# | Lead PI Name | NSF Project Award Number(s) | Name of Poster Session Presenter(s) | Poster Title |
1 | William Adams | 1422078 | Samir Tout | Integrated Smart Grid Analytics for Anomaly Detection |
2 | Mustaque Ahamad | 1514035 | Mustaque Ahamad | Exposing and Mitigating Cross-Channel Attacks |
3 | Irfan Ahmed | 1500101 | Irfan Ahmed | EAGER: Peer Instruction for Cybersecurity Education |
4 | Kemal Akkaya | 1550313 | Kemal Akkaya | Privacy-Preserving Data Collection and Access for IEEE 802.11s-Based Smart Grid Applications |
5 | Ehab Al-Shaer | 1352238 | Ehab Al-Shaer | Adversary-aware Host Address Mutation |
6 | Theodore Allen | 1409214 | Theodore Allen | Data-Driven Cyber Vulnerability Maintenance |
7 | Raul Aranovich | 1445079 | Raul Aranovich | Risk detection in OSS teams with NLP |
8 | Reza Azarderakhsh | 1661557 | Reza Azarderakhsh | Post-quantum Cryptography |
9 | Michael Bachmann | 1500077 | Adam Shniderman | Education Initiative TECH MeD: Transdisciplinary Education for Critical Hacks of Medical Devices |
10 | Saurabh Bagchi | 1548114 | | Modeling Deception In Information Security As A Hypergame - A Primer |
11 | Emery Berger | 1525888, 1525992 | Tim Wood | EVADE: EVidence-Assisted Detection and Elimination of Vulnerabilities |
12 | Swarup Bhunia | 1441667, 1603483 | Prabhat Mishra | IPTrust: A Comprehensive Framework for IP Integrity Validation |
13 | Matthieu Bloch | 1527387 | Matthieu Bloch | Towards Stealth Networks |
14 | Alexandra Boldyreva | 1421815 | Cristina Nita-Rotaru | A Unifying Framework For Theoretical and Empirical Analysis of Secure Communication Protocols |
15 | Travis Breaux | 1330596 | Travis Breaux | Privacy Policy Ambiguity and Privacy Risk |
16 | Jean Camp | 1565375, 1565252 | Jean Camp | Give people controls they can understand and trust, for the privacy and security they want |
17 | Ran Canetti | 1414119, 1413920, 1413964, 1413996 | Ran Canetti and Mayank Varia | Modular Approach to Cloud Security |
18 | Justin Cappos | 1223588 | Justin Cappos | Lock-in-Pop Design: Only Access Popular Paths in the Kernel |
19 | Cornelia Caragea | 1421970 | Cornelia Caragea | Image Privacy Prediction Using Deep Features |
20 | Bogdan Carbunar | 1527153, 1526254 | Bogdan Carbunar | TWC: Small: Collaborative: Cracking Down Online Deception Ecosystems |
21 | Alvaro Cardenas | 1553683 | | Limiting the Impact of Stealthy Attacks in Industrial Control Systems |
22 | Shantanu Chakrabartty | 1525476, 1524520 | Jian Ren | Zero-power Dynamic Signature for Trust Verification of Passive Sensors and Tags |
23 | Rui Chen | 1554373, 15544801 | Rui Chen | Response to OPM Data Breach |
24 | Hsinchun Chen | 1314631 | Sagar Samtani | Identifying SCADA Devices and their Vulnerabilities on the IoT |
25 | Hsinchun Chen | 1314631 | Sagar Samtani | Hacker Community Collection and Analytics |
26 | Tim Cheng | 1526695 | Cetin Koc | Detection of Hardware Trojans Hidden in Unspecified Design Functionality |
27 | David Choffnes | 1618955 | David Choffnes | Enabling Practical Traffic Analysis Resistance |
28 | David Cok | 1314674 | David Cok | Library annotations and tools for checking software |
29 | Harry Crane | 1523785 | Harry Crane | Edge exchangeability: a new framework for network modeling |
30 | Anton Dahbura | 1544493 | Anton Dahbura | Modeling Security/Incentive Behaviors |
