Lead PI First Name | Lead PI Last Name | NSF Project Award Number(s) | Project Title |
William | Adams | 1422078 | Integrated Smart Grid Analytics for Anomaly Detection |
Mustaque | Ahamad | 1514035 | Exposing and Mitigating Cross-Channel Attacks |
Mustaque | Ahamad | 1318167 | Securing the New Converged Telephony Landscape |
Irfan | Ahmed | 1500101 | EAGER: Peer Instruction for Cybersecurity Education |
Kemal | Akkaya | 1550313 | Privacy-Preserving Data Collection and Access in 802.11s-based Smart Grid Applications |
Ehab | Al-Shaer | 1352238 | Adversary-aware Host Address Mutation |
Laura | Albert McLay | 1422768 | An optimization framework for prioritizing mitigations for securing information technology infrastructure |
Theodore | Allen | 1409214 | Data-Driven Cyber Vulnerability Maintenance |
Ardalan | Amiri Sani | 1617513 | Enhancing the Security and Performance of GPU Access in Web Browsers |
Bonnie | Anderson | 1422831 | The Force of Habit: Using fMRI to Explain Users’ Habituation to Security Warnings |
Mohd | Anwar | 1318501 | Improving Security Behavior of Employees in Cyberspace through Evidence-based Malware Reports and E-Learning Materials |
Raul | Aranovich | 1445079 | Risk detection in OSS teams with NLP |
Reza | Azarderakhsh | 1661557 | Post-quantum Cryptography |
Michael | Bachmann | 1500077 | Education Initiative TECH MeD: Transdisciplinary Education for Critical Hacks of Medical Devices |
Saurabh | Bagchi | 1548114 | Modeling Deception In Information Security As A Hypergame - A Primer |
Boaz | Barak | 1618026 | Complexity Assumptions for Cryptographic Schemes |
Emery | Berger | 1525888, 1525992 | EVADE: EVidence-Assisted Detection and Elimination of Vulnerabilities |
Daniel | Bernstein | 1314885, 1314592, 1314919, 1314540 | Authenticated Ciphers |
Bobby | Bhattacharjee | 1314857 | TWC: Medium: Collaborative: DIORE: Digital Insertion and Observation Resistant Execution |
Swarup | Bhunia | 1441667, 1603483 | IPTrust: A Comprehensive Framework for IP Integrity Validation |
Matt | Bishop | 1303048, 1303211 | Development and Testing of a Secure Programming Clinic |
Marina | Blanton | 1319090 | Techniques and Tools for General-Purpose Secure Computing and Outsourcing |
Matthieu | Bloch | 1527387 | Towards Stealth Networks |
Alexandra | Boldyreva | 1421815 | A Unifying Framework For Theoretical and Empirical Analysis of Secure Communication Protocols |
Travis | Breaux | 1330596 | Privacy Policy Ambiguity and Privacy Risk |
Michael | Byrne | 1550936 | Protecting Election Integrity Via Automated Ballot Usability Evaluation |
Kelly | Caine | 1513875 | Studying Journalists to Identify Requirements for Usable, Secure, and Trustworthy Communication |
Ran | Canetti | 1414119, 1413920, 1413964, 1413996 | Modular Approach to Cloud Security |
Justin | Cappos | 1223588 | Lock-in-Pop Design: Only Access Popular Paths in the Kernel |
Cornelia | Caragea | 1421970 | Image Privacy Prediction Using Deep Features |
Bogdan | Carbunar | 1527153, 1526254 | TWC: Small: Collaborative: Cracking Down Online Deception Ecosystems |
Bogdan | Carbunar | 1450619 | EAGER: Digital Interventions for Reducing Social Networking Risks in Adolescents |
Alvaro | Cardenas | 1553683 | Limiting the Impact of Stealthy Attacks in Industrial Control Systems |
David | Cash | 1453132 | Cryptography for Secure Outsourcing |
Shantanu | Chakrabartty | 1525476 | Zero-Power Dynamic Signature for Trust Verification of Passive Sensors and Tags |
John | Chandy | 1318964 | EDU: A Virtual Lab for a Hardware Security Curriculum |
Polo | Chau | 1526254 | TWC: Small: Collaborative: Cracking Down Online Deception Ecosystems |
Rui | Chen | 1554373, 1554480, 1651060 | Response to OPM Data Breach |
Hsinchun | Chen | 1314631 | Identifying SCADA Devices and their Vulnerabilities on the IoT |
Maggie | Cheng | 1537538 | Factoring User Behavior into Network Security Analysis |
Tim | Cheng | 1526695 | Detection of Hardware Trojans Hidden in Unspecified Design Functionality |
Jerry | Cheng | 1449958 | Towards Understanding Smartphone User Privacy: Implication, Derivation, and Protection |
David | Choffnes | 1618955 | Enabling Practical Traffic Analysis Resistance |
Stephen | Chong | 1524052 | Extensible Access Control with Authorization Contracts |
Stephen | Chong | 1421770 | Whip: Higher-Order Contracts for Modern Services |
Stephen | Chong | 1054172 | Automatic Enforcement of Expressive Security Policies using Enclaves |
