Project Highlight Slides

Visible to the public 

Lead PI First Name Lead PI Last Name NSF Project Award Number(s) Project Title
William Adams 1422078 Integrated Smart Grid Analytics for Anomaly Detection
Mustaque Ahamad 1514035 Exposing and Mitigating Cross-Channel Attacks
Mustaque Ahamad 1318167 Securing the New Converged Telephony Landscape
Irfan Ahmed 1500101 EAGER: Peer Instruction for Cybersecurity Education
Kemal Akkaya 1550313 Privacy-Preserving Data Collection and Access in 802.11s-based Smart Grid Applications
Ehab Al-Shaer 1352238 Adversary-aware Host Address Mutation
Laura Albert McLay 1422768 An optimization framework for prioritizing mitigations for securing information technology infrastructure
Theodore Allen 1409214 Data-Driven Cyber Vulnerability Maintenance
Ardalan Amiri Sani 1617513 Enhancing the Security and Performance of GPU Access in Web Browsers

Bonnie

Anderson 1422831 The Force of Habit: Using fMRI to Explain Users' Habituation to Security Warnings
Mohd Anwar 1318501 Improving Security Behavior of Employees in Cyberspace through Evidence-based Malware Reports and E-Learning Materials
Raul Aranovich 1445079 Risk detection in OSS teams with NLP
Reza Azarderakhsh 1661557 Post-quantum Cryptography
Michael Bachmann 1500077 Education Initiative TECH MeD: Transdisciplinary Education for Critical Hacks of Medical Devices
Saurabh Bagchi 1548114 Modeling Deception In Information Security As A Hypergame - A Primer
Boaz Barak 1618026 Complexity Assumptions for Cryptographic Schemes