31 | Alberto Dainotti | 1423659 | Alberto Dainotti | HIJACKS: Detecting and Characterizing Internet Traffic Interception based on BGP Hijacking |
32 | Alberto Dainotti | 1228994 | Alberto Dainotti | Internet Outage Detection and Analysis |
33 | Anupam Datta | 1423168 | Frank Pfenning | Accountability via Deviance and Causal Determination |
34 | Srini Devadas | 1523572 | Srini Devadas | Trapdoor Computational Fuzzy Extractors |
35 | Srini Devadas | 1411208 | Srini Devadas | TWC: Small: Ascend: Architecture for Secure Computation on Encrypted Data |
36 | Jintai Ding | 1565748 | Jintai Ding | Implementing Practical Provably Secure Authenticated Key Exchange for the Post-Quantum World |
37 | Roger Dingledine | 1619454, 1619067 | Matthew Wright | TTP: Defending Against Website Fingerprinting in Tor |
38 | Yevgeniy Dodis | 1619158 | Yevgeniy Dodis | Designing Secure Hash Functions and Block Ciphers |
39 | Adam Doupe | 1623269 | Adam Doupe | Educating the Security Workforce through On-Demand Live Competitions |
40 | Tudor Dumitras | 1464163 | Tudor Dumitras | Measuring Patching at Scale |
41 | Sara Eftekharnejad | 1600058 | Brian Johnson | Securing Smart Power Grids under Data Measurement Cyber Threats |
42 | Thomas Eisenbarth | 1618837 | Thomas Eisenbarth | MIST: Systematic Analysis of Microarchitectural Information Leakage on Mobile Platforms |
43 | Kirsten Eisentraeger | 1617802 | Kirsten Eisentraeger | Algorithms for number-theoretic problems in cryptography |
44 | Michalis Faloutsos | 1314632,1314603, 1314935 | Christos Faloutsos | CoreScope |
45 | Fariborz Farahmand | 1544090 | Fariborz Farahmand | A Mathematical Model of Privacy Decisions: A Behavioral Economic Perspective |
46 | Nick Feamster | 1540066 | Nick Feamster | Facilitating Free and Open Access to Information on the Internet |
47 | Yunsi Fei | 1563697 | Yunsi Fei | TWC: Medium: Automating Countermeasures and Security Evaluation against Software Side-channel Attacks |
48 | Yunsi Fei | 1314655 | Yunsi Fei | A Unified Statistics-based Framework for Analysis and Evaluation of Side-channel Attacks in Cryptosystems |
49 | Sue Fitzgerald | 1500055 | | CFEAR: Cyber Forensics Education via Augmented Reality |
50 | Michael Franz | 1513837 | Stijn Volckaert | ENCORE: ENhanced program protection through COmpiler-REwriter cooperation |
51 | Michael Franz | 1513837 | Mathias Payer | ENCORE: ENhanced program protection through COmpiler-REwriter cooperation |
52 | Rosanne Gamble | 1619690, 1619641 | Rose Gamble, Indrakshi Ray | Toward a Test Bed for Heavy Vehicle |
53 | Siddharth Garg | 1553419 | Siddharth Garg | Re-thinking Electronic Design Automation Algorithms for Secure Outsourced Integrated Circuit Fabrication |
54 | Siddharth Garg | 1527072 | Siddharth Garg | New Attack Vectors and Formal Security Analysis for Integrated Circuit Logic Obfuscation |
55 | Paolo Gasti | 1619023; 1618300 | Paolo Gasti | Energy-Efficient Privacy-Preserving Active Authentication of Smartphone Users |
56 | Ryan Gerdes | 1410000 | Ryan Gerdes | Secure and Resilient Vehicular Platooning |
57 | Gabriel Ghinita | 1523101 | Gabriel Ghinita | Capacity Building in Security, Privacy and Trust for Geospatial Applications |
58 | Grandon Gill | 1418711 | Grandon Gill | Cybersecurity Discussion Cases |