David | Cok | 1314674 | Library annotations and tools for checking software |
Jedidiah | Crandall | 1420716 | V-DIFT: Vector-Based Dynamic Information Flow Tracking |
Harry | Crane | 1523785 | Edge exchangeability: a new framework for network modeling |
Dana | Dachman-Soled | 1453045 | CAREER: Non-Black-Box Cryptography: Defending Against and Benefiting from Access to Code |
Anton | Dahbura | 1544493 | Modeling Security/Incentive Behaviors |
Alberto | Dainotti | 1423659 | HIJACKS: Detecting and Characterizing Internet Traffic Interception based on BGP Hijacking |
Alberto | Dainotti | 1228994 | Internet Outage Detection and Analysis |
Anupam | Datta | 1423168 | Accountability via Deviance and Causal Determination |
Srini | Devadas | 1523572 | Trapdoor Computational Fuzzy Extractors |
Srini | Devadas | 1411208 | TWC: Small: Ascend: Architecture for Secure Computation on Encrypted Data |
Jintai | Ding | 1565748 | Implementing Practical Provably Secure Authenticated Key Exchange for the Post-Quantum World |
Roger | Dingledine | 1619454, 1619067 | TTP: Defending Against Website Fingerprinting in Tor |
Yevgeniy | Dodis | 1619158 | Designing Secure Hash Functions and Block Ciphers |
Adam | Doupe | 1623269 | Educating the Security Workforce through On-Demand Live Competitions |
Tudor | Dumitras | 1464163 | Measuring Patching at Scale |
April | Edwards (Kontostathis) | 1421896 | SBE: Small: An Analysis of the Relationship Between Cyberaggression and Self-Disclosure among Diverse Youths |
Sara | Eftekharnejad | 1600058 | Securing Smart Power Grids under Data Measurement Cyber Threats |
Thomas | Eisenbarth | 1618837 | MIST: Systematic Analysis of Microarchitectural Information Leakage on Mobile Platforms |
Kirsten | Eisentraeger | 1617802 | Algorithms for number-theoretic problems in cryptography |
Amr | El Abbadi | 1649469 | EAGER: Towards a Better Understanding of Group Privacy in Social Media Community Detection |
William | Enck | 1253346 | CAREER: Secure OS Views for Modern Computing Platforms |
Patrick | Eugster | 1421910 | TWC: Small: Practical Assured Big Data Analysis in the Cloud |
Patrick | Eugster | 1117065 | TC: Small: Least Privilege Enforcement through Secure Memory Views |
Daniel | Fabbri | 1526014 | TWC: Small: Analysis and Tools for Auditing Insider Accesses |
Michalis | Faloutsos | 1314632, 1314603, 1314935 | CoreScope |
Fariborz | Farahmand | 1544090 | A Mathematical Model of Privacy Decisions: A Behavioral Economic Perspective |
Nick | Feamster | 1540066 | Facilitating Free and Open Access to Information on the Internet |
Yunsi | Fei | 1563697 | TWC: Medium: Automating Countermeasures and Security Evaluation against Software Side-channel Attacks |
Yunsi | Fei | 1314655 | Medium: A Unified Statistics-based Framework for Analysis and Evaluation of Side-channel Attacks in Cryptosystems |
Wu-chang | Feng | 1623400 | EDU: A Capture-the-Flag Service for Computer Security Courses |
Michael | Franz | 1513837 | ENCORE: ENhanced program protection through COmpiler-REwriter cooperation |
Rosanne | Gamble | 1619690, 1619641 | Toward a Test Bed for Heavy Vehicle Cyber Security Experimentation |
Vinod | Ganapathy | 1441724 | SaTC: Hardware-Assisted Methods for Operating System Integrity |
Vinod | Ganapathy | 1420815 | TWC: Small: Self-Service Cloud Computing |
Sanjam | Garg | 1464397 | CRII: SaTC: Expanding the Frontiers of Cryptographic Technologies |
Paolo | Gasti | 1619023 | Energy-Efficient Privacy-Preserving Active Authentication of Smartphone Users |
Ryan | Gerdes | 1410000 | Secure and Resilient Vehicular Platooning |
Gabriel | Ghinita | 1523101 | Capacity Building in Security, Privacy and Trust for Geospatial Applications |
Grandon | Gill | 1418711 | Cybersecurity Discussion Cases |
Michael | Goodrich | 1228639, 1228598, 1228485 | Privacy-Preserving Distributed Storage and Computation |
Samuel | Gordon | 1564088 | TWC: Medium: Collaborative: New Protocols and Systems for RAM-Based Secure Computation |
Venu | Govindaraju | 1314803 | Long-term Active User Authentication Using Multi-modal Profiles |
Noel | Greis | 1319045 | TWC SBE: Option: Small: Building Public Cyber Health - Designing and Testing the Efficacy of a School-Focused, Gamification Approach to Create a Secure Computing Environment |
Yong | Guan | 1527579 | Time-Advantage-Based Key Establishment for Low-Cost Wireless Systems |
