# |
Lead PI Name |
NSF Project Award Number(s) |
Name of Poster Session Presenter(s) |
Poster Title |
1 |
William Adams |
1422078 |
Samir Tout |
Integrated Smart Grid Analytics for Anomaly Detection |
2 |
Mustaque Ahamad |
1514035 |
Mustaque Ahamad |
Exposing and Mitigating Cross-Channel Attacks |
3 |
Irfan Ahmed |
1500101 |
Irfan Ahmed |
EAGER: Peer Instruction for Cybersecurity Education |
4 |
Kemal Akkaya |
1550313 |
Kemal Akkaya |
Privacy-Preserving Data Collection and Access for IEEE 802.11s-Based Smart Grid Applications |
5 |
Ehab Al-Shaer |
1352238 |
Ehab Al-Shaer |
Adversary-aware Host Address Mutation |
6 |
Theodore Allen |
1409214 |
Theodore Allen |
Data-Driven Cyber Vulnerability Maintenance |
7 |
Raul Aranovich |
1445079 |
Raul Aranovich |
Risk detection in OSS teams with NLP |
8 |
Reza Azarderakhsh |
1661557 |
Reza Azarderakhsh |
Post-quantum Cryptography |
9 |
Michael Bachmann |
1500077 |
Adam Shniderman |
Education Initiative TECH MeD: Transdisciplinary Education for Critical Hacks of Medical Devices |
10 |
Saurabh Bagchi |
1548114 |
|
Modeling Deception In Information Security As A Hypergame - A Primer |
11 |
Emery Berger |
1525888, 1525992 |
Tim Wood |
EVADE: EVidence-Assisted Detection and Elimination of Vulnerabilities |
12 |
Swarup Bhunia |
1441667, 1603483 |
Prabhat Mishra |
IPTrust: A Comprehensive Framework for IP Integrity Validation |
13 |
Matthieu Bloch |
1527387 |
Matthieu Bloch |
Towards Stealth Networks |
14 |
Alexandra Boldyreva |
1421815 |
Cristina Nita-Rotaru |
A Unifying Framework For Theoretical and Empirical Analysis of Secure Communication Protocols |
15 |
Travis Breaux |
1330596 |
Travis Breaux |
Privacy Policy Ambiguity and Privacy Risk |
16 |
Jean Camp |
1565375, 1565252 |
Jean Camp |
Give people controls they can understand and trust, for the privacy and security they want |
17 |
Ran Canetti |
1414119, 1413920, 1413964, 1413996 |
Ran Canetti and Mayank Varia |
Modular Approach to Cloud Security |
18 |
Justin Cappos |
1223588 |
Justin Cappos |
Lock-in-Pop Design: Only Access Popular Paths in the Kernel |
19 |
Cornelia Caragea |
1421970 |
Cornelia Caragea |
Image Privacy Prediction Using Deep Features |
20 |
Bogdan Carbunar |
1527153, 1526254 |
Bogdan Carbunar |
TWC: Small: Collaborative: Cracking Down Online Deception Ecosystems |
21 |
Alvaro Cardenas |
1553683 |
|
Limiting the Impact of Stealthy Attacks in Industrial Control Systems |
22 |
Shantanu Chakrabartty |
1525476, 1524520 |
Jian Ren |
Zero-power Dynamic Signature for Trust Verification of Passive Sensors and Tags |
23 |
Rui Chen |
1554373, 15544801 |
Rui Chen |
Response to OPM Data Breach |
24 |
Hsinchun Chen |
1314631 |
Sagar Samtani |
Identifying SCADA Devices and their Vulnerabilities on the IoT |
25 |
Hsinchun Chen |
1314631 |
Sagar Samtani |
Hacker Community Collection and Analytics |
26 |
Tim Cheng |
1526695 |
Cetin Koc |
Detection of Hardware Trojans Hidden in Unspecified Design Functionality |
27 |
David Choffnes |
1618955 |
David Choffnes |
Enabling Practical Traffic Analysis Resistance |
28 |
David Cok |
1314674 |
David Cok |
Library annotations and tools for checking software |
29 |
Harry Crane |
1523785 |
Harry Crane |
Edge exchangeability: a new framework for network modeling |
30 |
Anton Dahbura |
1544493 |
Anton Dahbura |