Emery

Berger 1525888, 1525992 EVADE: EVidence-Assisted Detection and Elimination of Vulnerabilities
Daniel Bernstein 1314885, 1314592, 1314919, 1314540 Authenticated Ciphers
Bobby Bhattacharjee 1314857 TWC: Medium: Collaborative: DIORE: Digital Insertion and Observation Resistant Execution
Swarup Bhunia 1441667, 1603483 IPTrust: A Comprehensive Framework for IP Integrity Validation
Matt Bishop 1303048, 1303211 Development and Testing of a Secure Programming Clinic
Marina Blanton 1319090 Techniques and Tools for General-Purpose Secure Computing and Outsourcing
Matthieu Bloch 1527387 Towards Stealth Networks
Alexandra Boldyreva 1421815 A Unifying Framework For Theoretical and Empirical Analysis of Secure Communication Protocols
Travis Breaux 1330596 Privacy Policy Ambiguity and Privacy Risk
Michael Byrne 1550936 Protecting Election Integrity Via Automated Ballot Usability Evaluation
Kelly Caine 1513875 Studying Journalists to Identify Requirements for Usable, Secure, and Trustworthy Communication
Ran Canetti 1414119, 1413920, 1413964, 1413996 Modular Approach to Cloud Security
Justin Cappos 1223588 Lock-in-Pop Design: Only Access Popular Paths in the Kernel
Cornelia Caragea 1421970 Image Privacy Prediction Using Deep Features
Bogdan Carbunar 1527153, 1526254 TWC: Small: Collaborative: Cracking Down Online Deception Ecosystems
Bogdan Carbunar 1450619 EAGER: Digital Interventions for Reducing Social Networking Risks in Adolescents
Alvaro Cardenas 1553683 Limiting the Impact of Stealthy Attacks in Industrial Control Systems
David Cash 1453132 Cryptography for Secure Outsourcing
Shantanu Chakrabartty 1525476 Zero-Power Dynamic Signature for Trust Verification of Passive Sensors and Tags
John Chandy 1318964 EDU: A Virtual Lab for a Hardware Security Curriculum
Polo Chau 1526254 TWC: Small: Collaborative: Cracking Down Online Deception Ecosystems
Rui Chen 1554373, 1554480, 1651060 Response to OPM Data Breach
Hsinchun Chen 1314631 Identifying SCADA Devices and their Vulnerabilities on the IoT
Maggie Cheng 1537538 Factoring User Behavior into Network Security Analysis
Tim Cheng 1526695 Detection of Hardware Trojans Hidden in Unspecified Design Functionality
Jerry Cheng 1449958 Towards Understanding Smartphone User Privacy: Implication, Derivation, and Protection
David Choffnes 1618955 Enabling Practical Traffic Analysis Resistance
Stephen Chong 1524052 Extensible Access Control
with Authorization Contracts
Stephen Chong 1421770 Whip: Higher-Order Contracts for Modern Services
Stephen Chong 1054172 Automatic Enforcement of
Expressive Security Policies using Enclaves
David Cok 1314674 Library annotations and tools for checking software
Jedidiah Crandall 1420716 V-DIFT: Vector-Based Dynamic Information Flow Tracking
Harry Crane 1523785 Edge exchangeability: a new framework for network modeling
Dana Dachman-Soled 1453045 CAREER: Non-Black-Box Cryptography: Defending Against and Benefiting from Access to Code
Anton Dahbura 1544493 Modeling Security/Incentive Behaviors
Alberto Dainotti 1423659 HIJACKS: Detecting and Characterizing Internet Traffic Interception based on BGP Hijacking
Alberto Dainotti 1228994 Internet Outage Detection and Analysis
Anupam Datta 1423168 Accountability via Deviance and Causal Determination
Srini Devadas 1523572 Trapdoor Computational Fuzzy Extractors
Srini Devadas 1411208 TWC: Small: Ascend: Architecture for Secure Computation on Encrypted Data
Jintai Ding 1565748 Implementing Practical Provably Secure Authenticated Key Exchange for the Post-Quantum World
Roger Dingledine 1619454, 1619067 TTP: Defending Against Website Fingerprinting in Tor
Yevgeniy Dodis 1619158 Designing Secure Hash Functions and Block Ciphers
Adam Doupe 1623269 Educating the Security Workforce through On-Demand Live Competitions
Tudor Dumitras 1464163 Measuring Patching at Scale
April Edwards (Kontostathis) 1421896 SBE: Small: An Analysis of the Relationship Between Cyberaggression and Self-Disclosure among Diverse Youths
Sara Eftekharnejad 1600058 Securing Smart Power Grids under Data Measurement Cyber Threats
Thomas Eisenbarth 1618837 MIST: Systematic Analysis of Microarchitectural Information Leakage on Mobile Platforms
Kirsten Eisentraeger 1617802 Algorithms for number-theoretic problems in cryptography
Amr El Abbadi 1649469 EAGER: Towards a Better Understanding of Group Privacy in Social Media Community Detection
William Enck 1253346 CAREER: Secure OS Views for Modern Computing Platforms
Patrick Eugster 1421910 TWC: Small: Practical Assured Big Data Analysis in the Cloud
Patrick Eugster 1117065 TC: Small: Least Privilege Enforcement through Secure Memory Views
Daniel Fabbri 1526014 TWC: Small: Analysis and Tools for Auditing Insider Accesses
Michalis Faloutsos 1314632, 1314603, 1314935 CoreScope
Fariborz Farahmand 1544090 A Mathematical Model of Privacy Decisions: A Behavioral Economic Perspective
Nick Feamster 1540066 Facilitating Free and Open Access to Information on the Internet
Yunsi Fei 1563697 TWC: Medium: Automating Countermeasures and Security Evaluation against Software Side-channel Attacks
Yunsi Fei 1314655 Medium: A Unified Statistics-based Framework for Analysis and Evaluation of Side-channel Attacks in Cryptosystems

Wu-chang

Feng 1623400 EDU: A Capture-the-Flag Service for Computer Security Courses
Michael Franz 1513837 ENCORE: ENhanced program protection through COmpiler-REwriter cooperation
Rosanne Gamble 1619690, 1619641 Toward a Test Bed for Heavy Vehicle
Cyber Security Experimentation
Vinod Ganapathy 1441724 SaTC: Hardware-Assisted Methods for Operating System Integrity
Vinod Ganapathy 1420815 TWC: Small: Self-Service Cloud Computing
Sanjam Garg 1464397 CRII: SaTC: Expanding the Frontiers of Cryptographic Technologies
Paolo Gasti 1619023 Energy-Efficient Privacy-Preserving Active Authentication of Smartphone Users
Ryan Gerdes 1410000 Secure and Resilient Vehicular Platooning
Gabriel Ghinita 1523101 Capacity Building in Security, Privacy and Trust for Geospatial Applications
Grandon Gill 1418711 Cybersecurity Discussion Cases
Michael Goodrich 1228639, 1228598, 1228485 Privacy-Preserving Distributed Storage and Computation
Samuel Gordon 1564088 TWC: Medium: Collaborative: New Protocols and Systems for RAM-Based Secure Computation
Venu Govindaraju 1314803 Long-term Active User Authentication Using Multi-modal Profiles
Noel Greis 1319045 TWC SBE: Option: Small: Building Public Cyber Health - Designing and Testing the Efficacy of a School-Focused, Gamification Approach to Create a Secure Computing Environment
Yong Guan 1527579 Time-Advantage-Based Key Establishment
for Low-Cost Wireless Systems
Mina Guirguis 1149397 Securing Mobile CPS against Stealthy Attacks

