1 |
Nael Abu-Ghazaleh |
Practical Hardware-Assisted Always-On Malware Detection |
1619322, 1617915 |
2 |
Navid Asadi |
PHIKS - PHysical Inspection and attacKs on electronicS |
1821780 |
3 |
Kiran Balagani |
Leveraging Movement, Posture, and Anthropometric Contexts to Strengthen the Security of Mobile Biometrics |
1814846 |
4 |
Rajeev Balasubramonian |
Efficient Hardware-Aware and Hardware-Enabled Algorithms for Secure In-Memory Databases |
1718834 |
5 |
Alexandru Bardas |
Creating and Managing Structurally-Morphing IT Systems - Moving Targets |
1850406 |
6 |
Alexandru Bardas |
A Sociotechnical Metrics Framework for Network and Security Operation Centers |
1915824, 1915822 |
7 |
Lujo Bauer |
Better defenses through adversarial learning |
1801391, 1801494 |
8 |
Terry Benzel |
Sharing Expertise and Artifacts for Reuse through Cybersecurity Community Hub (SEARCCH) |
1925773 |
9 |
Nicola Bezzo |
Online Malicious Intent Inference for Safe CPS Operations under Cyber-attacks |
1816591 |
10 |
Antonio Bianchi |
Vetting and Improving the Usage of Trusted Execution Environments for Authentication in Mobile Devices |
1949632 |
11 |
Jean-Francois Biasse |
Algebraic Methods for the Computation of Approximate Short Vectors in Ideal Lattices |
1846166 |
12 |
Jean-Francois Biasse |
Quantum-Safe Cryptosystems Based on Isogenies |
1839805 |
13 |
Matthieu Bloch |
Towards Stealth Networks Fundamental Limits and Algorithms for Stealth Communications |
1527387 |
14 |
Laurin Buchanan |
CyberMiSTS: Curriculum to Broaden Participation in Cybersecurity for Middle School Teachers and Students |
1821757 |
15 |
Kevin Butler |
Domain Informed Techniques for Detecting and Defending Against Malicious Firmware |
1815883 |
16 |
L Jean Camp |
Understanding Socio-Technical Failure Modes in Public Key Infrastructures |
1814518 |
17 |
L Jean Camp |
Living in the Internet of Things |
1565252 |
18 |
Yinzhi Cao |
Preventing Web Side-channel Attacks via Atomic Determinism |
1854001 |
19 |
Justin Cappos |
in-toto: Securing the Software Supply Chain |
1801430 |
20 |
Alvaro Cardenas |
Practical Control Engineering Principles to Improve the Security and Privacy of Cyber-Physical Systems |
1931573 |
21 |
David Chan-Tin |
Personalized Cybersecurity Education and Training |
1919004 |
22 |
Sriram Chellappan |
A Privacy-preserving Meta-data Analysis Framework for Cyber Abuse Research - Foundations, Tools and Algorithms |
1718071 |
23 |
Bo Chen |
Enabling Secure Data Recovery for Mobile Devices against Malicious Attacks |
1938130 |
24 |
Hsinchun Chen |
Cybersecurity Big Data Research for Hacker Community: A Topic and Language Modeling Approach |
1936370 |
25 |
Qi Chen |
Automated Security Analysis of Software-based Control in Emerging Smart Transportation Under Sensor Attacks |
1850533 |
26 |
Yingying Chen |
Exploiting Physical Properties in Wireless Networks for Implicit Authentication |
1717356 |
27 |
Stephen Chong |
Computing Over Distributed Sensitive Data |
1565387 |
28 |
Nicolas Christin |
Toward Fully Automated Data-Driven Analysis of Web Censorship |
1814817 |
29 |
Laura Dabbish |
Social Cybersecurity: Applying Social Influence to Improve Cybersecurity |
1704087 |
30 |
Kapil Dandekar |
Software Defined Radio Framework for Cybersecurity and Information Assurance Education |
1723606 |
31 |
Anupam Das |
Analyzing Information Leak in Smart Homes |
1849997 |
32 |
Azadeh Davoodi |
Analysis of Security and Countermeasures for Split Manufacturing of Integrated Circuits |
1812600 |
33 |
Sara Eftekharnejad |
Securing Smart Power Grids under Data Measurement Cyber Threats |
1600058 |
34 |
Fariborz Farahmand |
Neurobiological Basis of Decision Making in Online Environments |
1358651 |
35 |
Yunsi Fei |
Automating Countermeasures and Security Evaluation against Software Side-channel Attacks |
1563697 |
36 |
Yunsi Fei |
Protecting Confidentiality and Integrity of Deep Neural Networks against Side-channel and Fault Attacks |