Modeling Security/Incentive Behaviors |
31 |
Alberto Dainotti |
1423659 |
Alberto Dainotti |
HIJACKS: Detecting and Characterizing Internet Traffic Interception based on BGP Hijacking |
32 |
Alberto Dainotti |
1228994 |
Alberto Dainotti |
Internet Outage Detection and Analysis |
33 |
Anupam Datta |
1423168 |
Frank Pfenning |
Accountability via Deviance and Causal Determination |
34 |
Srini Devadas |
1523572 |
Srini Devadas |
Trapdoor Computational Fuzzy Extractors |
35 |
Srini Devadas |
1411208 |
Srini Devadas |
TWC: Small: Ascend: Architecture for Secure Computation on Encrypted Data |
36 |
Jintai Ding |
1565748 |
Jintai Ding |
Implementing Practical Provably Secure Authenticated Key Exchange for the Post-Quantum World |
37 |
Roger Dingledine |
1619454, 1619067 |
Matthew Wright |
TTP: Defending Against Website Fingerprinting in Tor |
38 |
Yevgeniy Dodis |
1619158 |
Yevgeniy Dodis |
Designing Secure Hash Functions and Block Ciphers |
39 |
Adam Doupe |
1623269 |
Adam Doupe |
Educating the Security Workforce through On-Demand Live Competitions |
40 |
Tudor Dumitras |
1464163 |
Tudor Dumitras |
Measuring Patching at Scale |
41 |
Sara Eftekharnejad |
1600058 |
Brian Johnson |
Securing Smart Power Grids under Data Measurement Cyber Threats |
42 |
Thomas Eisenbarth |
1618837 |
Thomas Eisenbarth |
MIST: Systematic Analysis of Microarchitectural Information Leakage on Mobile Platforms |
43 |
Kirsten Eisentraeger |
1617802 |
Kirsten Eisentraeger |
Algorithms for number-theoretic problems in cryptography |
44 |
Michalis Faloutsos |
1314632,1314603, 1314935 |
Christos Faloutsos |
CoreScope |
45 |
Fariborz Farahmand |
1544090 |
Fariborz Farahmand |
A Mathematical Model of Privacy Decisions: A Behavioral Economic Perspective |
46 |
Nick Feamster |
1540066 |
Nick Feamster |
Facilitating Free and Open Access to Information on the Internet |
47 |
Yunsi Fei |
1563697 |
Yunsi Fei |
TWC: Medium: Automating Countermeasures and Security Evaluation against Software Side-channel Attacks |
48 |
Yunsi Fei |
1314655 |
Yunsi Fei |
A Unified Statistics-based Framework for Analysis and Evaluation of Side-channel Attacks in Cryptosystems |
49 |
Sue Fitzgerald |
1500055 |
|
CFEAR: Cyber Forensics Education via Augmented Reality |
50 |
Michael Franz |
1513837 |
Stijn Volckaert |
ENCORE: ENhanced program protection through COmpiler-REwriter cooperation |
51 |
Michael Franz |
1513837 |
Mathias Payer |
ENCORE: ENhanced program protection through COmpiler-REwriter cooperation |
52 |
Rosanne Gamble |
1619690, 1619641 |
Rose Gamble, Indrakshi Ray |
Toward a Test Bed for Heavy Vehicle |
53 |
Siddharth Garg |
1553419 |
Siddharth Garg |
Re-thinking Electronic Design Automation Algorithms for Secure Outsourced Integrated Circuit Fabrication |
54 |
Siddharth Garg |
1527072 |
Siddharth Garg |
New Attack Vectors and Formal Security Analysis for Integrated Circuit Logic Obfuscation |
55 |
Paolo Gasti |
1619023; 1618300 |
Paolo Gasti |
Energy-Efficient Privacy-Preserving Active Authentication of Smartphone Users |
56 |
Ryan Gerdes |
1410000 |
Ryan Gerdes |
Secure and Resilient Vehicular Platooning |
57 |
Gabriel Ghinita |
1523101 |
Gabriel Ghinita |
Capacity Building in Security, Privacy and Trust for Geospatial Applications |
58 |
Grandon Gill |
1418711 |
Grandon Gill |
Cybersecurity Discussion Cases |
59 |