59 | Michael Goodrich | 1228639, 1228598, 1228485 | Michael Goodrich | Privacy-Preserving Distributed Storage and Computation |
60 | Venu Govindaraju | 1314803 | Shambhu Upadhyaya | Long-term Active User Authentication Using Multi-modal Profiles |
61 | Yong Guan | 1527579 | George Amariucai | Time-Advantage-Based Key Establishment |
62 | Mina Guirguis | 1149397 | Mina Guirguis | Securing Mobile CPS against Stealthy Attacks |
63 | Andreas Haeberlen | 1065130 | Andreas Haeberlen | Secure Network Provenance |
64 | John Hale | 1524940 | John Hale | Scalable Hybrid Attack Graph Modeling and Analysis |
65 | Kevin Hamlen | 1513704 | Mathias Payer | ENCORE: ENhanced program protection through COmpiler-REwriter cooperation |
66 | Michael Hay | 1409125, 1409143, 1408982 | Michael Hay | Pythia: Algorithm Selection for Differential Privacy |
67 | Wu He | 1318470 | Wu He and Mohd Anwar | Improving Security Behavior of Employees in Cyberspace through Evidence-based |
68 | Xiali Hei | 1566166 | Xiali Hei | CPS security for insulin pumps |
69 | Jeffrey Hoffstein | 1561709 | Berk Sunar | Development and Evaluation of Next Generation Homomorphic Encryption Schemes |
70 | Yuan Hong | 1618221 | Yuan Hong | Privacy Preserving Cooperation among Microgrids for Efficient Load Management |
71 | Jason Hong | 1347186 | Jason Hong | Social Cybersecurity |
72 | Jason Hong | 1228813 | Jason Hong | PrivacyGrade.org Grading the Privacy of Smartphone Apps |
73 | Mark Horowitz | 1563113 | Ardavan Pedram | PRISM: Platform for Rapid Investigation of efficient Scientific-computing & Machine-learning |
74 | Amir Houmansadr | 1553301 | Amir Houmansadr | CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content |
75 | Fei Hu | 1315328 | Fei Hu | Cyber-physical System and Big Data Security: Training National Warriors |
76 | Hongxin Hu | 1537924 | Hongxin Hu | Defending Against Visual Cyberbullying Attacks in Emerging Mobile Social Networks |
77 | Dijiang Huang | 1528099, 1523994, 1526299 | Dijiang Huang | SRN: Secure and Resilient Networking |
78 | Florence Hudson | 1650445 | Florence Hudson | EAGER Cybersecurity TTP Acceleration |
79 | Warren Hunt | 1525472 | Warren Hunt | Formal Analysis of x86 Machine-Code Programs |
80 | Trent Jaeger | 1408880 | Trent Jaeger | Retrofitting Software for Defense-in-Depth |
81 | Matthew Jensen | 1421580 | Matthew Jensen | Building the Human Firewall |
82 | Limin Jia | 1320470 | Limin Jia | Provably Enforcing Practical Multi-Layer Policies in Today's Extensible Software Platforms |
83 | Zhanpeng Jin | 1422417, 1423061 | Zhanpeng Jin | Brainprint: A Psychophysiological Biometric |
84 | Yier Jin | 1319105, 1318860 | Yier Jin | Toward Trusted 3rd-Party Microprocessor Cores: A Proof Carrying Code Approach |
85 | Zhanpeng Jin | 1564046, 1564104 | Zhanpeng Jin | Exploring Vulnerabilities of Brain Biometrics |
86 | David Kaeli | 1618379 | Yunsi Fei | STARSS: Small: Side-Channel Analysis and Resiliency Targeting Accelerators |
87 | Faisal Kaleem | 1500055 | Jigang Liu and Sue Fitzgerald | CFEAR: Cyber Forensics Education via Augmented Reality |
88 | Apu Kapadia | 1408730, 1407788 | Apu Kapadia | A Socio-Technical Approach to Privacy in a Camera-Rich World |
89 | Eric Keller | 1406192, 1406225, 1406177 | John Sonchack | Switch-level Network Security With The OpenFlow Extension Framework (OFX) |
