Software Platforms
83 Zhanpeng Jin 1422417, 1423061 Zhanpeng Jin Brainprint: A Psychophysiological Biometric
84 Yier Jin 1319105, 1318860 Yier Jin Toward Trusted 3rd-Party Microprocessor Cores: A Proof Carrying Code Approach
85 Zhanpeng Jin 1564046, 1564104 Zhanpeng Jin Exploring Vulnerabilities of Brain Biometrics
86 David Kaeli 1618379 Yunsi Fei STARSS: Small: Side-Channel Analysis and Resiliency Targeting Accelerators
87 Faisal Kaleem 1500055 Jigang Liu and Sue Fitzgerald CFEAR: Cyber Forensics Education via Augmented Reality
88 Apu Kapadia 1408730, 1407788 Apu Kapadia A Socio-Technical Approach to Privacy in a Camera-Rich World
89 Eric Keller 1406192, 1406225, 1406177 John Sonchack Switch-level Network Security With The OpenFlow Extension Framework (OFX)
90 Mohammad Maifi Khan 1343766 Mohammad Maifi Khan The Role of Emotion in Risk Communication and Warning: Application to Risks of Failures to Update Software
91 Taesoo Kim 1563848 Taesoo Kim Secure Design of SGX Enclaves
92 Jonathan Kimball 1505610, 1505633 Jonathan Kimball and Mo-Yuen Chow Secure Algorithms for Cyber-Physical Systems
93 Matthias Kirchner 1464275 Camera-based Mobile Device Authentication
94 Joerg Kliewer 1526547 Joerg Kliewer Communication under Adversarial Attacks in Complex Networks
95 Alfred Kobsa 142362 Yao Li Cross-Cultural Privacy Prediction
96 Alfred Kobsa 1544373 Bruce Berg The Effect of Sensory Stimuli on the Performance of Security-Critical Tasks
97 Oleg Komogortsev 1250718 Oleg Komogortsev CAREER: Secure and Trustworthy Ocular Biometrics
98 Chakraborty Koushik 1421068 Sanghamitra Roy Mitigating the Threat of a Malicious Network-on-Chip
99 Stephane Lafortune 1421122 Stephane Lafortune Intrusion Detection and Resilience Against Attacks in Cyber and Cyber-Physical Control Systems
100 Cedric Langbort 1619339 Strategic information transmission in cyber-socio-physical systems - from threat to boon
101 Robert LaRose 1318885 Nora Rifon Online Safety for the Ages
102 Lucas Layman 1619084 Lucas Layman Pocket Security: Smart Phone Cybercrime in the Wild
103 Gwendolyn Lee 1537528 Gwendolyn Lee Understanding the Strategic Values of Privacy Practices in Organizations
104 Insup Lee 1505799 Oleg Sokolsky Security and Privacy-Aware Cyber-Physical Systems
105 Kyumin Lee 1553035 Kyumin Lee Tracking, Revealing and Detecting Crowdsourced Manipulation
106 Wenke Lee 1409635 Wenke Lee EPICA
107 David Levin 1564143 David Choffnes Key Sharing in the HTTPS Ecosystem
108 Jun Li 1564348, 1564250, 1564039 Xintao Wu OSN Fraud and Attack Research and Identification
109 Ninghui Li 1640374 Ninghui Li Bridging The Gap between Theory and Practice in Data Privacy
110 Zhenhui Li 1544455 Zhenhui Li Toward Transparency in Public Policy via Privacy Enhanced Social Flow Analysis with Applications to Ecological Networks and Crim
111 Zhiqiang Lin 1623276 Irfan Ahmed Using Virtual Machine Introspection for Deep Cybersecurity Education
112 Dan Lin 1651455, 1651166 Jianping Fan iPrivacy: Automatic Recommendation of Personalized Privacy Settings for Image Sharing
113 Heather Lipford 1318854 Heather Lipford Discovering Software Vulnerabilities through Interactive Static Analysis
114 Heather Lipford 1500052 Heather Lipford A Body of Knowledge for Usable Security and Privacy Education
115 Yao Liu 1553304 Yao Liu A Pathway towards Channel Camouflage and Manipulation Techniques for Wireless Security
116 Vinod Lohani 1623047 Godmar Back Development and Analysis of a Spiral Theory-based Cybersecurity Curriculum
117 Long Lu 1421824 Long Lu STRUCT: Secure and Trustworthy Compartments in Mobile Applications
118 Anna Lysyanskaya 1422361 Anna Lysyanskaya Empowering Anonymity
119 Kenneth Mai 1441736 Ken Mai Combatting Integrated Circuit Counterfeiting Using Secure Chip Odometers
120 Yiorgos Makris 1514050 Yiorgos Makris Hardware Trojans in Wireless Networks: Risks & Remedies
121 Hafiz Malik 1440929 Hafiz Malik Model Driven Framework for Audio Forensics