Michael Goodrich |
1228639, 1228598, 1228485 |
Michael Goodrich |
Privacy-Preserving Distributed Storage and Computation |
60 |
Venu Govindaraju |
1314803 |
Shambhu Upadhyaya |
Long-term Active User Authentication Using Multi-modal Profiles |
61 |
Yong Guan |
1527579 |
George Amariucai |
Time-Advantage-Based Key Establishment |
62 |
Mina Guirguis |
1149397 |
Mina Guirguis |
Securing Mobile CPS against Stealthy Attacks |
63 |
Andreas Haeberlen |
1065130 |
Andreas Haeberlen |
Secure Network Provenance |
64 |
John Hale |
1524940 |
John Hale |
Scalable Hybrid Attack Graph Modeling and Analysis |
65 |
Kevin Hamlen |
1513704 |
Mathias Payer |
ENCORE: ENhanced program protection through COmpiler-REwriter cooperation |
66 |
Michael Hay |
1409125, 1409143, 1408982 |
Michael Hay |
Pythia: Algorithm Selection for Differential Privacy |
67 |
Wu He |
1318470 |
Wu He and Mohd Anwar |
Improving Security Behavior of Employees in Cyberspace through Evidence-based |
68 |
Xiali Hei |
1566166 |
Xiali Hei |
CPS security for insulin pumps |
69 |
Jeffrey Hoffstein |
1561709 |
Berk Sunar |
Development and Evaluation of Next Generation Homomorphic Encryption Schemes |
70 |
Yuan Hong |
1618221 |
Yuan Hong |
Privacy Preserving Cooperation among Microgrids for Efficient Load Management |
71 |
Jason Hong |
1347186 |
Jason Hong |
Social Cybersecurity |
72 |
Jason Hong |
1228813 |
Jason Hong |
PrivacyGrade.org Grading the Privacy of Smartphone Apps |
73 |
Mark Horowitz |
1563113 |
Ardavan Pedram |
PRISM: Platform for Rapid Investigation of efficient Scientific-computing & Machine-learning |
74 |
Amir Houmansadr |
1553301 |
Amir Houmansadr |
CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content |
75 |
Fei Hu |
1315328 |
Fei Hu |
Cyber-physical System and Big Data Security: Training National Warriors |
76 |
Hongxin Hu |
1537924 |
Hongxin Hu |
Defending Against Visual Cyberbullying Attacks in Emerging Mobile Social Networks |
77 |
Dijiang Huang |
1528099, 1523994, 1526299 |
Dijiang Huang |
SRN: Secure and Resilient Networking |
78 |
Florence Hudson |
1650445 |
Florence Hudson |
EAGER Cybersecurity TTP Acceleration |
79 |
Warren Hunt |
1525472 |
Warren Hunt |
Formal Analysis of x86 Machine-Code Programs |
80 |
Trent Jaeger |
1408880 |
Trent Jaeger |
Retrofitting Software for Defense-in-Depth |
81 |
Matthew Jensen |
1421580 |
Matthew Jensen |
Building the Human Firewall |
82 |
Limin Jia |
1320470 |
Limin Jia |
Provably Enforcing Practical Multi-Layer Policies in Today's Extensible Software Platforms |
83 |
Zhanpeng Jin |
1422417, 1423061 |
Zhanpeng Jin |
Brainprint: A Psychophysiological Biometric |
84 |
Yier Jin |
1319105, 1318860 |
Yier Jin |
Toward Trusted 3rd-Party Microprocessor Cores: A Proof Carrying Code Approach |
85 |
Zhanpeng Jin |
1564046, 1564104 |
Zhanpeng Jin |
Exploring Vulnerabilities of Brain Biometrics |
86 |
David Kaeli |
1618379 |
Yunsi Fei |
STARSS: Small: Side-Channel Analysis and Resiliency Targeting Accelerators |
87 |
Faisal Kaleem |
1500055 |
Jigang Liu and Sue Fitzgerald |
CFEAR: Cyber Forensics Education via Augmented Reality |
88 |
Apu Kapadia |
1408730, 1407788 |
Apu Kapadia |
A Socio-Technical Approach to Privacy in a Camera-Rich World |
89 |
Eric Keller |
1406192, 1406225, 1406177 |
John Sonchack |
Switch-level Network Security With The OpenFlow Extension Framework (OFX) |