90 | Mohammad Maifi Khan | 1343766 | Mohammad Maifi Khan | The Role of Emotion in Risk Communication and Warning: Application to Risks of Failures to Update Software |
91 | Taesoo Kim | 1563848 | Taesoo Kim | Secure Design of SGX Enclaves |
92 | Jonathan Kimball | 1505610, 1505633 | Jonathan Kimball and Mo-Yuen Chow | Secure Algorithms for Cyber-Physical Systems |
93 | Matthias Kirchner | 1464275 | | Camera-based Mobile Device Authentication |
94 | Joerg Kliewer | 1526547 | Joerg Kliewer | Communication under Adversarial Attacks in Complex Networks |
95 | Alfred Kobsa | 142362 | Yao Li | Cross-Cultural Privacy Prediction |
96 | Alfred Kobsa | 1544373 | Bruce Berg | The Effect of Sensory Stimuli on the Performance of Security-Critical Tasks |
97 | Oleg Komogortsev | 1250718 | Oleg Komogortsev | CAREER: Secure and Trustworthy Ocular Biometrics |
98 | Chakraborty Koushik | 1421068 | Sanghamitra Roy | Mitigating the Threat of a Malicious Network-on-Chip |
99 | Stephane Lafortune | 1421122 | Stephane Lafortune | Intrusion Detection and Resilience Against Attacks in Cyber and Cyber-Physical Control Systems |
100 | Cedric Langbort | 1619339 | | Strategic information transmission in cyber-socio-physical systems - from threat to boon |
101 | Robert LaRose | 1318885 | Nora Rifon | Online Safety for the Ages |
102 | Lucas Layman | 1619084 | Lucas Layman | Pocket Security: Smart Phone Cybercrime in the Wild |
103 | Gwendolyn Lee | 1537528 | Gwendolyn Lee | Understanding the Strategic Values of Privacy Practices in Organizations |
104 | Insup Lee | 1505799 | Oleg Sokolsky | Security and Privacy-Aware Cyber-Physical Systems |
105 | Kyumin Lee | 1553035 | Kyumin Lee | Tracking, Revealing and Detecting Crowdsourced Manipulation |
106 | Wenke Lee | 1409635 | Wenke Lee | EPICA |
107 | David Levin | 1564143 | David Choffnes | Key Sharing in the HTTPS Ecosystem |
108 | Jun Li | 1564348, 1564250, 1564039 | Xintao Wu | OSN Fraud and Attack Research and Identification |
109 | Ninghui Li | 1640374 | Ninghui Li | Bridging The Gap between Theory and Practice in Data Privacy |
110 | Zhenhui Li | 1544455 | Zhenhui Li | Toward Transparency in Public Policy via Privacy Enhanced Social Flow Analysis with Applications to Ecological Networks and Crim |
111 | Zhiqiang Lin | 1623276 | Irfan Ahmed | Using Virtual Machine Introspection for Deep Cybersecurity Education |
112 | Dan Lin | 1651455, 1651166 | Jianping Fan | iPrivacy: Automatic Recommendation of Personalized Privacy Settings for Image Sharing |
113 | Heather Lipford | 1318854 | Heather Lipford | Discovering Software Vulnerabilities through Interactive Static Analysis |
114 | Heather Lipford | 1500052 | Heather Lipford | A Body of Knowledge for Usable Security and Privacy Education |
115 | Yao Liu | 1553304 | Yao Liu | A Pathway towards Channel Camouflage and Manipulation Techniques for Wireless Security |
116 | Vinod Lohani | 1623047 | Godmar Back | Development and Analysis of a Spiral Theory-based Cybersecurity Curriculum |
117 | Long Lu | 1421824 | Long Lu | STRUCT: Secure and Trustworthy Compartments in Mobile Applications |
118 | Anna Lysyanskaya | 1422361 | Anna Lysyanskaya | Empowering Anonymity |
119 | Kenneth Mai | 1441736 | Ken Mai | Combatting Integrated Circuit Counterfeiting Using Secure Chip Odometers |