122 Zhuoqing Mao 1318306, 1526455 Qi Alfred Chen MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era
123 Zhuoqing Mao 1318306, 1526455 Yuru Shao The Misuse of Android Unix Domain Sockets and Security Implications
124 Stephen McCamant 1526319 Stephen McCamant Quantitative Information Flow Measurement
125 Hoda Mehrpouyan 1657774 Hoda Mehrpouyan Privacy Management in Ubiquitous Environments
126 Stephen Miller 1526333 Stephen Miller Lattices, Modularity, and Crypto
127 Jelena Mirkovic 1319215 Jelena Mirkovic FRADE: Flash cRowd Attack DEfense
128 Jelena Mirkovic 1224035 Jelena Mirkovic Revitalizing Cyber-Security Education Through Competitions
129 Alan Mislove 1421444 Alan Mislove Towards Robust Crowd Computations
130 Alan Mislove 1563320 Alan Mislove Measuring and Improving the Management of Today's PKI
131 John Mitchell 1500089 Herb Lin Cybersecurity Education for Policy Makers
132 Prateek Mittal 1423139 Prateek Mittal Anonymity Against AS-level Adversaries
133 Sibin Mohan 1423334 Sibin Mohan Behavior-Based Zero-Day Intrusion Detection for Real-Time Cyber-Physical Systems
134 Arjun Mukherjee 1527364 Arjun Mukherjee Statistical Models for Opinion Spam Detection Leveraging Linguistic and Behavioral Cues
135 Venkitasubramaniam Muthuramakrishnan 1526377 Muthuramakrishnan Venkitasubramaniam Understanding the Complexity of Concurrent Security
136 Brad Myers 1423054 Brad Myers TWC: Small: Empirical Evaluation of the Usability and Security Implications of Application Programming Interface Design
137 Hung Ngo 1409551, 1409303 Varun Chandola Data is Social: Exploiting Data Relationships to Detect Insider Attacks
138 Xuanlong Nguyen 1409303 Xuanlong Nguyen Data is Social: Exploiting Data Relationships to Detect Insider Attacks
139 Kobbi Nissim 1565387, 1565365 Kobbi Nissim Computing over Distributed Sensitive Data
140 Cristina Nita-Rotaru 1654137 Cristina Nita-Rotaru Improving Protocol Vulnerability Discovery via Semantic Interpretation of Textual Specifications
141 Adam O'Neill 1650419 Adam O'Neill EAGER: Guaranteed-Secure and Searchable Genomic Data Repositories
142 Sewoong Oh 1527754 Sewoong Oh Fundamental limits of differential privacy
143 Daniela Oliveira 1464794 Daniela Oliveria Age-Related Vulnerabilities to Social-Engineering Attacks
144 Xinming Ou 1314925 Sathya Chandran Sundaramurthy Bringing Anthropology into Cybersecurity
145 Charalampos Papamanthou 1514261, 1526950 Charalampos Papamanthou IntegriDB: Verifiable SQL for Outsourced Databases
146 Abhishek Parakh 1623380 Abhishek Parakh EDU: QuaSim: A Virtual Interactive Quantum Cryptography Educator-A Project-based Gamified Educational Paradigm
147 Sameer Patil 1548779 Sameer Patil Privacy Compliance by Design
148 Sameer Patil ? ? ?
149 Vern Paxson 1518918, 1237265 Vern Paxson Towards a Science of Censorship Resistance
150 Mathias Payer 1464155 Mathias Payer Data Confidentiality and Integrity
151 Roberto Perdisci 1149051 Roberto Perdisci Reconstructing and investigating in-the-wild web-based malware downloads
152 Vir Phoha 1527795 Vir Phoha Spoof-resistant Authentication Through Phone and Wearables
153 Jules Polonetsky 1654085 Jules Polonetsky Privacy Research and Data Responsibility Research Coordination Network (RCN)
154 Dmitry Ponomarev 1422401 Dmitry Ponomarev Side Channels through Lower-Level Caches
155 Zhiyun Qian 1464410 Zhiyun Qian TCP Side Channels - Real Threats
156 Emilee Rader 1116544, 1115926 Emilee Rader Influencing Mental Models of Security
157 Jeyavijayan Rajendran 1618797 JV Rajendran Secure Split Manufacturing
158 Zvonimir Rakamaric 1527526 Zvonimir Rakamaric DEKER: DECOMPOSING OS KERNELS
159 Baishakhi Ray 1618771 Baishakhi Ray Automated Detection and Repair of Error Handling Bugs in SSL/TLS Implementations
160 Aunshul Rege 1453040 Aunshul Rege Understanding Adaptive Adversarial Behavior and Decision-Making Processes in Cyberattacks
161 Michael Reiter 1330599 Michael Reiter Rethinking Security in the Era of Cloud Computing