1929300 |
37 |
Joan Feigenbaum |
Hiding Hay in a Haystack: Integrating Censorship Resistance into the Mainstream Internet |
1409599 |
38 |
Wu-chang Feng |
Curricula and CTF Exercises for Teaching Smart Fuzzing and Symbolic Execution |
1821841 |
39 |
Domenic Forte |
iPROBE - An Internal Shielding Approach for Protecting against Frontside and Backside Probing Attacks |
1717392 |
40 |
Michael Franz |
Hydra: Hybrid Defenses for Resilient Applications |
1619211 |
41 |
Jessica Fridrich |
Steganography in Empirical Sources Using Acquisition Oracle |
1561446 |
42 |
Sanjay Goel |
The New Security Calculus: Incentivizing Good User Security Behavior |
1618212 |
43 |
Sanjay Goel |
Thwarting the Malicious Insider Evolution Process: The Theory of Strained Betrayal |
1912874 |
44 |
Samuel Gordon |
New Protocols and Systems for RAM-Based Secure Computation |
1564088, 1563722, 1562888 |
45 |
Vipul Goyal |
Transforming Non-Malleable Cryptography |
1916939 |
46 |
Ronen Gradwohl |
Utilitarian Implications of Privacy Protections |
1718670 |
47 |
Adam Groce |
Differentially Private Hypothesis Testing |
1817245 |
48 |
Ian Harris |
Detecting Social Engineering Attacks Using Semantic Language Analysis |
1813858 |
49 |
Willie Harrison |
Best Wiretap Codes for Real-world Physical-layer Security |
1910812 |
50 |
Viet Tung Hoang |
Towards Stronger and Verified Security for Real-World Cryptography |
1755539 |
51 |
Yuan Hong |
Privacy Preserving Cooperation among Microgrids for Efficient Load Management on the Grid |
1745894 |
52 |
Nicholas Hopper |
Consistent and Private Group Communication |
1814753 |
53 |
Nicholas Hopper |
Models and Measurements for Website Fingerprinting |
1815757 |
54 |
Amir Houmansadr |
Sustainable Censorship Resistance Systems for the Next Decade |
1553301 |
55 |
Fei Hu |
Big Data Security Education |
1723250 |
56 |
Stratis Ioannidis |
Massively Scalable Secure Computation Infrastructure Using FPGAs |
1717213 |
57 |
Ahmad Javaid |
INteractive VIsualization and PracTice basEd Cybersecurity Curriculum and Training (InviteCyber) Frame |
1903419, 1903423 |
58 |
Niraj Jha |
SHARKS: Smart Hacks, Attacks, RisKs and Security in IoT based on Machine Learning |
1617628 |
59 |
Limin Jia |
Towards a Usable, Practical, and Provably Secure Browser Infrastructure |
1704542 |
60 |
Yier Jin |
Online Digital Forensics Courses and Labs for Students and Professionals |
1802701 |
61 |
Yier Jin |
RESULTS: Reverse Engineering Solutions on Ubiquitous Logic for Trustworthiness and Security |
1812071, 1703602 |
62 |
Zhanpeng Jin |
Brain Hacking: Assessing Psychophysiological and Computational Vulnerabilities in Brain-based Biometrics |
1840790, 1564104 |
63 |
Gail Kaiser |
Toward Trustworthy Mutable Replay for Security Patches |
1563555 |
64 |
Zbigniew Kalbarczyk |
Data-Driven Study of Attacks on Cyber-Physical Infrastructure Supporting Large Computing Systems |
1816673 |
65 |
Faisal Kaleem |
CFEAR: Cyber Forensics Education through Augmented Reality |
1500055 |
66 |
Chris Kanich |
Enabling Long-Term Security and Privacy through Retrospective Data Management |
1801663 |
67 |
Eun Kim |
Wireless, Battery-less, Monolithic Tamper Detector for Semiconductor Chip Authenticity |
1716953 |
68 |
Joerg Kliewer |
Communication under Adversarial Attacks in Complex Networks - Fundamental Limits and Secure Coding Strategies |
1526547 |
69 |
Joerg Kliewer |
Covert/Secret and Efficient Message Transfer in (Mobile) Multi-Agent Environments |
1815322 |
70 |
Oleg Komogortsev |
Eye Movement Biometrics in Virtual and Augmented Reality |
171462 |
71 |
Cedric Langbort |
From Threat to Boon: Understanding and Controlling Strategic Information Transmission in Cyber-Socio-Physical |
1619339 |
72 |
Aron Laszka |
Towards Efficient and Scalable Crowdsourced Vulnerability-Discovery using Bug-Bounty Programs |
1850510 |
73 |
Loukas Lazos |
Secure Cloud Storage Verification Methods |