90 |
Mohammad Maifi Khan |
1343766 |
Mohammad Maifi Khan |
The Role of Emotion in Risk Communication and Warning: Application to Risks of Failures to Update Software |
91 |
Taesoo Kim |
1563848 |
Taesoo Kim |
Secure Design of SGX Enclaves |
92 |
Jonathan Kimball |
1505610, 1505633 |
Jonathan Kimball and Mo-Yuen Chow |
Secure Algorithms for Cyber-Physical Systems |
93 |
Matthias Kirchner |
1464275 |
|
Camera-based Mobile Device Authentication |
94 |
Joerg Kliewer |
1526547 |
Joerg Kliewer |
Communication under Adversarial Attacks in Complex Networks |
95 |
Alfred Kobsa |
142362 |
Yao Li |
Cross-Cultural Privacy Prediction |
96 |
Alfred Kobsa |
1544373 |
Bruce Berg |
The Effect of Sensory Stimuli on the Performance of Security-Critical Tasks |
97 |
Oleg Komogortsev |
1250718 |
Oleg Komogortsev |
CAREER: Secure and Trustworthy Ocular Biometrics |
98 |
Chakraborty Koushik |
1421068 |
Sanghamitra Roy |
Mitigating the Threat of a Malicious Network-on-Chip |
99 |
Stephane Lafortune |
1421122 |
Stephane Lafortune |
Intrusion Detection and Resilience Against Attacks in Cyber and Cyber-Physical Control Systems |
100 |
Cedric Langbort |
1619339 |
|
Strategic information transmission in cyber-socio-physical systems - from threat to boon |
101 |
Robert LaRose |
1318885 |
Nora Rifon |
Online Safety for the Ages |
102 |
Lucas Layman |
1619084 |
Lucas Layman |
Pocket Security: Smart Phone Cybercrime in the Wild |
103 |
Gwendolyn Lee |
1537528 |
Gwendolyn Lee |
Understanding the Strategic Values of Privacy Practices in Organizations |
104 |
Insup Lee |
1505799 |
Oleg Sokolsky |
Security and Privacy-Aware Cyber-Physical Systems |
105 |
Kyumin Lee |
1553035 |
Kyumin Lee |
Tracking, Revealing and Detecting Crowdsourced Manipulation |
106 |
Wenke Lee |
1409635 |
Wenke Lee |
EPICA |
107 |
David Levin |
1564143 |
David Choffnes |
Key Sharing in the HTTPS Ecosystem |
108 |
Jun Li |
1564348, 1564250, 1564039 |
Xintao Wu |
OSN Fraud and Attack Research and Identification |
109 |
Ninghui Li |
1640374 |
Ninghui Li |
Bridging The Gap between Theory and Practice in Data Privacy |
110 |
Zhenhui Li |
1544455 |
Zhenhui Li |
Toward Transparency in Public Policy via Privacy Enhanced Social Flow Analysis with Applications to Ecological Networks and Crim |
111 |
Zhiqiang Lin |
1623276 |
Irfan Ahmed |
Using Virtual Machine Introspection for Deep Cybersecurity Education |
112 |
Dan Lin |
1651455, 1651166 |
Jianping Fan |
iPrivacy: Automatic Recommendation of Personalized Privacy Settings for Image Sharing |
113 |
Heather Lipford |
1318854 |
Heather Lipford |
Discovering Software Vulnerabilities through Interactive Static Analysis |
114 |
Heather Lipford |
1500052 |
Heather Lipford |
A Body of Knowledge for Usable Security and Privacy Education |
115 |
Yao Liu |
1553304 |
Yao Liu |
A Pathway towards Channel Camouflage and Manipulation Techniques for Wireless Security |
116 |
Vinod Lohani |
1623047 |
Godmar Back |
Development and Analysis of a Spiral Theory-based Cybersecurity Curriculum |
117 |
Long Lu |
1421824 |
Long Lu |
STRUCT: Secure and Trustworthy Compartments in Mobile Applications |
118 |
Anna Lysyanskaya |
1422361 |
Anna Lysyanskaya |
Empowering Anonymity |
119 |
Kenneth Mai |
1441736 |
Ken Mai |
Combatting Integrated Circuit Counterfeiting Using Secure Chip Odometers |