Abhishek

Gupta 1565487 CRII: CPS & SaTC: Securing Smart Cyberphysical Systems against Man-in-the-Middle Attacks
Andreas Haeberlen 1065130 Secure Network Provenance
John Hale 1524940 Scalable Hybrid Attack Graph Modeling and Analysis
Michael Hay 1409125, 1409143, 1408982 Pythia: Algorithm Selection for Differential Privacy
Haibo He 1117314 Secure the Electrical Power Grid: Smart Grid versus Smart Attacks
Xiali Hei 1566166 CPS security for insulin pumps
Jeffrey Hoffstein 1561709 Development and Evaluation of Next Generation Homomorphic Encryption Schemes
Daniel Holcomb 1619558 STARSS: Small: SecureDust -- The Physical Limits of Information Security
Yuan Hong 1618221 Privacy Preserving Cooperation among Microgrids for Efficient Load Management
Jason Hong 1347186 Social Cybersecurity
Jason Hong 1228813 PrivacyGrade.org Grading the Privacy of Smartphone Apps
Nicholas Hopper 1314637 TWC: Option: Medium: Measurement-Based Design and Analysis of Censorship Circumvention Schemes
Mark Horowitz 1563113 PRISM: Platform for Rapid Investigation of efficient Scientific-computing & Machine-learning
Amir Houmansadr 1553301 CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content
Amir Houmansadr 1525642 TWC: Small: Linking the Unlinkable: Design, Analysis, and Implementation of Network Flow Fingerprints for Fine-grained Traffic Analysis
Hongxin Hu 1537924 Defending Against Visual Cyberbullying Attacks in Emerging Mobile Social Networks
Fei Hu 1315328 Cyber-physical System and Big Data Security: Training National Warriors
Dijiang Huang 1528099, 1523994, 1526299 SRN: Secure and Resilient Networking

Florence

Hudson 1650445 EAGER: Cybersecurity Transition To Practice (TTP) Acceleration
Warren Hunt 1525472 Formal Analysis of x86 Machine-Code Programs
Trent Jaeger 1408880 Retrofitting Software for Defense-in-Depth
Matthew Jensen 1421580 Building the Human Firewall
Niraj Jha 1617628 TWC: Small: Physiological Information Leakage: A New Front on Health Information Security
Limin Jia 1320470 Provably Enforcing Practical Multi-Layer Policies in Today's Extensible Software Platforms
Zhanpeng Jin 1564046, 1564104 Exploring Vulnerabilities of Brain Biometrics
Zhanpeng Jin 1422417, 1423061 Brainprint: A Psychophysiological Biometric
Yier Jin 1319105, 1318860 Toward Trusted 3rd-Party Microprocessor Cores: A Proof Carrying Code Approach
Mark Jones 1422979 Using a Capability-Enhanced Microkernel as a Testbed for Language-based Security
David Kaeli 1618379 STARSS: Small: Side-Channel Analysis and Resiliency Targeting Accelerators
Gai Kaiser 1563555 TWC: Medium: Toward Trustworthy Mutable Replay for Security Patches
Faisal Kaleem 1500055 CFEAR: Cyber Forensics Education via Augmented Reality
Burak Kantarci 1464273 Context-Aware Incentives for Trustworthy Crowdsensing via Mobile Social Networks
Apu Kapadia 1408730, 1407788 A Socio-Technical Approach to Privacy in a Camera-Rich World
Jonathan Katz 1111599 TC: Large: Collaborative Research: Practical Secure Two-Party Computation: Techniques, Tools, and Applications
Eric Keller 1406192, 1406225, 1406177 Switch-level Network Security With The OpenFlow Extension Framework (OFX)
Oliver Kennedy 1409551, 1409303 Data is Social: Exploiting Data Relationships to Detect Insider Attacks
Mohammad Khan 1343766 The Role of Emotion in Risk Communication and Warning: Application to Risks of Failures to Update Software
Daniel Kifer 1228669 WC SBES: Medium: Utility for Private Data Sharing in Social Science
Taesoo Kim 1563848 Secure Design of SGX Enclaves
Jonathan Kimball 1505610, 1505633 Secure Algorithms for Cyber-Physical Systems
Matthias Kirchner 1464275 Camera-based Mobile Device Authentication
Andrew Klapper 1420227 TWC: Small: Design and Analysis of Symmetric Key Ciphers
Joerg Kliewer 1526547 Communication under Adversarial Attacks in Complex Networks
Alfred Kobsa 1640664 EAGER: Collaborative: PRICE: Using process tracing to improve household IoT users' privacy decisions
Alfred Kobsa 1544373 The Effect of Sensory Stimuli on the Performance of Security-Critical Tasks
Alfred Kobsa 142362 Cross-Cultural Privacy Prediction
Tadayoshi Kohno 1565252 TWC: Large: Collaborative: Living in the Internet of Things
Oleg Komogortsev 1250718 CAREER: Secure and Trustworthy Ocular Biometrics
Chakraborty Koushik 1421068 Mitigating the Threat of a Malicious Network-on-Chip
Onur Koyluoglu 1617335 Coding-based Mechanisms for Building Secure Cloud Storage Systems
Shriram Krishnamurthi 1449236 EAGER: By the People, For the People: Community Ratings for App Privacy
Ram Krishnan 1553696 CAREER: Group-Centric Secure Information Sharing - Models, Properties, and Implementation
Ram Krishnan 1423481 TWC: Small: Attribute Based Access Control for Cloud Infrastructure as a Service
Stephane Lafortune 1421122 Intrusion Detection and Resilience Against Attacks in Cyber and Cyber-Physical Control Systems
Cedric Langbort 1619339 Strategic information transmission in cyber-socio-physical systems - from threat to boon
Robert LaRose 1318885 Online Safety for the Ages
Lucas Layman 1619084 Pocket Security:
Smartphone Cybercrime in the Wild
Kyumin Lee 1553035 Tracking, Revealing and Detecting Crowdsourced Manipulation
Gwendolyn Lee 1537528 Understanding the Strategic Values of Privacy Practices in Organizations
Ruby Lee 1526493 STARSS: Small: Collaborative: Practical and Scalable Security Verification of Security-Aware Hardware Architectures
Insup Lee 1505799 Security and Privacy-Aware Cyber-Physical Systems
Wenke Lee 1409635 EPICA