1813401 |
74 |
Christopher Leberknight |
Neural Network Prediction of Censorable Language |
1704113 |
75 |
Jun Li |
Online Social Network Fraud and Attack Research and Identification |
1564348, 1564250, 1564039 |
76 |
Dan Lin |
iPrivacy: Automatic Recommendation of Personalized Privacy Settings for Image Sharing |
1651455 |
77 |
Hui Lin |
Preempting Physical Damage from Control-related Attacks on Smart Grids' Cyber-physical Infrastructure |
1850377 |
78 |
Heather Lipford |
Leveraging community oversight to enhance collective efficacy for security and privacy |
1814110, 1814068, 1814439 |
79 |
Feng-Hao Liu |
Efficient Crypto Solutions for the Next Generation Applications |
1657040 |
80 |
Hongbo Liu |
Security Assurance in Short Range Communication with Wireless Channel Obfuscation |
1815908 |
81 |
Kangjie Lu |
MOSE: Automated Detection of Module-Specific Semantic Errors |
1815621 |
82 |
Bo Luo |
Privacy Protection in Social Networks: Bridging the Gap Between User Perception and Privacy Enforcement |
1422206 |
83 |
William Mahoney |
Evaluating Performance and Security of Executable Steganography for Surreptitious Programs |
1811560, 1811578 |
84 |
Florence Martin |
Digital Citizenship for Middle Grades |
1723746 |
85 |
Gerome Miklau |
Re[DP]: Realistic Data Mining Under Differential Privacy |
1409143 |
86 |
Jiang Ming |
Towards Paving the Way for Large-Scale Malware Analysis: New Directions in Generic Binary Unpacking |
1850434 |
87 |
Jelena Mirkovic |
Hardening Systems Against Low-Rate DDoS Attacks |
1815495 |
88 |
Tanushree Mitra |
Designing Trustworthy and Transparent Information Platforms (News Platforms) |
1915755 |
89 |
Tyler Moore |
Examining the Impact of Cybersecurity Shocks on Cryptocurrency Platforms |
1714291 |
90 |
Tyler Moore |
Developing Robust Longitudinal Indicators and Early Warnings of Cybercrime |
1714291 |
91 |
Adwait Nadkarni |
Enabling Systematic Evaluation of the Soundness of Android Security Analysis Techniques |
1815336 |
92 |
Ida Ngambeki |
An Assessment Driven Approach to Self-Directed Learning in Secure Programming (SecTutor) |
1934279, 1934269, 1934285 |
93 |
Nick Nikiforakis |
Understanding, Measuring, and Defending against Malicious Web Crawlers |
1813974 |
94 |
Nick Nikiforakis |
Emerging Attacks Against the Mobile Web and Novel Proxy Technologies for Their Containment |
1617593 |
95 |
Alina Oprea |
An Integrated Approach for Enterprise Intrusion Resilience |
1717634 |
96 |
Michael Orshansky |
Simulation-Based Analysis of EM Side Channels in Embedded Systems: From Software to Fields |
1901446 |
97 |
Laura Osburn |
Improving O&M and IT Collaboration to Keep our Buildings Smart and Secure |
1932769 |
98 |
Xinming Ou |
Data-driven Approaches for Large-scale Security Analysis of Mobile Applications |
1717862, 1717871, 1718214 |
99 |
Younghee Park |
Enhancing Security Education through Transiting Research on Security in Emerging Network Technologies |
1723804 |
100 |
Bryan Parno |
Automated Support for Writing High-Assurance Smart Contracts |
1801369, 1801321 |
101 |
Vishal Patel |
Presentation-Attack-Robust Biometrics Systems via Computational Imaging of Physiology and Materials |
1801435, 1801372, 1801382 |
102 |
Sameer Patil |
Incorporating Sociotechnical Cybersecurity Learning Within Undergraduate Capstone Courses |
1821782 |
103 |
Brian Payne |
Creating Cybersecurity Pathways Between Community Colleges and Universities |
1914613 |
104 |
Roberto Perdisci |
Leveraging High-Density Internet Peering Hubs to Mitigate Large-Scale DDoS Attacks |
1741608 |
105 |
Edoardo Persichetti |
Secure and Efficient Solutions for Post-Quantum Cryptography from Codes with Compact Representations |
1906360 |
106 |
Jason Polakis |
Black-Box Flaw Discovery in Web Authentication and Authorization Mechanisms |
1934597 |
107 |
Jules Polonetsky |
RCN: Applied Privacy Research Coordination Network: An Industry-Academic Network to Transition Promising Privacy Research to Practice |