162 Kui Ren 1262277 Kui Ren CAREER: Secure and Privacy-assured Data Service Outsourcing in Cloud Computing
163 Golden Richard 1358723 Irfan Ahmed EAGER: Integrating Cognitive and Computer Science to Improve Cyber Security
164 Daniela Rus 1526815 Dan Feldman Enabling Secure and Private Cloud Computing using Coresets
165 Norman Sadeh 1330596 Norman Sadeh Usable Privacy Policy Project
166 Norman Sadeh 1513957 Norman Sadeh Towards Personalized Privacy Assistant: Understanding Privacy Decision Making and Behavioral Impact
167 Ravi Sandhu 1111925 Shouhuai Xu Security Metrics
168 Ravi Sandhu 1111925 Shouhuai Xu Cybersecurity Dynamics
169 Lalitha Sankar 1350914 Lalitha Sankar Privacy-Guaranteed Distributed Interactions in Critical Infrastructure Networks
170 Fareena Saqib 1566530 Fareena Saqib Hardware based Authentication and Trusted Platform Module functions (HAT) for IoTs
171 Fareena Saqib 1623299 Fareena Saqib HACE Lab: An Online Hardware Security Attack and Countermeasure Evaluation Lab
172 Lori Scarlatos 1623150 Laurin Buchanan Branching Interactive Graphic Stories for Cybersecurity Education
173 Patrick Schaumont 1441710 Patrick Schaumont FAME: Fault-attack aware Microprocessor
174 Stephanie Schuckers 1314792 Daqing Hou Long-term Active User Authentication Using Multi-modal Profiles
175 David Schuster 1553018 David Schuster Understanding Human Cognition in Computer Network Defense
176 Kent Seamons 1528022 Kent Seamons TrustBase
177 Shamik Sengupta 1528167 Shamik Sengupta Establishing market based mechanisms for CYBer security information EXchange (CYBEX)
178 Amit Sheth 1513721 Amit Sheth Context-Aware Harassment Detection on Social Media
179 Yaoyun Shi 1526928 Carl Miller A Quantum Approach to Hardware Security
180 Akbar Siami Namin 1347521 Akbar Siami Namin Sonifying Cyber-Security Cues
181 Lisa Singh 1223825 Lisa Singh Assessing Online Information Exposure Using Web Footprints
182 Radu Sion 1562376 Radu Sion CipherLocker: Encrypted Regulatory-Compliant Privacy-Enabled Drag and Drop Cloud Storage
183 Radu Sion 1526707 Radu Sion Practical Plausible Deniability for Storage Systems
184 Meera Sridhar 1566321 Meera Sridhar CRII: SaTC: A Language Based Approach to Hybrid Mobile App Security
185 Kevin Steinmetz 1616804 Kevin Steinmetz and Richard Goe Technological Con-Artistry
186 Scott Stoller 1421893 Scott Stoller Access Control Policy Mining and Management
187 Cynthia Sturton 1651276 Cynthia Sturton Identifying Security Critical Properties of a Processor
188 Gookwon Suh 1513797 G. Edward Suh TWC: Medium: Language-Hardware Co-Design for Practical and Verifiable Information Flow Control
189 S. Shyam Sundar 1450500 Dr. S. Shyam Sundar, Jinyoung Kim Why Do We Reveal or Withhold Private Information? Exploring Heuristics and Designing Interface Cues for Secure Computing
190 Jakub Szefer 1524680, 1526493 Jakub Szefer Practical and Scalable Security Verification of Security-Aware Hardware
191 Mark Tehranipoor 1561023 Domenic Forte Design of Low-Cost Memory-Based Security Primitives and Techniques for High-Volume Products
192 Russell Tessier 1318497 Russell Tessier New Directions in FPGA Security
193 Michael Thomas 1623267 Michael Thomas A Cybersecurity Collectable Card Game for Urban Youth
194 Selcuk Uluagac 1453647 Selcuk Uluagac Securing Sensory Side-Channels in Cyber-Physical Systems
195 Salil Vadhan 1237235 Salil Vadhan Privacy Tools for Sharing Research Data
196 Jaideep Vaidya 1422501 Jaideep Vaidya Privacy Preserving Outlier Detection
197 Joe Valacich 1615696 Joe Valacich Identifying Malicious Insiders through Mouse Cursor Movements
198 Narseo Vallina-Rodriguez 1564329 Narseo Vallina Rodriguez Lumen: Fine-Grained Visibility and Control of Mobile Traffic in User-Space
199 Barbara van Schewick 1330141 Norman Sadeh The Usable Privacy Policy Project
200 Guru Prasadh Venkataramani 1618786 Milos Doroslovacki Defending Against Hardware Covert Timing Channels