David

Levin 1564143 Key Sharing in the HTTPS Ecosystem
Jun Li 1564348, 1564250, 1564039 Online Social Network Fraud and Attack Research and Identification
Ninghui Li 1640374 Bridging The Gap between Theory and Practice in Data Privacy
Zhenhui Li 1544455 Toward Transparency in Public Policy via Privacy Enhanced Social Flow Analysis with Applications to Ecological Networks and Crim
Feifei Li 1514520 TWC: Medium: Collaborative: Seal: Secure Engine for AnaLytics - From Secure Similarity Search to Secure Data Analytics
Kang LI 1318881 EDU: Enhancing and Broadening Computer Security Education with Stepwise and Reusable Problem-solving Challenges
Ninghui Li 1314688 TWC SBE: Medium: Collaborative: User-Centric Risk Communication and Control on Mobile Devices
Katrina Ligett 1254169 CAREER: The Value of Privacy
Dan Lin 1651455, 1651166 iPrivacy: Automatic Recommendation of Personalized Privacy Settings for Image Sharing
Zhiqiang Lin 1623276 Using Virtual Machine Introspection for Deep Cybersecurity Education
Huijia Lin 1528178 TWC: Small: Oblivious Cloud Storage Systems, from Theory to Practice --- Simpler, More Efficient, More Robust
Janne Lindqvist 1228777 TWC: Medium: Collaborative: Capturing People's Expectations of Privacy with Mobile Apps by Combining Automated Scanning and Crowdsourcing Techniques
Heather Lipford 1500052 A Body of Knowledge for Usable Security and Privacy Education
Heather Lipford 1318854 Discovering Software Vulnerabilities through Interactive Static Analysis
Peng Liu 1422215, 1422206 Privacy Protection in Social Networks: Bridging the Gap Between User Perception and Privacy Enforcement
Yao Liu 1553304 A Pathway towards Channel Camouflage and Manipulation Techniques for Wireless Security
Yao Liu 1527144 TWC: Small: Techniques and Tools for Enforcing Proximity-based Policies in Wireless Systems
Alex Liu 1524698 Multipath TCP Side Channel Vulnerabilities and Defenses
Peng Liu 1422594 Towards Agile and Privacy Preserving Cloud Computing
Mingyan Liu 1422211 TWC: Small: Understanding Network Level Malicious Activities: Classification, Community Detection and Inference of Security Interdependence
Vinod Lohani 1623047 Development and Analysis of a Spiral Theory-based Cybersecurity Curriculum
Songwu Lu 1528122 Cellular Network Services in Peril: A Perspective on Control-Plane and Data-Plane Design
Songwu Lu 1422835 Secure Data Charging Architecture for Mobile Devices in 3G/4G Cellular Networks: Vulnerabilities and Solutions
Long Lu 1421824 STRUCT: Secure and Trustworthy Compartments in Mobile Applications
Roman Lysecky 1615890 TWC: Small: Time-Centric Modeling of Correct Behaviors for Efficient Non-intrusive Runtime Detection of Unauthorized System Actions
Anna Lysyanskaya 1422361 Empowering Anonymity
Mohamed Mahmoud 1619250 Multi-Layer Approaches for Securing Enhanced AMI Networks against Traffic Analysis Attacks
Hemanta Maji 1618822 TWC: Small: General and Modular Secure Computation in the Offline-Online Paradigm
Hemanta Maji 1566499 CRII: SaTC: Computational Correlations: A New Tool for Cryptography
Yiorgos Makris 1514050 Hardware Trojans in Wireless Networks: Risks & Remedies
Zhuoqing Mao 1318306, 1526455 MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era
Stephen McCamant 1526319 Quantitative Information Flow Measurement
Jay McCarthy 1617307 Automated Protocol Design and Refinement
Hoda Mehrpouyan 1657774 Privacy Management in Ubiquitous Environments
Stephen Miller 1526663 Lattices, modularity, and crypto
Jelena Mirkovic 1319215 FRADE: Flash cRowd Attack DEfense
Jelena Mirkovic 1224035 Revitalizing Cyber-Security Education Through Competitions
Alan Mislove 1563320 Measuring and Improving the Management of Today's PKI
Alan Mislove 1421444 Towards Robust Crowd Computations
John Mitchell 1500089 Cybersecurity Education for Policy Makers
Prateek Mittal 1423139 Anonymity Against AS-level Adversaries
Sibin Mohan 1423334