1837413 |
108 |
Michalis Polychronakis |
Combating Environment-aware Malware |
1617902 |
109 |
Michalis Polychronakis |
Principled and Practical Software Shielding against Advanced Exploits |
1749895 |
110 |
Dmitry Ponomarev |
Side Channels through Lower-Level Caches: Attacks, Defenses and Security Metrics |
1422401 |
111 |
Donald Porter |
Attacking and Defending the Lifespan of Mobile and Embedded Flash Storage |
1816263 |
112 |
Yanjun Qi |
Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks |
1619098 |
113 |
Emilee Rader |
Designing a Coordination Mechanism for Managing Privacy as a Common-Pool Resource |
1524296 |
114 |
Indrakshi Ray |
Detecting and Reconstructing Network Anomalies and Intrusions in Heavy Vehicles |
1715458 |
115 |
Bradley Reaves |
Techniques for Measuring and Characterizing Robocalls |
1849994 |
116 |
Franziska Roesner |
Towards Secure Augmented Reality Platforms |
1651230 |
117 |
Atanas Rountev |
PrivAid: Differentially-Private Analytics for Android Apps |
1907715 |
118 |
Jared Saia |
Proof of Work Without All the Work |
1816250, 1816076 |
119 |
Brendan Saltaformaggio |
GEMINI: Guided Execution Based Mobile Advanced Persistent Threat Investigation |
1755721 |
120 |
Sagar Samtani |
Identifying Emerging Threats in the Online Hacker Community for Proactive Cyber Threat Intelligence: A Diachronic Graph Convolutional Autoencoder Framework |
1850362 |
121 |
Nitesh Saxena |
SPHINX: A Password Store that Perfectly Hides Passwords from Itself |
1714807 |
122 |
Alessandra Scafuro |
A Broad Treatment of Privacy in Blockchains |
1718074 |
123 |
David Schuster |
Understanding Human Cognition in Computer Network Defense |
1553018 |
124 |
Vyas Sekar |
Handling a Trillion Unfixable Flaws on Billions of Internet-of-Things |
1564009 |
125 |
Koushik Sen |
Machine Learning for Effective Fuzz Testing |
1817122 |
126 |
Thomas Shrimpton |
API-centric Cryptography |
1816375 |
127 |
Tao Shu |
Towards Securing Visible Light Communications |
1745254 |
128 |
Akbar Siami Namin |
Improving Student Learning and Engagement in Digital Forensics through Collaborative Investigation of Cyber Securit |
1821560 |
129 |
Akbar Siami Namin |
User-Centric Design of a Sonification System for Automatically Alarming Security Threats and Impact |
1564293 |
130 |
Yasin Silva |
BullyBlocker - Identifying Cyberbullying in Social Networking Sites |
1719722 |
131 |
Alice Silverberg |
An algebraic approach to secure multilinear maps for cryptography |
1703321, 1701567, 1701785 |
132 |
Vivek Singh |
Early-Stage Interdisciplinary Collaboration: Fair and Accurate Information Quality Assessment Algorithm |
1915790 |
133 |
Christian Skalka |
A New Approach to Federated Network Security |
1717581, 1718036, 1718083 |
134 |
Geoffrey Smith |
Quantifying Information Leakage in Searchable Encryption |
1749014 |
135 |
William Staples |
Digital Inequalities in the Heartland |
1742815 |
136 |
Kevin Steinmetz |
Law-Enforcement Cyber Investigations: An In-Depth Qualitative Study |
1916284 |
137 |
Kevin Steinmetz |
Technological Con-Artistry: An Analysis of Social Engineering |
1616804 |
138 |
Scott Stoller |
Access Control Policy Mining and Management |
1421893 |
139 |
Alley Stoughton |
Towards Mechanized Proofs of Composable Security Properties |
1801564 |
140 |
Gookwon Suh |
Language-Hardware Co-Design for Practical and Verifiable Information Flow Control |
1513797 |
141 |
Kun Sun |
Enhancing Container Security via Fine-Grained System Resource Constraints |
1815650 |
142 |
Himanshu Thapliyal |
Utilizing Principles of Energy Recovery Computing for Low-Energy and DPA-Resistant IoT Devices |
1845448 |
143 |
Stavros Tripakis |
Bridging the Gap between Protocol Design and Implementation through Automated Mapping |
1801546 |
144 |
Guan-Hua Tu |
Side-channel Attacks Against Mobile Users: Singularity Detection, Behavior Identification, and Automated Rectification |