120 | Yiorgos Makris | 1514050 | Yiorgos Makris | Hardware Trojans in Wireless Networks: Risks & Remedies |
121 | Hafiz Malik | 1440929 | Hafiz Malik | Model Driven Framework for Audio Forensics |
122 | Zhuoqing Mao | 1318306, 1526455 | Qi Alfred Chen | MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era |
123 | Zhuoqing Mao | 1318306, 1526455 | Yuru Shao | The Misuse of Android Unix Domain Sockets and Security Implications |
124 | Stephen McCamant | 1526319 | Stephen McCamant | Quantitative Information Flow Measurement |
125 | Hoda Mehrpouyan | 1657774 | Hoda Mehrpouyan | Privacy Management in Ubiquitous Environments |
126 | Stephen Miller | 1526333 | Stephen Miller | Lattices, Modularity, and Crypto |
127 | Jelena Mirkovic | 1319215 | Jelena Mirkovic | FRADE: Flash cRowd Attack DEfense |
128 | Jelena Mirkovic | 1224035 | Jelena Mirkovic | Revitalizing Cyber-Security Education Through Competitions |
129 | Alan Mislove | 1421444 | Alan Mislove | Towards Robust Crowd Computations |
130 | Alan Mislove | 1563320 | Alan Mislove | Measuring and Improving the Management of Today's PKI |
131 | John Mitchell | 1500089 | Herb Lin | Cybersecurity Education for Policy Makers |
132 | Prateek Mittal | 1423139 | Prateek Mittal | Anonymity Against AS-level Adversaries |
133 | Sibin Mohan | 1423334 | Sibin Mohan | Behavior-Based Zero-Day Intrusion Detection for Real-Time Cyber-Physical Systems |
134 | Arjun Mukherjee | 1527364 | Arjun Mukherjee | Statistical Models for Opinion Spam Detection Leveraging Linguistic and Behavioral Cues |
135 | Venkitasubramaniam Muthuramakrishnan | 1526377 | Muthuramakrishnan Venkitasubramaniam | Understanding the Complexity of Concurrent Security |
136 | Brad Myers | 1423054 | Brad Myers | TWC: Small: Empirical Evaluation of the Usability and Security Implications of Application Programming Interface Design |
137 | Hung Ngo | 1409551, 1409303 | Varun Chandola | Data is Social: Exploiting Data Relationships to Detect Insider Attacks |
138 | Xuanlong Nguyen | 1409303 | Xuanlong Nguyen | Data is Social: Exploiting Data Relationships to Detect Insider Attacks |
139 | Kobbi Nissim | 1565387, 1565365 | Kobbi Nissim | Computing over Distributed Sensitive Data |
140 | Cristina Nita-Rotaru | 1654137 | Cristina Nita-Rotaru | Improving Protocol Vulnerability Discovery via Semantic Interpretation of Textual Specifications |
141 | Adam O'Neill | 1650419 | Adam O'Neill | EAGER: Guaranteed-Secure and Searchable Genomic Data Repositories |
142 | Sewoong Oh | 1527754 | Sewoong Oh | Fundamental limits of differential privacy |
143 | Daniela Oliveira | 1464794 | Daniela Oliveria | Age-Related Vulnerabilities to Social-Engineering Attacks |
144 | Xinming Ou | 1314925 | Sathya Chandran Sundaramurthy | Bringing Anthropology into Cybersecurity |
145 | Charalampos Papamanthou | 1514261, 1526950 | Charalampos Papamanthou | IntegriDB: Verifiable SQL for Outsourced Databases |
146 | Abhishek Parakh | 1623380 | Abhishek Parakh | EDU: QuaSim: A Virtual Interactive Quantum Cryptography Educator-A Project-based Gamified Educational Paradigm |
147 | Sameer Patil | 1548779 | Sameer Patil | Privacy Compliance by Design |
148 | Sameer Patil | ? | ? | ? |
149 | Vern Paxson | 1518918, 1237265 | Vern Paxson | Towards a Science of Censorship Resistance |