Mina | Guirguis | 1149397 | Securing Mobile CPS against Stealthy Attacks |
Abhishek | Gupta | 1565487 | CRII: CPS & SaTC: Securing Smart Cyberphysical Systems against Man-in-the-Middle Attacks |
Andreas | Haeberlen | 1065130 | Secure Network Provenance |
John | Hale | 1524940 | Scalable Hybrid Attack Graph Modeling and Analysis |
Michael | Hay | 1409125, 1409143, 1408982 | Pythia: Algorithm Selection for Differential Privacy |
Haibo | He | 1117314 | Secure the Electrical Power Grid: Smart Grid versus Smart Attacks |
Xiali | Hei | 1566166 | CPS security for insulin pumps |
Jeffrey | Hoffstein | 1561709 | Development and Evaluation of Next Generation Homomorphic Encryption Schemes |
Daniel | Holcomb | 1619558 | STARSS: Small: SecureDust -- The Physical Limits of Information Security |
Yuan | Hong | 1618221 | Privacy Preserving Cooperation among Microgrids for Efficient Load Management |
Jason | Hong | 1347186 | Social Cybersecurity |
Jason | Hong | 1228813 | PrivacyGrade.org Grading the Privacy of Smartphone Apps |
Nicholas | Hopper | 1314637 | TWC: Option: Medium: Measurement-Based Design and Analysis of Censorship Circumvention Schemes |
Mark | Horowitz | 1563113 | PRISM: Platform for Rapid Investigation of efficient Scientific-computing & Machine-learning |
Amir | Houmansadr | 1553301 | CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content |
Amir | Houmansadr | 1525642 | TWC: Small: Linking the Unlinkable: Design, Analysis, and Implementation of Network Flow Fingerprints for Fine-grained Traffic Analysis |
Hongxin | Hu | 1537924 | Defending Against Visual Cyberbullying Attacks in Emerging Mobile Social Networks |
Fei | Hu | 1315328 | Cyber-physical System and Big Data Security: Training National Warriors |
Dijiang | Huang | 1528099, 1523994, 1526299 | SRN: Secure and Resilient Networking |
Florence | Hudson | 1650445 | EAGER: Cybersecurity Transition To Practice (TTP) Acceleration |
Warren | Hunt | 1525472 | Formal Analysis of x86 Machine-Code Programs |
Trent | Jaeger | 1408880 | Retrofitting Software for Defense-in-Depth |
Matthew | Jensen | 1421580 | Building the Human Firewall |
Niraj | Jha | 1617628 | TWC: Small: Physiological Information Leakage: A New Front on Health Information Security |
Limin | Jia | 1320470 | Provably Enforcing Practical Multi-Layer Policies in Today’s Extensible Software Platforms |
Zhanpeng | Jin | 1564046, 1564104 | Exploring Vulnerabilities of Brain Biometrics |
Zhanpeng | Jin | 1422417, 1423061 | Brainprint: A Psychophysiological Biometric |
Yier | Jin | 1319105, 1318860 | Toward Trusted 3rd-Party Microprocessor Cores: A Proof Carrying Code Approach |
Mark | Jones | 1422979 | Using a Capability-Enhanced Microkernel as a Testbed for Language-based Security |
David | Kaeli | 1618379 | STARSS: Small: Side-Channel Analysis and Resiliency Targeting Accelerators |
Gai | Kaiser | 1563555 | TWC: Medium: Toward Trustworthy Mutable Replay for Security Patches |
Faisal | Kaleem | 1500055 | CFEAR: Cyber Forensics Education via Augmented Reality |
Burak | Kantarci | 1464273 | Context-Aware Incentives for Trustworthy Crowdsensing via Mobile Social Networks |
Apu | Kapadia | 1408730, 1407788 | A Socio-Technical Approach to Privacy
in a Camera-Rich World |
Jonathan | Katz | 1111599 | TC: Large: Collaborative Research: Practical Secure Two-Party Computation: Techniques, Tools, and Applications |
Eric | Keller | 1406192, 1406225, 1406177 | Switch-level Network Security With The OpenFlow Extension Framework (OFX) |
Oliver | Kennedy | 1409551, 1409303 | Data is Social: Exploiting Data Relationships to Detect Insider Attacks |
Mohammad | Khan | 1343766 | The Role of Emotion in Risk Communication and Warning: Application to Risks of Failures to Update Software |
Daniel | Kifer | 1228669 | WC SBES: Medium: Utility for Private Data Sharing in Social Science |
Taesoo | Kim | 1563848 | Secure Design of SGX Enclaves |
Jonathan | Kimball | 1505610, 1505633 | Secure Algorithms for Cyber-Physical Systems |
Matthias | Kirchner | 1464275 | Camera-based Mobile Device Authentication |
Andrew | Klapper | 1420227 | TWC: Small: Design and Analysis of Symmetric Key Ciphers |
Joerg | Kliewer | 1526547 | Communication under Adversarial Attacks in Complex Networks |
Alfred | Kobsa | 1640664 | EAGER: Collaborative: PRICE: Using process tracing to improve household IoT users' privacy decisions |