120 |
Yiorgos Makris |
1514050 |
Yiorgos Makris |
Hardware Trojans in Wireless Networks: Risks & Remedies |
121 |
Hafiz Malik |
1440929 |
Hafiz Malik |
Model Driven Framework for Audio Forensics |
122 |
Zhuoqing Mao |
1318306, 1526455 |
Qi Alfred Chen |
MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era |
123 |
Zhuoqing Mao |
1318306, 1526455 |
Yuru Shao |
The Misuse of Android Unix Domain Sockets and Security Implications |
124 |
Stephen McCamant |
1526319 |
Stephen McCamant |
Quantitative Information Flow Measurement |
125 |
Hoda Mehrpouyan |
1657774 |
Hoda Mehrpouyan |
Privacy Management in Ubiquitous Environments |
126 |
Stephen Miller |
1526333 |
Stephen Miller |
Lattices, Modularity, and Crypto |
127 |
Jelena Mirkovic |
1319215 |
Jelena Mirkovic |
FRADE: Flash cRowd Attack DEfense |
128 |
Jelena Mirkovic |
1224035 |
Jelena Mirkovic |
Revitalizing Cyber-Security Education Through Competitions |
129 |
Alan Mislove |
1421444 |
Alan Mislove |
Towards Robust Crowd Computations |
130 |
Alan Mislove |
1563320 |
Alan Mislove |
Measuring and Improving the Management of Today's PKI |
131 |
John Mitchell |
1500089 |
Herb Lin |
Cybersecurity Education for Policy Makers |
132 |
Prateek Mittal |
1423139 |
Prateek Mittal |
Anonymity Against AS-level Adversaries |
133 |
Sibin Mohan |
1423334 |
Sibin Mohan |
Behavior-Based Zero-Day Intrusion Detection for Real-Time Cyber-Physical Systems |
134 |
Arjun Mukherjee |
1527364 |
Arjun Mukherjee |
Statistical Models for Opinion Spam Detection Leveraging Linguistic and Behavioral Cues |
135 |
Venkitasubramaniam Muthuramakrishnan |
1526377 |
Muthuramakrishnan Venkitasubramaniam |
Understanding the Complexity of Concurrent Security |
136 |
Brad Myers |
1423054 |
Brad Myers |
TWC: Small: Empirical Evaluation of the Usability and Security Implications of Application Programming Interface Design |
137 |
Hung Ngo |
1409551, 1409303 |
Varun Chandola |
Data is Social: Exploiting Data Relationships to Detect Insider Attacks |
138 |
Xuanlong Nguyen |
1409303 |
Xuanlong Nguyen |
Data is Social: Exploiting Data Relationships to Detect Insider Attacks |
139 |
Kobbi Nissim |
1565387, 1565365 |
Kobbi Nissim |
Computing over Distributed Sensitive Data |
140 |
Cristina Nita-Rotaru |
1654137 |
Cristina Nita-Rotaru |
Improving Protocol Vulnerability Discovery via Semantic Interpretation of Textual Specifications |
141 |
Adam O'Neill |
1650419 |
Adam O'Neill |
EAGER: Guaranteed-Secure and Searchable Genomic Data Repositories |
142 |
Sewoong Oh |
1527754 |
Sewoong Oh |
Fundamental limits of differential privacy |
143 |
Daniela Oliveira |
1464794 |
Daniela Oliveria |
Age-Related Vulnerabilities to Social-Engineering Attacks |
144 |
Xinming Ou |
1314925 |
Sathya Chandran Sundaramurthy |
Bringing Anthropology into Cybersecurity |
145 |
Charalampos Papamanthou |
1514261, 1526950 |
Charalampos Papamanthou |
IntegriDB: Verifiable SQL for Outsourced Databases |
146 |
Abhishek Parakh |
1623380 |
Abhishek Parakh |
EDU: QuaSim: A Virtual Interactive Quantum Cryptography Educator-A Project-based Gamified Educational Paradigm |
147 |
Sameer Patil |
1548779 |
Sameer Patil |
Privacy Compliance by Design |
148 |
Sameer Patil |
? |
? |
? |
149 |
Vern Paxson |
1518918, 1237265 |
Vern Paxson |
Towards a Science of Censorship Resistance |