Behavior-Based Zero-Day Intrusion Detection for Real-time Cyber-Physical Systems

Arjun Mukherjee 1527364 Statistical Models for Opinion Spam Detection Leveraging Linguistic and Behavioral Cues
Venkitasubramaniam Muthuramakrishnan 1526377 Understanding the Complexity of Concurrent Security
Brad Myers 1423054 TWC: Small: Empirical Evaluation of the Usability and Security Implications of Application Programming Interface Design
Arvind Narayanan 1526353 Online tracking: Threat Detection, Measurement and Response

David

Naumann 1228930 TWC: Medium: Collaborative: Flexible and Practical Information Flow Assurance for Mobile Apps
Nick Nikiforakis 1617593 TWC: Small: Emerging Attacks Against the Mobile Web and Novel Proxy Technologies for Their Containment
Nick Nikiforakis 1527086 TWC: Small: Cross-application and Cross-platform Tracking of Web Users: Techniques and Countermeasures
Kobbi Nissim 1565387, 1565365 Computing over Distributed Sensitive Data
Cristina Nita-Rotaru 1654137 Improving Protocol Vulnerability Discovery via Semantic Interpretation of Textual Specifications
Guevara Noubir 1409453, 1409053 TWC: Medium: Collaborative: Strengthening Wi-Fi Network Wide
Sewoong Oh 1527754 Fundamental limits of differential privacy
Daniela Oliveira 1513055 TWC: Medium: Collaborative: Developer Crowdsourcing: Capturing, Understanding, and Addressing Security-related Blind Spots in APIs
Daniela Olivera 1464794 Age-Related Vulnerabilities to Social-Engineering Attacks
Michael Orshansky 1527888 STARSS: Small: Simulation-Based Verification of EM Side-Channel Attack Resilience of Embedded Cryptographic Systems
Michael Orshansky 1441484 SaTC: STARSS: Hardware Authentication through High-Capacity PUF-Based Secret Key Generation and Lattice Coding
Rafail Ostrovsky 1619348 Cryptography and Communication Complexity
Xinming Ou 1314925 Bringing Anthropology into Cybersecurity
Charalampos Papamanthou 1526631, 1526950, 1525044 Applications of Data Structures to Security Problems
Charalampos Papamanthou 1514261, 1526950 IntegriDB: Verifiable SQL for Outsourced Databases
Abhishek Parakh 1623380 EDU: QuaSim: A Virtual Interactive Quantum Cryptography Educator-A Project-based Gamified Educational Paradigm
Keshab Parhi 1441639 SaTC: STARSS: Design of Secure and Anti-Counterfeit Integrated Circuits
Sameer Patil 1548779 Privacy Compliance by Design
Vern Paxson 1518918,