Alfred | Kobsa | 1544373 | The Effect of Sensory Stimuli on the Performance of Security-Critical Tasks |
Alfred | Kobsa | 142362 | Cross-Cultural Privacy Prediction |
Tadayoshi | Kohno | 1565252 | TWC: Large: Collaborative: Living in the Internet of Things |
Oleg | Komogortsev | 1250718 | CAREER: Secure and Trustworthy Ocular Biometrics |
Chakraborty | Koushik | 1421068 | Mitigating the Threat of a Malicious Network-on-Chip |
Onur | Koyluoglu | 1617335 | Coding-based Mechanisms for Building Secure Cloud Storage Systems |
Shriram | Krishnamurthi | 1449236 | EAGER: By the People, For the People: Community Ratings for App Privacy |
Ram | Krishnan | 1553696 | CAREER: Group-Centric Secure Information Sharing - Models, Properties, and Implementation |
Ram | Krishnan | 1423481 | TWC: Small: Attribute Based Access Control for Cloud Infrastructure as a Service |
Stephane | Lafortune | 1421122 | Intrusion Detection and Resilience Against Attacks in Cyber and Cyber-Physical Control Systems |
Cedric | Langbort | 1619339 | Strategic information transmission in cyber-socio-physical systems – from threat to boon |
Robert | LaRose | 1318885 | Online Safety for the Ages |
Lucas | Layman | 1619084 | Pocket Security: Smartphone Cybercrime in the Wild |
Kyumin | Lee | 1553035 | Tracking, Revealing and Detecting Crowdsourced Manipulation |
Gwendolyn | Lee | 1537528 | Understanding the Strategic Values of Privacy Practices in Organizations |
Ruby | Lee | 1526493 | STARSS: Small: Collaborative: Practical and Scalable Security Verification of Security-Aware Hardware Architectures |
Insup | Lee | 1505799 | Security and Privacy-Aware Cyber-Physical Systems |
Wenke | Lee | 1409635 | EPICA |
David | Levin | 1564143 | Key Sharing in the HTTPS Ecosystem |
Jun | Li | 1564348, 1564250, 1564039 | Online Social Network Fraud and Attack Research and Identification |
Ninghui | Li | 1640374 | Bridging The Gap between Theory and Practice in Data Privacy |
Zhenhui | Li | 1544455 | Toward Transparency in Public Policy via Privacy Enhanced Social Flow Analysis with Applications to Ecological Networks and Crim |
Feifei | Li | 1514520 | TWC: Medium: Collaborative: Seal: Secure Engine for AnaLytics - From Secure Similarity Search to Secure Data Analytics |
Kang | LI | 1318881 | EDU: Enhancing and Broadening Computer Security Education with Stepwise and Reusable Problem-solving Challenges |
Ninghui | Li | 1314688 | TWC SBE: Medium: Collaborative: User-Centric Risk Communication and Control on Mobile Devices |
Katrina | Ligett | 1254169 | CAREER: The Value of Privacy |
Dan | Lin | 1651455, 1651166 | iPrivacy: Automatic Recommendation of Personalized Privacy Settings for Image Sharing |
Zhiqiang | Lin | 1623276 | Using Virtual Machine Introspection for Deep Cybersecurity Education |
Huijia | Lin | 1528178 | TWC: Small: Oblivious Cloud Storage Systems, from Theory to Practice --- Simpler, More Efficient, More Robust |
Janne | Lindqvist | 1228777 | TWC: Medium: Collaborative: Capturing People's Expectations of Privacy with Mobile Apps by Combining Automated Scanning and Crowdsourcing Techniques |
Heather | Lipford | 1500052 | A Body of Knowledge for Usable Security and Privacy Education |
Heather | Lipford | 1318854 | Discovering Software Vulnerabilities through Interactive Static Analysis |
Peng | Liu | 1422215, 1422206 | Privacy Protection in Social Networks: Bridging the Gap Between User Perception and Privacy Enforcement |
Yao | Liu | 1553304 | A Pathway towards Channel Camouflage and Manipulation Techniques for Wireless Security |
Yao | Liu | 1527144 | TWC: Small: Techniques and Tools for Enforcing Proximity-based Policies in Wireless Systems |
Alex | Liu | 1524698 | Multipath TCP Side Channel Vulnerabilities and Defenses |
Peng | Liu | 1422594 | Towards Agile and Privacy Preserving Cloud Computing |
Mingyan | Liu | 1422211 | TWC: Small: Understanding Network Level Malicious Activities: Classification, Community Detection and Inference of Security Interdependence |
Vinod | Lohani | 1623047 | Development and Analysis of a Spiral Theory-based Cybersecurity Curriculum |
Songwu | Lu | 1528122 | Cellular Network Services in Peril: A Perspective on Control-Plane and Data-Plane Design |
Songwu | Lu | 1422835 | Secure Data Charging Architecture for Mobile Devices in 3G/4G Cellular Networks: Vulnerabilities and Solutions |
Long | Lu | 1421824 | STRUCT: Secure and Trustworthy Compartments in Mobile Applications |