150 | Mathias Payer | 1464155 | Mathias Payer | Data Confidentiality and Integrity |
151 | Roberto Perdisci | 1149051 | Roberto Perdisci | Reconstructing and investigating in-the-wild web-based malware downloads |
152 | Vir Phoha | 1527795 | Vir Phoha | Spoof-resistant Authentication Through Phone and Wearables |
153 | Jules Polonetsky | 1654085 | Jules Polonetsky | Privacy Research and Data Responsibility Research Coordination Network (RCN) |
154 | Dmitry Ponomarev | 1422401 | Dmitry Ponomarev | Side Channels through Lower-Level Caches |
155 | Zhiyun Qian | 1464410 | Zhiyun Qian | TCP Side Channels - Real Threats |
156 | Emilee Rader | 1116544, 1115926 | Emilee Rader | Influencing Mental Models of Security |
157 | Jeyavijayan Rajendran | 1618797 | JV Rajendran | Secure Split Manufacturing |
158 | Zvonimir Rakamaric | 1527526 | Zvonimir Rakamaric | DEKER: DECOMPOSING OS KERNELS |
159 | Baishakhi Ray | 1618771 | Baishakhi Ray | Automated Detection and Repair of Error Handling Bugs in SSL/TLS Implementations |
160 | Aunshul Rege | 1453040 | Aunshul Rege | Understanding Adaptive Adversarial Behavior and Decision-Making Processes in Cyberattacks |
161 | Michael Reiter | 1330599 | Michael Reiter | Rethinking Security in the Era of Cloud Computing |
162 | Kui Ren | 1262277 | Kui Ren | CAREER: Secure and Privacy-assured Data Service Outsourcing in Cloud Computing |
163 | Golden Richard | 1358723 | Irfan Ahmed | EAGER: Integrating Cognitive and Computer Science to Improve Cyber Security |
164 | Daniela Rus | 1526815 | Dan Feldman | Enabling Secure and Private Cloud Computing using Coresets |
165 | Norman Sadeh | 1330596 | Norman Sadeh | Usable Privacy Policy Project |
166 | Norman Sadeh | 1513957 | Norman Sadeh | Towards Personalized Privacy Assistant: Understanding Privacy Decision Making and Behavioral Impact |
167 | Ravi Sandhu | 1111925 | Shouhuai Xu | Security Metrics |
168 | Ravi Sandhu | 1111925 | Shouhuai Xu | Cybersecurity Dynamics |
169 | Lalitha Sankar | 1350914 | Lalitha Sankar | Privacy-Guaranteed Distributed Interactions in Critical Infrastructure Networks |
170 | Fareena Saqib | 1566530 | Fareena Saqib | Hardware based Authentication and Trusted Platform Module functions (HAT) for IoTs |
171 | Fareena Saqib | 1623299 | Fareena Saqib | HACE Lab: An Online Hardware Security Attack and Countermeasure Evaluation Lab |
172 | Lori Scarlatos | 1623150 | Laurin Buchanan | Branching Interactive Graphic Stories for Cybersecurity Education |
173 | Patrick Schaumont | 1441710 | Patrick Schaumont | FAME: Fault-attack aware Microprocessor |
174 | Stephanie Schuckers | 1314792 | Daqing Hou | Long-term Active User Authentication Using Multi-modal Profiles |
175 | David Schuster | 1553018 | David Schuster | Understanding Human Cognition in Computer Network Defense |
176 | Kent Seamons | 1528022 | Kent Seamons | TrustBase |
177 | Shamik Sengupta | 1528167 | Shamik Sengupta | Establishing market based mechanisms for CYBer security information EXchange (CYBEX) |
178 | Amit Sheth | 1513721 | Amit Sheth | Context-Aware Harassment Detection on Social Media |
179 | Yaoyun Shi | 1526928 | Carl Miller | A Quantum Approach to Hardware Security |
180 | Akbar Siami Namin | 1347521 | Akbar Siami Namin | Sonifying Cyber-Security Cues |