150 |
Mathias Payer |
1464155 |
Mathias Payer |
Data Confidentiality and Integrity |
151 |
Roberto Perdisci |
1149051 |
Roberto Perdisci |
Reconstructing and investigating in-the-wild web-based malware downloads |
152 |
Vir Phoha |
1527795 |
Vir Phoha |
Spoof-resistant Authentication Through Phone and Wearables |
153 |
Jules Polonetsky |
1654085 |
Jules Polonetsky |
Privacy Research and Data Responsibility Research Coordination Network (RCN) |
154 |
Dmitry Ponomarev |
1422401 |
Dmitry Ponomarev |
Side Channels through Lower-Level Caches |
155 |
Zhiyun Qian |
1464410 |
Zhiyun Qian |
TCP Side Channels - Real Threats |
156 |
Emilee Rader |
1116544, 1115926 |
Emilee Rader |
Influencing Mental Models of Security |
157 |
Jeyavijayan Rajendran |
1618797 |
JV Rajendran |
Secure Split Manufacturing |
158 |
Zvonimir Rakamaric |
1527526 |
Zvonimir Rakamaric |
DEKER: DECOMPOSING OS KERNELS |
159 |
Baishakhi Ray |
1618771 |
Baishakhi Ray |
Automated Detection and Repair of Error Handling Bugs in SSL/TLS Implementations |
160 |
Aunshul Rege |
1453040 |
Aunshul Rege |
Understanding Adaptive Adversarial Behavior and Decision-Making Processes in Cyberattacks |
161 |
Michael Reiter |
1330599 |
Michael Reiter |
Rethinking Security in the Era of Cloud Computing |
162 |
Kui Ren |
1262277 |
Kui Ren |
CAREER: Secure and Privacy-assured Data Service Outsourcing in Cloud Computing |
163 |
Golden Richard |
1358723 |
Irfan Ahmed |
EAGER: Integrating Cognitive and Computer Science to Improve Cyber Security |
164 |
Daniela Rus |
1526815 |
Dan Feldman |
Enabling Secure and Private Cloud Computing using Coresets |
165 |
Norman Sadeh |
1330596 |
Norman Sadeh |
Usable Privacy Policy Project |
166 |
Norman Sadeh |
1513957 |
Norman Sadeh |
Towards Personalized Privacy Assistant: Understanding Privacy Decision Making and Behavioral Impact |
167 |
Ravi Sandhu |
1111925 |
Shouhuai Xu |
Security Metrics |
168 |
Ravi Sandhu |
1111925 |
Shouhuai Xu |
Cybersecurity Dynamics |
169 |
Lalitha Sankar |
1350914 |
Lalitha Sankar |
Privacy-Guaranteed Distributed Interactions in Critical Infrastructure Networks |
170 |
Fareena Saqib |
1566530 |
Fareena Saqib |
Hardware based Authentication and Trusted Platform Module functions (HAT) for IoTs |
171 |
Fareena Saqib |
1623299 |
Fareena Saqib |
HACE Lab: An Online Hardware Security Attack and Countermeasure Evaluation Lab |
172 |
Lori Scarlatos |
1623150 |
Laurin Buchanan |
Branching Interactive Graphic Stories for Cybersecurity Education |
173 |
Patrick Schaumont |
1441710 |
Patrick Schaumont |
FAME: Fault-attack aware Microprocessor |
174 |
Stephanie Schuckers |
1314792 |
Daqing Hou |
Long-term Active User Authentication Using Multi-modal Profiles |
175 |
David Schuster |
1553018 |
David Schuster |
Understanding Human Cognition in Computer Network Defense |
176 |
Kent Seamons |
1528022 |
Kent Seamons |
TrustBase |
177 |
Shamik Sengupta |
1528167 |
Shamik Sengupta |
Establishing market based mechanisms for CYBer security information EXchange (CYBEX) |
178 |
Amit Sheth |
1513721 |
Amit Sheth |
Context-Aware Harassment Detection on Social Media |
179 |
Yaoyun Shi |
1526928 |
Carl Miller |
A Quantum Approach to Hardware Security |
180 |
Akbar Siami Namin |
1347521 |
Akbar Siami Namin |
Sonifying Cyber-Security Cues |
181 |
Lisa Singh |
1223825 |
Lisa Singh |