Roman | Lysecky | 1615890 | TWC: Small: Time-Centric Modeling of Correct Behaviors for Efficient Non-intrusive Runtime Detection of Unauthorized System Actions |
Anna | Lysyanskaya | 1422361 | Empowering Anonymity |
Mohamed | Mahmoud | 1619250 | Multi-Layer Approaches for Securing Enhanced AMI Networks against Traffic Analysis Attacks |
Hemanta | Maji | 1618822 | TWC: Small: General and Modular Secure Computation in the Offline-Online Paradigm |
Hemanta | Maji | 1566499 | CRII: SaTC: Computational Correlations: A New Tool for Cryptography |
Yiorgos | Makris | 1514050 | Hardware Trojans in Wireless Networks: Risks & Remedies |
Zhuoqing | Mao | 1318306, 1526455 | MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era |
Stephen | McCamant | 1526319 | Quantitative Information Flow Measurement |
Jay | McCarthy | 1617307 | Automated Protocol Design and Refinement |
Hoda | Mehrpouyan | 1657774 | Privacy Management in Ubiquitous Environments |
Stephen | Miller | 1526663 | Lattices, modularity, and crypto |
Jelena | Mirkovic | 1319215 | FRADE: Flash cRowd Attack DEfense |
Jelena | Mirkovic | 1224035 | Revitalizing Cyber-Security Education Through Competitions |
Alan | Mislove | 1563320 | Measuring and Improving the Management of Today's PKI |
Alan | Mislove | 1421444 | Towards Robust Crowd Computations |
John | Mitchell | 1500089 | Cybersecurity Education for Policy Makers |
Prateek | Mittal | 1423139 | Anonymity Against AS-level Adversaries |
Sibin | Mohan | 1423334 | Behavior-Based Zero-Day Intrusion Detection for Real-time Cyber-Physical Systems |
Arjun | Mukherjee | 1527364 | Statistical Models for Opinion Spam Detection Leveraging Linguistic and Behavioral Cues |
Venkitasubramaniam | Muthuramakrishnan | 1526377 | Understanding the Complexity of Concurrent Security |
Brad | Myers | 1423054 | TWC: Small: Empirical Evaluation of the Usability and Security Implications of Application Programming Interface Design |
Arvind | Narayanan | 1526353 | Online tracking: Threat Detection, Measurement and Response |
David | Naumann | 1228930 | TWC: Medium: Collaborative: Flexible and Practical Information Flow Assurance for Mobile Apps |
Nick | Nikiforakis | 1617593 | TWC: Small: Emerging Attacks Against the Mobile Web and Novel Proxy Technologies for Their Containment |
Nick | Nikiforakis | 1527086 | TWC: Small: Cross-application and Cross-platform Tracking of Web Users: Techniques and Countermeasures |
Kobbi | Nissim | 1565387, 1565365 | Computing over Distributed Sensitive Data |
Cristina | Nita-Rotaru | 1654137 | Improving Protocol Vulnerability Discovery via Semantic Interpretation of Textual Specifications |
Guevara | Noubir | 1409453, 1409053 | TWC: Medium: Collaborative: Strengthening Wi-Fi Network Wide |
Sewoong | Oh | 1527754 | Fundamental limits of differential privacy |
Daniela | Oliveira | 1513055 | TWC: Medium: Collaborative: Developer Crowdsourcing: Capturing, Understanding, and Addressing Security-related Blind Spots in APIs |
Daniela | Olivera | 1464794 | Age-Related Vulnerabilities to Social-Engineering Attacks |
Michael | Orshansky | 1527888 | STARSS: Small: Simulation-Based Verification of EM Side-Channel Attack Resilience of Embedded Cryptographic Systems |
Michael | Orshansky | 1441484 | SaTC: STARSS: Hardware Authentication through High-Capacity PUF-Based Secret Key Generation and Lattice Coding |
Rafail | Ostrovsky | 1619348 | Cryptography and Communication Complexity |
Xinming | Ou | 1314925 | Bringing Anthropology into Cybersecurity |
Charalampos | Papamanthou | 1526631, 1526950, 1525044 | Applications of Data Structures to Security Problems |
Charalampos | Papamanthou | 1514261, 1526950 | IntegriDB: Verifiable SQL for Outsourced Databases |
Abhishek | Parakh | 1623380 | EDU: QuaSim: A Virtual Interactive Quantum Cryptography Educator-A Project-based Gamified Educational Paradigm |
Keshab | Parhi | 1441639 | SaTC: STARSS: Design of Secure and Anti-Counterfeit Integrated Circuits |
Sameer | Patil | 1548779 | Privacy Compliance by Design |
Vern | Paxson | 1518918, 1518523, 1602399, 1518845 | Towards a Science of Censorship Resistance |
Mathias | Payer | 1464155 | Data Confidentiality and Integrity |
Chunyi | Peng | 1527613 | Cellular Network Services in Peril: A Perspective on Control-Plane and Data-Plane Design |
Chunyi | Peng | 1421933 | Secure Data Charging Architecture for Mobile Devices in 3G/4G Cellular Networks: Vulnerabilities and Solutions |