181 | Lisa Singh | 1223825 | Lisa Singh | Assessing Online Information Exposure Using Web Footprints |
182 | Radu Sion | 1562376 | Radu Sion | CipherLocker: Encrypted Regulatory-Compliant Privacy-Enabled Drag and Drop Cloud Storage |
183 | Radu Sion | 1526707 | Radu Sion | Practical Plausible Deniability for Storage Systems |
184 | Meera Sridhar | 1566321 | Meera Sridhar | CRII: SaTC: A Language Based Approach to Hybrid Mobile App Security |
185 | Kevin Steinmetz | 1616804 | Kevin Steinmetz and Richard Goe | Technological Con-Artistry |
186 | Scott Stoller | 1421893 | Scott Stoller | Access Control Policy Mining and Management |
187 | Cynthia Sturton | 1651276 | Cynthia Sturton | Identifying Security Critical Properties of a Processor |
188 | Gookwon Suh | 1513797 | G. Edward Suh | TWC: Medium: Language-Hardware Co-Design for Practical and Verifiable Information Flow Control |
189 | S. Shyam Sundar | 1450500 | Dr. S. Shyam Sundar, Jinyoung Kim | Why Do We Reveal or Withhold Private Information? Exploring Heuristics and Designing Interface Cues for Secure Computing |
190 | Jakub Szefer | 1524680, 1526493 | Jakub Szefer | Practical and Scalable Security Verification of Security-Aware Hardware |
191 | Mark Tehranipoor | 1561023 | Domenic Forte | Design of Low-Cost Memory-Based Security Primitives and Techniques for High-Volume Products |
192 | Russell Tessier | 1318497 | Russell Tessier | New Directions in FPGA Security |
193 | Michael Thomas | 1623267 | Michael Thomas | A Cybersecurity Collectable Card Game for Urban Youth |
194 | Selcuk Uluagac | 1453647 | Selcuk Uluagac | Securing Sensory Side-Channels in Cyber-Physical Systems |
195 | Salil Vadhan | 1237235 | Salil Vadhan | Privacy Tools for Sharing Research Data |
196 | Jaideep Vaidya | 1422501 | Jaideep Vaidya | Privacy Preserving Outlier Detection |
197 | Joe Valacich | 1615696 | Joe Valacich | Identifying Malicious Insiders through Mouse Cursor Movements |
198 | Narseo Vallina-Rodriguez | 1564329 | Narseo Vallina Rodriguez | Lumen: Fine-Grained Visibility and Control of Mobile Traffic in User-Space |
199 | Barbara van Schewick | 1330141 | Norman Sadeh | The Usable Privacy Policy Project |
200 | Guru Prasadh Venkataramani | 1618786 | Milos Doroslovacki | Defending Against Hardware Covert Timing Channels |
201 | Giovanni Vigna | 1408632 | Giovanni Vigna | TrustDroid |
202 | Roopa Vishwanathan | 1566297 | Roopa Vishwanathan | CRII: SaTC: Automated Proof Construction and Verification for Attribute-based Cryptography |
203 | Tam Vu | 1619392 | Tam Vu | Wearable Authentication Solutions for Ubiquitous and Personal |
204 | Michael Walfish | 1514422 | Michael Walfish | Scaling proof-based verifiable computation |
205 | Jingguo Wang | 1420758 | Jingguo Wang | Risk of Data Breaches in Financial Institutions: A Routine Activity Perspective |
206 | Yang Wang | 1464347 | Yang Wang | Individualized Mental Model and Universal Privacy Dashboard |
207 | Weichao Wang | 1523096 | Weichao Wang | Developing Security Education Materials for Future Advanced Manufacturing Engineering Workforce |
208 | Weichao Wang | 1303356 | Weichao Wang | Integrated Learning Environment for Cyber Security of Smart Grid |
209 | Wendy Hui Wang | 1350324 | Wendy Hui Wang | Verifiable Outsourcing of Data Mining Computations |
210 | Steven Weber | 1228847 | Steven Weber | TTP: Medium Securing the Wireless Philadelphia Network |