1518523, 1602399, 1518845

Towards a Science of Censorship Resistance
Mathias Payer 1464155 Data Confidentiality and Integrity
Chunyi Peng 1527613 Cellular Network Services in Peril: A Perspective on Control-Plane and Data-Plane Design
Chunyi Peng 1421933 Secure Data Charging Architecture for Mobile Devices in 3G/4G Cellular Networks: Vulnerabilities and Solutions
Roberto Perdisci 1149051 Reconstructing and investigating in-the-wild web-based malware downloads
Michael Petullo 1464121 CRII: SaTC: Next-Generation Robust Software
Vir Phoha 1527795 Spoof-resistant Authentication Through Phone and Wearables
Benjamin Pierce 1513854 TWC: Medium: Micro-Policies: A Framework for Tag-Based Security Monitors
Jules Polonetsky 1654085 Privacy Research and Data Responsibility Research Coordination Network (RCN)
Michalis Polychronakis 1617902 TWC: Small: Combating Environment-aware Malware
Dmitry Ponomarev 1422401 TWC: Small: Side Channels through Lower-Level Caches: Attacks, Defenses and Security Metrics
Atul Prakash 1318722 TWC: Small: Discovering and Restricting Undesirable Information Flows Between Multiple Spheres of Activities
Zhiyun Qian 1464410 TCP Side Channels - Real Threats
Emilee Rader 1116544, 1115926 Influencing Mental Models of Security
Emilee Rader 1524296 TWC: Small: Designing a Coordination Mechanism for Managing Privacy as a Common-Pool Resource
Jeyavijayan Rajendran 1618797 Secure Split Manufacturing
Zvonimir Rakamaric 1527526 DEKER: DECOMPOSING OS KERNELS
Samuel Ransbotham 1350061 Using Analytics on Security Data to Understand Negative Innovations
Raghav Rao 1651475 An Investigation of the Propagation of Error-Resistant and
Error-Prone Messages Over Large-Scale Information Networks
Alexander Rasin 1656268 TTP: Small: A Kit for Exploring Databases under the Hood for Security, Forensics and Data Recovery
Indrakshi Ray 1619641 Toward a Test Bed for Heavy Vehicle Cyber Security Experimentation
Aunshul Rege 1453040 Understanding Adaptive Adversarial Behavior and Decision-Making Processes in Cyberattacks
Michael Reiter 1330599, 1330308,

1330659

Rethinking Security in the Era of Cloud Computing
Kui Ren 1262277 CAREER: Secure and Privacy-assured Data Service Outsourcing in Cloud Computing
Leonid Reyzin 1422965 TWC: Small: Noisy Secrets as Alternatives to Passwords and PKI
Golden Richard 1358723 EAGER: Integrating Cognitive and Computer Science to Improve Cyber Security
Franziska Roesner 1463968 CRII: SaTC: Improving Computer Security Technologies through Analyzing Security Needs and Practices of Journalists
Franziska Roesner 1513575 TWC: Medium: Collaborative: Studying Journalists to Identify Requirements for Usable, Secure, and Trustworthy Communication
Phillip Rogaway 1228828 Deconstructing Encryption
Keith Ross 1318659 Protecting the Online Privacy of Users of Social Networks
Norman Sadeh 1513957 Towards Personalized Privacy Assistant: Understanding Privacy Decision Making and Behavioral Impact
Amit Sahai 1413955, 1414000, 1414023, 1414082 CEF: Center for Encrypted Functionalities

Ravinderpal

Sandhu 1111925 Security Metrics
Lalitha Sankar 1350914 CAREER: Privacy-Guaranteed Distributed Interactions in Critical Infrastructure Networks
Fareena Saqib 1623299 HACE Lab: An Online Hardware Security Attack and Countermeasure Evaluation Lab
Fareena Saqib 1566530 Hardware based Authentication and Trusted Platform Module functions (HAT) for IoTs
Anand Sarwate 1617849 TWC: Small: PERMIT: Privacy-Enabled Resource Management for IoT Networks
Ioannis Savidis 1648878 On-Chip Real-Time Hardware Trojan Detection
Lori Scarlatos 1623150 Branching Interactive Graphic Stories for Cybersecurity Education
Patrick Schaumont 1441710 FAME: Fault-attack aware Microprocessor
Stephanie Schuckers 1314792 Long-term Active User Authentication Using Multi-modal Profiles