Roberto | Perdisci | 1149051 | Reconstructing and investigating in-the-wild web-based malware downloads |
Michael | Petullo | 1464121 | CRII: SaTC: Next-Generation Robust Software |
Vir | Phoha | 1527795 | Spoof-resistant Authentication Through Phone and Wearables |
Benjamin | Pierce | 1513854 | TWC: Medium: Micro-Policies: A Framework for Tag-Based Security Monitors |
Jules | Polonetsky | 1654085 | Privacy Research and Data Responsibility Research Coordination Network (RCN) |
Michalis | Polychronakis | 1617902 | TWC: Small: Combating Environment-aware Malware |
Dmitry | Ponomarev | 1422401 | TWC: Small: Side Channels through Lower-Level Caches: Attacks, Defenses and Security Metrics |
Atul | Prakash | 1318722 | TWC: Small: Discovering and Restricting Undesirable Information Flows Between Multiple Spheres of Activities |
Zhiyun | Qian | 1464410 | TCP Side Channels – Real Threats |
Emilee | Rader | 1116544, 1115926 | Influencing Mental Models of Security |
Emilee | Rader | 1524296 | TWC: Small: Designing a Coordination Mechanism for Managing Privacy as a Common-Pool Resource |
Jeyavijayan | Rajendran | 1618797 | Secure Split Manufacturing |
Zvonimir | Rakamaric | 1527526 | DEKER: DECOMPOSING OS KERNELS |
Samuel | Ransbotham | 1350061 | Using Analytics on Security Data to Understand Negative Innovations |
Raghav | Rao | 1651475 | An Investigation of the Propagation of Error-Resistant and Error-Prone Messages Over Large-Scale Information Networks |
Alexander | Rasin | 1656268 | TTP: Small: A Kit for Exploring Databases under the Hood for Security, Forensics and Data Recovery |
Indrakshi | Ray | 1619641 | Toward a Test Bed for Heavy Vehicle Cyber Security Experimentation |
Aunshul | Rege | 1453040 | Understanding Adaptive Adversarial Behavior and Decision-Making Processes in Cyberattacks |
Michael | Reiter | 1330599, 1330308, 1330659 | Rethinking Security in the Era of Cloud Computing |
Kui | Ren | 1262277 | CAREER: Secure and Privacy-assured Data Service Outsourcing in Cloud Computing |
Leonid | Reyzin | 1422965 | TWC: Small: Noisy Secrets as Alternatives to Passwords and PKI |
Golden | Richard | 1358723 | EAGER: Integrating Cognitive and Computer Science to Improve Cyber Security |
Franziska | Roesner | 1463968 | CRII: SaTC: Improving Computer Security Technologies through Analyzing Security Needs and Practices of Journalists |
Franziska | Roesner | 1513575 | TWC: Medium: Collaborative: Studying Journalists to Identify Requirements for Usable, Secure, and Trustworthy Communication |
Phillip | Rogaway | 1228828 | Deconstructing Encryption |
Keith | Ross | 1318659 | Protecting the Online Privacy of Users of Social Networks |
Norman | Sadeh | 1513957 | Towards Personalized Privacy Assistant: Understanding Privacy Decision Making and Behavioral Impact |
Amit | Sahai | 1413955, 1414000, 1414023, 1414082 | CEF: Center for Encrypted Functionalities |
Ravinderpal | Sandhu | 1111925 | Security Metrics |
Lalitha | Sankar | 1350914 | CAREER: Privacy-Guaranteed Distributed Interactions in Critical Infrastructure Networks |
Fareena | Saqib | 1623299 | HACE Lab: An Online Hardware Security Attack and Countermeasure Evaluation Lab |
Fareena | Saqib | 1566530 | Hardware based Authentication and Trusted Platform Module functions (HAT) for IoTs |
Anand | Sarwate | 1617849 | TWC: Small: PERMIT: Privacy-Enabled Resource Management for IoT Networks |
Ioannis | Savidis | 1648878 | On-Chip Real-Time Hardware Trojan Detection |
Lori | Scarlatos | 1623150 | Branching Interactive Graphic Stories for Cybersecurity Education |
Patrick | Schaumont | 1441710 | FAME: Fault-attack aware Microprocessor |
Stephanie | Schuckers | 1314792 | Long-term Active User Authentication Using Multi-modal Profiles |
David | Schuster | 1553018 | Understanding Human Cognition in Computer Network Defense |
Kent | Seamons | 1528022 | TrustBase |
Vyas | Sekar | 1564009 | TWC: Medium: Handling a Trillion Unfixable Flaws on Billions of Internet-of-Things |
Ramasubramanian | Sekar | 1319137 | TWC: Small: A platform for enhancing security of binary code |
Shamik | Sengupta | 1528167 | Establishing market based mechanisms for CYBer security information EXchange (CYBEX) |
Sanjit | Seshia | 1528108 | STARSS: Small: Collaborative: Specification and Verification for Secure Hardware |
Micah | Sherr | 1527401 | TWC: TTP Option: Small: Collaborative: Enhancing Anonymity Network Resilience against Pervasive Internet Attacks |