201 Giovanni Vigna 1408632 Giovanni Vigna TrustDroid
202 Roopa Vishwanathan 1566297 Roopa Vishwanathan CRII: SaTC: Automated Proof Construction and Verification for Attribute-based Cryptography
203 Tam Vu 1619392 Tam Vu Wearable Authentication Solutions for Ubiquitous and Personal
204 Michael Walfish 1514422 Michael Walfish Scaling proof-based verifiable computation
205 Jingguo Wang 1420758 Jingguo Wang Risk of Data Breaches in Financial Institutions: A Routine Activity Perspective
206 Yang Wang 1464347 Yang Wang Individualized Mental Model and Universal Privacy Dashboard
207 Weichao Wang 1523096 Weichao Wang Developing Security Education Materials for Future Advanced Manufacturing Engineering Workforce
208 Weichao Wang 1303356 Weichao Wang Integrated Learning Environment for Cyber Security of Smart Grid
209 Wendy Hui Wang 1350324 Wendy Hui Wang Verifiable Outsourcing of Data Mining Computations
210 Steven Weber 1228847 Steven Weber TTP: Medium Securing the Wireless Philadelphia Network
211 Shuangqing Wei 1320351 George T Amariucai Security in Dynamic Environments:
212 Laurie Williams 1318428 Laurie Williams Motivating and Reaching University Students and Professionals with Software Security Education
213 Rebecca Wright 1646856, 1646890 Rebecca Wright Anomaly Detection in Multilayer Networks
214 Xintao Wu 1523115, 1523154 Xintao Wu Enhancing Education in Genetic Privacy
215 Dinghao Wu 1223710 Dinghao Wu Reassembleable Disassembling
216 Dinghao Wu 1223710 Dinghao Wu Translingual Obfuscation
217 Li Xiong 1618932 Li Xiong Spatiotemporal Privacy for Location Based Applications
218 Dianxiang Xu 1522847 Samer Khamaiseh, Dianxiang Xu Software Artifact Repository
219 Dianxiang Xu 1359590 Samer Khamaiseh, Dianxiang Xu Automated Conformance Testing of Attribute-Based Access Control and Obligation Policies
220 Dongyan Xu 1409668, 1409534 Dongyan Xu Binary-Centric Forensic Analysis of Advanced Cyber Attacks Against Enterprise Environments
221 Qiben Yan 1566388 Qiben Yan Non-intrusive Detection of Mobile Malware and Botnets
222 Shanchieh Yang 1526383 Shanchieh Jay Yang Automating Attack Strategy Recognition to Enhance Cyber Threat Prediction
223 Baijian Yang 1500046 Baijian Yang Enhancing Cybersecurity Education Through a Representational Fluency Model
224 Alec Yasinsac 1636470 Rebecca Bace Cybersecurity Technology Transfer to Practice (TTP)
225 Yanfang Ye 1618629 Yanfang Ye Intelligent Malware Detection Utilizing Novel File Relation-Based Features and Resilient Techniques for Adversarial Attacks
226 Vinod Yegneswaran 1514503 Vinod Yegneswaran MALDIVES: Toward a Comprehensive Understanding of Malware Delivery Mechanisms
227 Vinod Yegneswaran 1314956 Vinod Yegneswaran HIMALAYAS
228 Lei Ying 1618768 Lei Ying TWC SBE: Small: Towards an Economic Foundation of Privacy-Preserving Data Analytics: Incentive Mechanisms and Fundamental Limits
229 Shimeng Yu 1615774 Shimeng Yu Design of RRAM based Hardware Security Primitives
230 Meng Yu 1422355, 1422594 Meng Yu Towards Agile and Privacy-Preserving Cloud Computing
231 Alenka Zajic 1318934 Milos Prvulovic Quantitative Analysis and Reporting of Electromagnetic Covert and Side Channel Vulnerabilities
232 Kai Zeng 1619073 Kai Zeng Secure Near Field Communications between Mobile Devices
233 Mark Zhandry 1616442 Mark Zhandry Encryptor Combiners
234 Yinqian Zhang 1566444 Yinqian Zhang Rethinking Side Channel Security on Untrusted OS
235 Yanchao Zhang 1421999, 1700032 Rui Zhang TWC: Small: Collaborative: Secure and Usable Mobile Authentication for People with Visual Impairment
236 Yanchao Zhang 1619251 Yanchao Zhang TWC: Small: Secure Mobile Devices through Multiple Lines of Defense
237 Yilu Zhou 1551004 Yilu Zhou Can You Trust Apps Age Recommendations-Inconsistent and Unreliable Maturity Ratings on Mobile Platforms
238 Lina Zhou 1527684 Lina Zhou What Online Reviewer Behaviors Really Matter?
239 Sencun Zhu 1618684 Sencun Zhu Reputation-Escalation-as-a-Service: Analyses and Defenses