David

Schuster 1553018 Understanding Human Cognition in Computer Network Defense
Kent Seamons 1528022 TrustBase
Vyas Sekar 1564009 TWC: Medium: Handling a Trillion Unfixable Flaws on Billions of Internet-of-Things
Ramasubramanian Sekar 1319137 TWC: Small: A platform for enhancing security of binary code
Shamik Sengupta 1528167 Establishing market based mechanisms for CYBer security information EXchange (CYBEX)
Sanjit Seshia 1528108 STARSS: Small: Collaborative: Specification and Verification for Secure Hardware
Micah Sherr 1527401 TWC: TTP Option: Small: Collaborative: Enhancing Anonymity Network Resilience against Pervasive Internet Attacks
Micah Sherr 1149832 CAREER: Private Communication in Strongly Adversarial Networks
Amit Sheth 1513721 Context-Aware Harassment Detection on Social Media
Yaoyun Shi 1526928 A Quantum Approach to Hardware Security
Akbar Siami Namin 1347521 Sonifying Cyber-Security Cues
Lisa Singh 1223825 Assessing Online Information Exposure
Using Web Footprints
Radu Sion 1562376 CipherLocker: Encrypted Regulatory-Compliant Privacy-Enabled Drag and Drop Cloud Storage
Radu Sion 1526707 Practical Plausible Deniability for Storage Systems
Adam Slagell 1314891 Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids
Jonathan Smith 1513687 HARDWARE-ASSISTED LIGHTWEIGHT CAPABILITY OPTIMIZATION (HALCYON)
Meera Sridhar 1566321 CRII: SaTC: A Language Based Approach to Hybrid Mobile App Security
Matthew Stamm 1553610 CAREER: Scaling Forensic Algorithms for Big Data and Adversarial Environments
Kevin Steinmetz 1616804 Technological Con-Artistry
Scott Stoller 1421893 Access Control Policy Mining and Management
Cynthia Sturton 1651276 Identifying Security Critical Properties of a Processor
Cynthia Sturton 1464209 CRII: SaTC: Detecting Security Vulnerabilities in Instruction Set Architectures
Gookwon Suh 1513797 TWC: Medium: Language-Hardware Co-Design for Practical and Verifiable Information Flow Control
S. Shyam Sundar 1450500 Why Do We Reveal or Withhold Private Information? Exploring Heuristics and Designing Interface Cues for Secure Computing
Jakub Szefer 1524680, 1526493 Practical and Scalable Security Verification of Security-Aware Hardware Architectures
Patrick Tague 1149582 CAREER: Inference-Based Adaptation Techniques for Next Generation Jamming and Anti-Jamming Capabilities
Gang Tan 1624126 TWC: Medium: Collaborative: Retrofitting Software for Defense-in-Depth
Gang Tan 1624124 CAREER: User-Space Protection Domains for Compositional Information Security
Chiu Tan 1618398 TWC: Small: Evidence of Presence for Intelligent Vehicles using Environment-Based Security
Mark Tehranipoor 1561023 Design of Low-Cost Memory-Based Security Primitives and Techniques for High-Volume Products
Stefano Tessaro 1553758 CAREER: The Theoretical Foundations of Symmetric Cryptography
Stefano Tessaro 1423566 TWC: Small: Better Security for Efficient Secret-Key Cryptography
Russell Tessier 1318497 New Directions in FPGA Security
Michael Thomas 1623267 A Cybersecurity Collectable Card Game for Urban Youth
Donald Towsley 1564067 Limits and Algorithms for Covert Communications
Donald Truxillo 1544535 Exploring Job Applicant Privacy Concerns
Salil Vadhan 1237235 Privacy Tools for Sharing Research Data
Jaideep Vaidya 1422501 Privacy Preserving Outlier Detection
Joe Valacich 1615696 Identifying Malicious Insiders through Mouse Cursor Movements
Narseo Vallina-Rodriguez 1564329 Lumen: Fine-Grained Visibility and Control of Mobile Traffic in User-Space
Marten van Dijk 1617774 Self-Recovering Certificate Authorities using Backward and Forward Secure Key Management
Nico van Eijk and Daniel Weitzner 1639994 Transparency Bridges: Exploring Transparency Requirements in Smartphone Ecosystems
Barbara van Schewick 1330141, 1330596, 1330214 The Usable Privacy Policy Project
Eugene Vasserman 1224007, 1253930 TWC TTP: Small: Security, Privacy, and Trust for Systems of Coordinating Medical Devices
Guru Venkataramani 1618786 STARSS: Small: Defending Against Hardware Covert Timing Channels
Giovanni Vigna 1408632 TrustDroid
Roopa Vishwanathan 1566297 CRII: SaTC: Automated Proof Construction and Verification for Attribute-based Cryptography
David Voorhees 1500033 SaTC-EDU: EAGER: INCUBATE - INjecting and assessing Cybersecurity edUcation with little internal suBject mATter Expertise
Michael Walfish 1514422 TWC: Medium: Scaling proof-based verifiable computation

Kuang-Ching

Wang 1643020 EAGER: Towards a Traffic Analysis Resistant Internet Architecture
Ting Wang 1566526 CRII: SaTC: Re-Envisioning Contextual Services and Mobile Privacy in the Era of Deep Learning
Weichao Wang 1523096 Developing Security Education Materials for Future Advanced Manufacturing Engineering Workforce
Yang Wang 1464347 Individualized Mental Model and Universal Privacy Dashboard
Zhi Wang 1453020 CAREER: Towards Trustworthy Operating Systems
Jingguo Wang 1420758 Risk of Data Breaches in Financial Institutions: A Routine Activity Perspective
Weichao Wang 1303356 Integrated Learning Environment for Cyber Security of Smart Grid