Micah | Sherr | 1149832 | CAREER: Private Communication in Strongly Adversarial Networks |
Amit | Sheth | 1513721 | Context-Aware Harassment Detection on Social Media |
Yaoyun | Shi | 1526928 | A Quantum Approach to Hardware Security |
Akbar | Siami Namin | 1347521 | Sonifying Cyber-Security Cues |
Lisa | Singh | 1223825 | Assessing Online Information Exposure Using Web Footprints |
Radu | Sion | 1562376 | CipherLocker: Encrypted Regulatory-Compliant Privacy-Enabled Drag and Drop Cloud Storage |
Radu | Sion | 1526707 | Practical Plausible Deniability for Storage Systems |
Adam | Slagell | 1314891 | Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids |
Jonathan | Smith | 1513687 | HARDWARE-ASSISTED LIGHTWEIGHT CAPABILITY OPTIMIZATION (HALCYON) |
Meera | Sridhar | 1566321 | CRII: SaTC: A Language Based Approach to Hybrid Mobile App Security |
Matthew | Stamm | 1553610 | CAREER: Scaling Forensic Algorithms for Big Data and Adversarial Environments |
Kevin | Steinmetz | 1616804 | Technological Con-Artistry |
Scott | Stoller | 1421893 | Access Control Policy Mining and Management |
Cynthia | Sturton | 1651276 | Identifying Security Critical Properties of a Processor |
Cynthia | Sturton | 1464209 | CRII: SaTC: Detecting Security Vulnerabilities in Instruction Set Architectures |
Gookwon | Suh | 1513797 | TWC: Medium: Language-Hardware Co-Design for Practical and Verifiable Information Flow Control |
S. Shyam | Sundar | 1450500 | Why Do We Reveal or Withhold Private Information? Exploring Heuristics and Designing Interface Cues for Secure Computing |
Jakub | Szefer | 1524680, 1526493 | Practical and Scalable Security Verification of Security-Aware Hardware Architectures |
Patrick | Tague | 1149582 | CAREER: Inference-Based Adaptation Techniques for Next Generation Jamming and Anti-Jamming Capabilities |
Gang | Tan | 1624126 | TWC: Medium: Collaborative: Retrofitting Software for Defense-in-Depth |
Gang | Tan | 1624124 | CAREER: User-Space Protection Domains for Compositional Information Security |
Chiu | Tan | 1618398 | TWC: Small: Evidence of Presence for Intelligent Vehicles using Environment-Based Security |
Mark | Tehranipoor | 1561023 | Design of Low-Cost Memory-Based Security Primitives and Techniques for High-Volume Products |
Stefano | Tessaro | 1553758 | CAREER: The Theoretical Foundations of Symmetric Cryptography |
Stefano | Tessaro | 1423566 | TWC: Small: Better Security for Efficient Secret-Key Cryptography |
Russell | Tessier | 1318497 | New Directions in FPGA Security |
Michael | Thomas | 1623267 | A Cybersecurity Collectable Card Game for Urban Youth |
Donald | Towsley | 1564067 | Limits and Algorithms for Covert Communications |
Donald | Truxillo | 1544535 | Exploring Job Applicant Privacy Concerns |
Salil | Vadhan | 1237235 | Privacy Tools for Sharing Research Data |
Jaideep | Vaidya | 1422501 | Privacy Preserving Outlier Detection |
Joe | Valacich | 1615696 | Identifying Malicious Insiders through Mouse Cursor Movements |
Narseo | Vallina-Rodriguez | 1564329 | Lumen: Fine-Grained Visibility and Control of Mobile Traffic in User-Space |
Marten | van Dijk | 1617774 | Self-Recovering Certificate Authorities using Backward and Forward Secure Key Management |
Nico | van Eijk and Daniel Weitzner | 1639994 | Transparency Bridges: Exploring Transparency Requirements in Smartphone Ecosystems |
Barbara | van Schewick | 1330141, 1330596, 1330214 | The Usable Privacy Policy Project |
Eugene | Vasserman | 1224007, 1253930 | TWC TTP: Small: Security, Privacy, and Trust for Systems of Coordinating Medical Devices |
Guru | Venkataramani | 1618786 | STARSS: Small: Defending Against Hardware Covert Timing Channels |
Giovanni | Vigna | 1408632 | TrustDroid |
Roopa | Vishwanathan | 1566297 | CRII: SaTC: Automated Proof Construction and Verification for Attribute-based Cryptography |
David | Voorhees | 1500033 | SaTC-EDU: EAGER: INCUBATE - INjecting and assessing Cybersecurity edUcation with little internal suBject mATter Expertise |
Michael | Walfish | 1514422 | TWC: Medium: Scaling proof-based verifiable computation |
Kuang-Ching | Wang | 1643020 | EAGER: Towards a Traffic Analysis Resistant Internet Architecture |
Ting | Wang | 1566526 | CRII: SaTC: Re-Envisioning Contextual Services and Mobile Privacy in the Era of Deep Learning |
Weichao | Wang | 1523096 | Developing Security Education Materials for Future Advanced Manufacturing Engineering Workforce |