1815636 |
145 |
A. Selcuk Uluagac |
Securing Sensory Side-Channels in Cyber-Physical Systems |
1453647 |
146 |
A. Selcuk Uluagac |
Privacy-Aware Wearable-Assisted Continuous Authentication Framework |
1718116 |
147 |
Krishna Venkatasubramanian |
A Suite of Authentication Solutions for Individuals with Upper Extremity Impairment |
1901540, 1947022 |
148 |
Roopa Vishwanathan |
Automated Proof Generation and Verification for Attribute-based Cryptography |
1800088 |
149 |
Kristen Walker |
An Exploratory Study of Technology Adoption in K-12: Educational Benefits vs Privacy Costs |
1936837 |
150 |
Haining Wang |
Integrating Cybersecurity Education with Cloud Computing |
1821744 |
151 |
Weichao Wang |
Developing Security Education Materials for Future Advanced Manufacturing Engineering Workforce |
1523096 |
152 |
XiaoFeng Wang |
Understanding and Discovering Emerging Cybercrimes through Automatic Analysis of Online Text Traces |
1801432 |
153 |
XiaoFeng Wang |
Safeguarding Mobile Cloud Services: New Challenges and Solutions |
1618493 |
154 |
Yang Wang |
Predicting Personalized Privacy Preferences in the Smart Home |
1464347 |
155 |
Yang Wang |
Cooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies |
1652497 |
156 |
Richard Wash |
Using Stories to Improve Computer Security Decision Making |
1714126 |
157 |
Wujie Wen |
Invisible Shield: Can Compression Harden Deep Neural Networks Universally Against Adversarial Attacks? |
1840813 |
158 |
Timothy Wood |
Fine Grained Protection for Scalable Single-Use Services |
1814234, 1814402 |
159 |
Matthew Wright |
Adversarial ML in Traffic Analysis |
1816851 |
160 |
Dinghao Wu |
Advanced Trace-oriented Binary Code Analysis |
1652790 |
161 |
Xusheng Xiao |
Automatic Identification of Sensitive UI Widgets based on Icon Classification for Android Apps |
1755772 |
162 |
Aiping Xiong |
Modeling Memory Illusion for Predicting Trust in Online Information |
1915801 |
163 |
Dianxiang Xu |
Benchmarking Testing Methods for Access Control Policies |
1618229 |
164 |
Shouhuai Xu |
A Framework for Enhancing the Resilience of Cyber Attack Classification and Clustering Mechanisms |
1814825 |
165 |
Qiben Yan |
Toward Non-intrusive Detection of Resilient Mobile Malware and Botnet using Application Traffic Measurement |
1566388 |
166 |
Qiben Yan |
URadio: Towards Secure Smart Home IoT Communication Using Hybrid Ultrasonic-RF Radio |
1950171 |
167 |
Danfeng Yao |
Deployment-quality and Accessible Solutions for Cryptography Code Development |
1929701 |
168 |
Attila A Yavuz |
Lightweight and Fast Authentication for Internet of Things |
1652389 |
169 |
Yanfang (Fanny) Ye |
Intelligent Malware Detection Utilizing Novel File Relation-Based Features and Resilient Techniques for Adversarial Attacks |
1946327 |
170 |
Yanfang (Fanny) Ye |
Securing Cyberspace: Gaining Deep Insights into the Online Underground Ecosystem |
1940859 |
171 |
Vinod Yegneswaran |
MALDIVES: Developing a Comprehensive Understanding of Malware Delivery Mechanisms |
1514503 |
172 |
Qiaoyan Yu |
Managing Hardware Security in Three Dimensional Integrated Circuits |
1717130 |
173 |
Qiaoyan Yu |
Proactive Defense Methods for Chip Integrity and Security |
1652474 |
174 |
Shimeng Yu |
Design of Light-weight RRAM based Hardware Security Primitives for IoT Devices |
1903631 |
175 |
Qiang Zeng |
Enabling Precise and Automated Insecurity Analysis of Middleware on Mobile Platforms |
1856380 |
176 |
Fengwei Zhang |
Hardware-assisted Plausibly Deniable System for Mobile Devices |
1928331 |
177 |
Zhiru Zhang |
Automatic Synthesis of Verifiably Secure Hardware Accelerators |
1618275 |
178 |
Zizhan Zheng |
Towards Robust Moving Target Defense: A Game Theoretic and Learning Approach |
1816495 |
179 |
Huiyang Zhou |
Towards Smart and Secure Non Volatile Memory |
1717550 |
180 |
Sencun Zhu |
Reputation-Escalation-as-a-Service: Analyses and Defenses |
1618684 |