211 | Shuangqing Wei | 1320351 | George T Amariucai | Security in Dynamic Environments: |
212 | Laurie Williams | 1318428 | Laurie Williams | Motivating and Reaching University Students and Professionals with Software Security Education |
213 | Rebecca Wright | 1646856, 1646890 | Rebecca Wright | Anomaly Detection in Multilayer Networks |
214 | Xintao Wu | 1523115, 1523154 | Xintao Wu | Enhancing Education in Genetic Privacy |
215 | Dinghao Wu | 1223710 | Dinghao Wu | Reassembleable Disassembling |
216 | Dinghao Wu | 1223710 | Dinghao Wu | Translingual Obfuscation |
217 | Li Xiong | 1618932 | Li Xiong | Spatiotemporal Privacy for Location Based Applications |
218 | Dianxiang Xu | 1522847 | Samer Khamaiseh, Dianxiang Xu | Software Artifact Repository |
219 | Dianxiang Xu | 1359590 | Samer Khamaiseh, Dianxiang Xu | Automated Conformance Testing of Attribute-Based Access Control and Obligation Policies |
220 | Dongyan Xu | 1409668, 1409534 | Dongyan Xu | Binary-Centric Forensic Analysis of Advanced Cyber Attacks Against Enterprise Environments |
221 | Qiben Yan | 1566388 | Qiben Yan | Non-intrusive Detection of Mobile Malware and Botnets |
222 | Shanchieh Yang | 1526383 | Shanchieh Jay Yang | Automating Attack Strategy Recognition to Enhance Cyber Threat Prediction |
223 | Baijian Yang | 1500046 | Baijian Yang | Enhancing Cybersecurity Education Through a Representational Fluency Model |
224 | Alec Yasinsac | 1636470 | Rebecca Bace | Cybersecurity Technology Transfer to Practice (TTP) |
225 | Yanfang Ye | 1618629 | Yanfang Ye | Intelligent Malware Detection Utilizing Novel File Relation-Based Features and Resilient Techniques for Adversarial Attacks |
226 | Vinod Yegneswaran | 1514503 | Vinod Yegneswaran | MALDIVES: Toward a Comprehensive Understanding of Malware Delivery Mechanisms |
227 | Vinod Yegneswaran | 1314956 | Vinod Yegneswaran | HIMALAYAS |
228 | Lei Ying | 1618768 | Lei Ying | TWC SBE: Small: Towards an Economic Foundation of Privacy-Preserving Data Analytics: Incentive Mechanisms and Fundamental Limits |
229 | Shimeng Yu | 1615774 | Shimeng Yu | Design of RRAM based Hardware Security Primitives |
230 | Meng Yu | 1422355, 1422594 | Meng Yu | Towards Agile and Privacy-Preserving Cloud Computing |
231 | Alenka Zajic | 1318934 | Milos Prvulovic | Quantitative Analysis and Reporting of Electromagnetic Covert and Side Channel Vulnerabilities |
232 | Kai Zeng | 1619073 | Kai Zeng | Secure Near Field Communications between Mobile Devices |
233 | Mark Zhandry | 1616442 | Mark Zhandry | Encryptor Combiners |
234 | Yinqian Zhang | 1566444 | Yinqian Zhang | Rethinking Side Channel Security on Untrusted OS |
235 | Yanchao Zhang | 1421999, 1700032 | Rui Zhang | TWC: Small: Collaborative: Secure and Usable Mobile Authentication for People with Visual Impairment |
236 | Yanchao Zhang | 1619251 | Yanchao Zhang | TWC: Small: Secure Mobile Devices through Multiple Lines of Defense |
237 | Yilu Zhou | 1551004 | Yilu Zhou | Can You Trust Apps Age Recommendations-Inconsistent and Unreliable Maturity Ratings on Mobile Platforms |
238 | Lina Zhou | 1527684 | Lina Zhou | What Online Reviewer Behaviors Really Matter? |
239 | Sencun Zhu | 1618684 | Sencun Zhu | Reputation-Escalation-as-a-Service: Analyses and Defenses |