Wendy Hui

Wang 1350324 Verifiable Outsourcing of Data Mining Computations
Steven Weber 1228847 TTP: Medium Securing the Wireless Philadelphia Network
Hoeteck Wee 1445424 SaTC: Small: New Challenges in Functional Encryption
Shuangqing Wei 1320351 Security in Dynamic Environments:
Harvesting Network Randomness and Diversity
Ning Weng 1623353, 1623247, 1623268, 1623277 EDU: Collaborative: Integrating Embedded Systems Security into Computer Engineering and Science Curricula

Laurie

Williams 1318428 Motivating and Reaching University Students and Professionals with Software Security Education
Tilman Wolf 1617458 TWC: Small: Hardware Security for Embedded Computing Systems
Rebecca Wright 1646856, 1646890 Anomaly Detection in Multilayer Networks
Xintao Wu 1523115, 1523154 Enhancing Education in Genetic Privacy
Dinghao Wu 1223710 Translingual Obfuscation
Tao Xie 1513939, 1513690 TWC: Medium: Collaborative: Improving Mobile-Application Security via Text Analytics
Kaiqi Xiong 1620862 EAGER: Collaborative: Computational Cognitive Modeling of User Security and Incentive Behaviors
Li Xiong 1618932 Spatiotemporal Privacy for Location Based Applications
Dongyan Xu 1409668, 1409534 Binary-Centric Forensic Analysis of Advanced Cyber Attacks Against Enterprise Environments
Dianxiang Xu 1522847 Software Artifact Repository
Dianxiang Xu 1359590 Automated Conformance Testing of Attribute-Based Access Control and Obligation Policies
Guanhua Yan 1618631 TWC: Small: A Moving Target Approach to Enhancing Machine Learning-Based Malware Defense
Qiben Yan 1566388 Non-intrusive Detection of Mobile Malware and Botnets
Junfeng Yang 1564055, 1563843 TWC: Medium: Collaborative: Efficient Repair of Learning Systems via Machine Unlearning
Shanchieh Yang 1526383 Automating Attack Strategy Recognition to Enhance Cyber Threat Prediction
Baijian Yang 1500046 Enhancing Cybersecurity Education Through a Representational Fluency Model
Alec Yasinsac 1636470 Cybersecurity Technology Transfer to Practice (TTP)
Yanfang Ye 1618629 Intelligent Malware Detection Utilizing Novel File Relation-Based Features and Resilient Techniques for Adversarial Attacks
Vinod Yegneswaran 1514503 MALDIVES: Toward a Comprehensive Understanding of Malware Delivery Mechanisms
Vinod Yegneswaran 1314956 HIMALAYAS
Lei Ying 1618768 TWC SBE: Small: Towards an Economic Foundation of Privacy-Preserving Data Analytics: Incentive Mechanisms and Fundamental Limits
Meng Yu 1422355, 1422594 Towards Agile and Privacy-Preserving Cloud Computing
Shimeng Yu 1615774 Design of RRAM based Hardware Security Primitives
Alenka Zajic 1318934 Quantitative Analysis and Reporting of Electromagnetic Covert and Side Channel Vulnerabilities
Kai Zeng 1619073 Secure Near Field Communications between Mobile Devices
Mark Zhandry 1616442 Encryptor Combiners
Yanchao Zhang 1421999, 1700032 TWC: Small: Collaborative: Secure and Usable Mobile Authentication for People with Visual Impairment
Yanchao Zhang 1700032 TWC: Small: Collaborative: Secure and Usable Mobile Authentication for People with Visual Impairment
Yanchao Zhang 1619251 TWC: Small: Secure Mobile Devices through Multiple Lines of Defense
Zhiru Zhang 1618275 STARSS: Small: Automatic Synthesis of Verifiably Secure Hardware Accelerators
Yinqian Zhang 1566444 Rethinking Side Channel Security on Untrusted OS

Gang

Zhou 1618300 Energy-Efficient Privacy-Preserving
Active Authentication of Smartphone Users
Yilu Zhou 1551004 Can You Trust Apps Age Recommendations? Inconsistent and Unreliable Maturity Ratings on Mobile Platforms
Lina Zhou 1527684 What Online Reviewer Behaviors Really Matter?
Sencun Zhu 1618684 Reputation-Escalation-as-a-Service: Analyses and Defenses