Yang | Wang | 1464347 | Individualized Mental Model and Universal Privacy Dashboard |
Zhi | Wang | 1453020 | CAREER: Towards Trustworthy Operating Systems |
Jingguo | Wang | 1420758 | Risk of Data Breaches in Financial Institutions: A Routine Activity Perspective |
Weichao | Wang | 1303356 | Integrated Learning Environment for Cyber Security of Smart Grid |
Wendy Hui | Wang | 1350324 | Verifiable Outsourcing of Data Mining Computations |
Steven | Weber | 1228847 | TTP: Medium Securing the Wireless Philadelphia Network |
Hoeteck | Wee | 1445424 | SaTC: Small: New Challenges in Functional Encryption |
Shuangqing | Wei | 1320351 | Security in Dynamic Environments: Harvesting Network Randomness and Diversity |
Ning | Weng | 1623353, 1623247, 1623268, 1623277 | EDU: Collaborative: Integrating Embedded Systems Security into Computer Engineering and Science Curricula |
Laurie | Williams | 1318428 | Motivating and Reaching University Students and Professionals with Software Security Education |
Tilman | Wolf | 1617458 | TWC: Small: Hardware Security for Embedded Computing Systems |
Rebecca | Wright | 1646856, 1646890 | Anomaly Detection in Multilayer Networks |
Xintao | Wu | 1523115, 1523154 | Enhancing Education in Genetic Privacy |
Dinghao | Wu | 1223710 | Translingual Obfuscation |
Tao | Xie | 1513939, 1513690 | TWC: Medium: Collaborative: Improving Mobile-Application Security via Text Analytics |
Kaiqi | Xiong | 1620862 | EAGER: Collaborative: Computational Cognitive Modeling of User Security and Incentive Behaviors |
Li | Xiong | 1618932 | Spatiotemporal Privacy for Location Based Applications |
Dongyan | Xu | 1409668, 1409534 | Binary-Centric Forensic Analysis of Advanced Cyber Attacks Against Enterprise Environments |
Dianxiang | Xu | 1522847 | Software Artifact Repository |
Dianxiang | Xu | 1359590 | Automated Conformance Testing of Attribute-Based Access Control and Obligation Policies |
Guanhua | Yan | 1618631 | TWC: Small: A Moving Target Approach to Enhancing Machine Learning-Based Malware Defense |
Qiben | Yan | 1566388 | Non-intrusive Detection of Mobile Malware and Botnets |
Junfeng | Yang | 1564055, 1563843 | TWC: Medium: Collaborative: Efficient Repair of Learning Systems via Machine Unlearning |
Shanchieh | Yang | 1526383 | Automating Attack Strategy Recognition to Enhance Cyber Threat Prediction |
Baijian | Yang | 1500046 | Enhancing Cybersecurity Education Through a Representational Fluency Model |
Alec | Yasinsac | 1636470 | Cybersecurity Technology Transfer to Practice (TTP) |
Yanfang | Ye | 1618629 | Intelligent Malware Detection Utilizing Novel File Relation-Based Features and Resilient Techniques for Adversarial Attacks |
Vinod | Yegneswaran | 1514503 | MALDIVES: Toward a Comprehensive Understanding of Malware Delivery Mechanisms |
Vinod | Yegneswaran | 1314956 | HIMALAYAS |
Lei | Ying | 1618768 | TWC SBE: Small: Towards an Economic Foundation of Privacy-Preserving Data Analytics: Incentive Mechanisms and Fundamental Limits |
Meng | Yu | 1422355, 1422594 | Towards Agile and Privacy-Preserving Cloud Computing |
Shimeng | Yu | 1615774 | Design of RRAM based Hardware Security Primitives |
Alenka | Zajic | 1318934 | Quantitative Analysis and Reporting of Electromagnetic Covert and Side Channel Vulnerabilities |
Kai | Zeng | 1619073 | Secure Near Field Communications between Mobile Devices |
Mark | Zhandry | 1616442 | Encryptor Combiners |
Yanchao | Zhang | 1421999, 1700032 | TWC: Small: Collaborative: Secure and Usable Mobile Authentication for People with Visual Impairment |
Yanchao | Zhang | 1700032 | TWC: Small: Collaborative: Secure and Usable Mobile Authentication for People with Visual Impairment |
Yanchao | Zhang | 1619251 | TWC: Small: Secure Mobile Devices through Multiple Lines of Defense |
Zhiru | Zhang | 1618275 | STARSS: Small: Automatic Synthesis of Verifiably Secure Hardware Accelerators |
Yinqian | Zhang | 1566444 | Rethinking Side Channel Security on Untrusted OS |
Gang | Zhou | 1618300 | Energy-Efficient Privacy-Preserving Active Authentication of Smartphone Users |
Yilu | Zhou | 1551004 | Can You Trust Apps Age Recommendations? Inconsistent and Unreliable Maturity Ratings on Mobile Platforms |
Lina | Zhou | 1527684 | What Online Reviewer Behaviors Really Matter? |
Sencun | Zhu | 1618684 | Reputation-Escalation-as-a-Service: Analyses and Defenses |