Assessing Online Information Exposure Using Web Footprints |
182 |
Radu Sion |
1562376 |
Radu Sion |
CipherLocker: Encrypted Regulatory-Compliant Privacy-Enabled Drag and Drop Cloud Storage |
183 |
Radu Sion |
1526707 |
Radu Sion |
Practical Plausible Deniability for Storage Systems |
184 |
Meera Sridhar |
1566321 |
Meera Sridhar |
CRII: SaTC: A Language Based Approach to Hybrid Mobile App Security |
185 |
Kevin Steinmetz |
1616804 |
Kevin Steinmetz and Richard Goe |
Technological Con-Artistry |
186 |
Scott Stoller |
1421893 |
Scott Stoller |
Access Control Policy Mining and Management |
187 |
Cynthia Sturton |
1651276 |
Cynthia Sturton |
Identifying Security Critical Properties of a Processor |
188 |
Gookwon Suh |
1513797 |
G. Edward Suh |
TWC: Medium: Language-Hardware Co-Design for Practical and Verifiable Information Flow Control |
189 |
S. Shyam Sundar |
1450500 |
Dr. S. Shyam Sundar, Jinyoung Kim |
Why Do We Reveal or Withhold Private Information? Exploring Heuristics and Designing Interface Cues for Secure Computing |
190 |
Jakub Szefer |
1524680, 1526493 |
Jakub Szefer |
Practical and Scalable Security Verification of Security-Aware Hardware |
191 |
Mark Tehranipoor |
1561023 |
Domenic Forte |
Design of Low-Cost Memory-Based Security Primitives and Techniques for High-Volume Products |
192 |
Russell Tessier |
1318497 |
Russell Tessier |
New Directions in FPGA Security |
193 |
Michael Thomas |
1623267 |
Michael Thomas |
A Cybersecurity Collectable Card Game for Urban Youth |
194 |
Selcuk Uluagac |
1453647 |
Selcuk Uluagac |
Securing Sensory Side-Channels in Cyber-Physical Systems |
195 |
Salil Vadhan |
1237235 |
Salil Vadhan |
Privacy Tools for Sharing Research Data |
196 |
Jaideep Vaidya |
1422501 |
Jaideep Vaidya |
Privacy Preserving Outlier Detection |
197 |
Joe Valacich |
1615696 |
Joe Valacich |
Identifying Malicious Insiders through Mouse Cursor Movements |
198 |
Narseo Vallina-Rodriguez |
1564329 |
Narseo Vallina Rodriguez |
Lumen: Fine-Grained Visibility and Control of Mobile Traffic in User-Space |
199 |
Barbara van Schewick |
1330141 |
Norman Sadeh |
The Usable Privacy Policy Project |
200 |
Guru Prasadh Venkataramani |
1618786 |
Milos Doroslovacki |
Defending Against Hardware Covert Timing Channels |
201 |
Giovanni Vigna |
1408632 |
Giovanni Vigna |
TrustDroid |
202 |
Roopa Vishwanathan |
1566297 |
Roopa Vishwanathan |
CRII: SaTC: Automated Proof Construction and Verification for Attribute-based Cryptography |
203 |
Tam Vu |
1619392 |
Tam Vu |
Wearable Authentication Solutions for Ubiquitous and Personal |
204 |
Michael Walfish |
1514422 |
Michael Walfish |
Scaling proof-based verifiable computation |
205 |
Jingguo Wang |
1420758 |
Jingguo Wang |
Risk of Data Breaches in Financial Institutions: A Routine Activity Perspective |
206 |
Yang Wang |
1464347 |
Yang Wang |
Individualized Mental Model and Universal Privacy Dashboard |
207 |
Weichao Wang |
1523096 |
Weichao Wang |
Developing Security Education Materials for Future Advanced Manufacturing Engineering Workforce |
208 |
Weichao Wang |
1303356 |
Weichao Wang |
Integrated Learning Environment for Cyber Security of Smart Grid |
209 |
Wendy Hui Wang |
1350324 |
Wendy Hui Wang |
Verifiable Outsourcing of Data Mining Computations |
210 |
Steven Weber |
1228847 |
Steven Weber |
TTP: Medium Securing the Wireless Philadelphia Network |
211 |
Shuangqing Wei |
1320351 |
George T Amariucai |
Security in Dynamic Environments: |
212 |
Laurie Williams |
1318428 |
Laurie Williams |
Motivating and Reaching University Students and Professionals with Software Security Education |
213 |
Rebecca Wright |
1646856, 1646890 |
Rebecca Wright |
Anomaly Detection in Multilayer Networks |
214 |
Xintao Wu |
1523115, 1523154 |
Xintao Wu |
Enhancing Education in Genetic Privacy |
215 |
Dinghao Wu |
1223710 |
Dinghao Wu |
Reassembleable Disassembling |
216 |
Dinghao Wu |
1223710 |
Dinghao Wu |
Translingual Obfuscation |
217 |
Li Xiong |
1618932 |
Li Xiong |
Spatiotemporal Privacy for Location Based Applications |
218 |
Dianxiang Xu |
1522847 |
Samer Khamaiseh, Dianxiang Xu |
Software Artifact Repository |
219 |
Dianxiang Xu |
1359590 |
Samer Khamaiseh, Dianxiang Xu |
Automated Conformance Testing of Attribute-Based Access Control and Obligation Policies |
220 |
Dongyan Xu |
1409668, 1409534 |
Dongyan Xu |
Binary-Centric Forensic Analysis of Advanced Cyber Attacks Against Enterprise Environments |
221 |
Qiben Yan |
1566388 |
Qiben Yan |
Non-intrusive Detection of Mobile Malware and Botnets |
222 |
Shanchieh Yang |
1526383 |
Shanchieh Jay Yang |
Automating Attack Strategy Recognition to Enhance Cyber Threat Prediction |
223 |
Baijian Yang |
1500046 |
Baijian Yang |
Enhancing Cybersecurity Education Through a Representational Fluency Model |
224 |
Alec Yasinsac |
1636470 |
Rebecca Bace |
Cybersecurity Technology Transfer to Practice (TTP) |
225 |
Yanfang Ye |
1618629 |
Yanfang Ye |
Intelligent Malware Detection Utilizing Novel File Relation-Based Features and Resilient Techniques for Adversarial Attacks |
226 |
Vinod Yegneswaran |
1514503 |
Vinod Yegneswaran |
MALDIVES: Toward a Comprehensive Understanding of Malware Delivery Mechanisms |
227 |
Vinod Yegneswaran |
1314956 |
Vinod Yegneswaran |
HIMALAYAS |
228 |
Lei Ying |
1618768 |
Lei Ying |
TWC SBE: Small: Towards an Economic Foundation of Privacy-Preserving Data Analytics: Incentive Mechanisms and Fundamental Limits |
229 |
Shimeng Yu |
1615774 |
Shimeng Yu |
Design of RRAM based Hardware Security Primitives |
230 |
Meng Yu |
1422355, 1422594 |
Meng Yu |
Towards Agile and Privacy-Preserving Cloud Computing |
231 |
Alenka Zajic |
1318934 |
Milos Prvulovic |
Quantitative Analysis and Reporting of Electromagnetic Covert and Side Channel Vulnerabilities |
232 |
Kai Zeng |
1619073 |
Kai Zeng |
Secure Near Field Communications between Mobile Devices |
233 |
Mark Zhandry |
1616442 |
Mark Zhandry |
Encryptor Combiners |
234 |
Yinqian Zhang |
1566444 |
Yinqian Zhang |
Rethinking Side Channel Security on Untrusted OS |
235 |
Yanchao Zhang |
1421999, 1700032 |
Rui Zhang |
TWC: Small: Collaborative: Secure and Usable Mobile Authentication for People with Visual Impairment |
236 |
Yanchao Zhang |
1619251 |
Yanchao Zhang |
TWC: Small: Secure Mobile Devices through Multiple Lines of Defense |
237 |
Yilu Zhou |
1551004 |
Yilu Zhou |
Can You Trust Apps Age Recommendations-Inconsistent and Unreliable Maturity Ratings on Mobile Platforms |
238 |
Lina Zhou |
1527684 |
Lina Zhou |
What Online Reviewer Behaviors Really Matter? |
239 |
Sencun Zhu |
1618684 |
Sencun Zhu |
Reputation-Escalation-as-a-Service: Analyses and Defenses |