| Lead PI First Name | Lead PI Last Name | NSF Project Award Number(s) | Project Title |
| William | Adams | 1422078 | Integrated Smart Grid Analytics for Anomaly Detection |
| Mustaque | Ahamad | 1514035 | Exposing and Mitigating Cross-Channel Attacks |
| Mustaque | Ahamad | 1318167 | Securing the New Converged Telephony Landscape |
| Irfan | Ahmed | 1500101 | EAGER: Peer Instruction for Cybersecurity Education |
| Kemal | Akkaya | 1550313 | Privacy-Preserving Data Collection and Access in 802.11s-based Smart Grid Applications |
| Ehab | Al-Shaer | 1352238 | Adversary-aware Host Address Mutation |
| Laura | Albert McLay | 1422768 | An optimization framework for prioritizing mitigations for securing information technology infrastructure |
| Theodore | Allen | 1409214 | Data-Driven Cyber Vulnerability Maintenance |
| Ardalan | Amiri Sani | 1617513 | Enhancing the Security and Performance of GPU Access in Web Browsers |
| Bonnie | Anderson | 1422831 | The Force of Habit: Using fMRI to Explain Users’ Habituation to Security Warnings |
| Mohd | Anwar | 1318501 | Improving Security Behavior of Employees in Cyberspace through Evidence-based Malware Reports and E-Learning Materials |
| Raul | Aranovich | 1445079 | Risk detection in OSS teams with NLP |
| Reza | Azarderakhsh | 1661557 | Post-quantum Cryptography |
| Michael | Bachmann | 1500077 | Education Initiative TECH MeD: Transdisciplinary Education for Critical Hacks of Medical Devices |
| Saurabh | Bagchi | 1548114 | Modeling Deception In Information Security As A Hypergame - A Primer |
| Boaz | Barak | 1618026 | Complexity Assumptions for Cryptographic Schemes |
| Emery | Berger | 1525888, 1525992 | EVADE: EVidence-Assisted Detection and Elimination of Vulnerabilities |
| Daniel | Bernstein | 1314885, 1314592, 1314919, 1314540 | Authenticated Ciphers |
| Bobby | Bhattacharjee | 1314857 | TWC: Medium: Collaborative: DIORE: Digital Insertion and Observation Resistant Execution |
| Swarup | Bhunia | 1441667, 1603483 | IPTrust: A Comprehensive Framework for IP Integrity Validation |
| Matt | Bishop | 1303048, 1303211 | Development and Testing of a Secure Programming Clinic |
| Marina | Blanton | 1319090 | Techniques and Tools for General-Purpose Secure Computing and Outsourcing |
| Matthieu | Bloch | 1527387 | Towards Stealth Networks |
| Alexandra | Boldyreva | 1421815 | A Unifying Framework For Theoretical and Empirical Analysis of Secure Communication Protocols |
| Travis | Breaux | 1330596 | Privacy Policy Ambiguity and Privacy Risk |
| Michael | Byrne | 1550936 | Protecting Election Integrity Via Automated Ballot Usability Evaluation |
| Kelly | Caine | 1513875 | Studying Journalists to Identify Requirements for Usable, Secure, and Trustworthy Communication |
| Ran | Canetti | 1414119, 1413920, 1413964, 1413996 | Modular Approach to Cloud Security |
| Justin | Cappos | 1223588 | Lock-in-Pop Design: Only Access Popular Paths in the Kernel |
| Cornelia | Caragea | 1421970 | Image Privacy Prediction Using Deep Features |
| Bogdan | Carbunar | 1527153, 1526254 | TWC: Small: Collaborative: Cracking Down Online Deception Ecosystems |
| Bogdan | Carbunar | 1450619 | EAGER: Digital Interventions for Reducing Social Networking Risks in Adolescents |
| Alvaro | Cardenas | 1553683 | Limiting the Impact of Stealthy Attacks in Industrial Control Systems |
| David | Cash | 1453132 | Cryptography for Secure Outsourcing |
| Shantanu | Chakrabartty | 1525476 | Zero-Power Dynamic Signature for Trust Verification of Passive Sensors and Tags |
| John | Chandy | 1318964 | EDU: A Virtual Lab for a Hardware Security Curriculum |
| Polo | Chau | 1526254 | TWC: Small: Collaborative: Cracking Down Online Deception Ecosystems |
| Rui | Chen | 1554373, 1554480, 1651060 | Response to OPM Data Breach |
| Hsinchun | Chen | 1314631 | Identifying SCADA Devices and their Vulnerabilities on the IoT |
| Maggie | Cheng | 1537538 | Factoring User Behavior into Network Security Analysis |
| Tim | Cheng | 1526695 | Detection of Hardware Trojans Hidden in Unspecified Design Functionality |
| Jerry | Cheng | 1449958 | Towards Understanding Smartphone User Privacy: Implication, Derivation, and Protection |
| David | Choffnes | 1618955 | Enabling Practical Traffic Analysis Resistance |
| Stephen | Chong | 1524052 | Extensible Access Control with Authorization Contracts |
| Stephen | Chong | 1421770 | Whip: Higher-Order Contracts for Modern Services |
| Stephen | Chong | 1054172 | Automatic Enforcement of Expressive Security Policies using Enclaves |
| David | Cok | 1314674 | Library annotations and tools for checking software |
| Jedidiah | Crandall | 1420716 | V-DIFT: Vector-Based Dynamic Information Flow Tracking |
| Harry | Crane | 1523785 | Edge exchangeability: a new framework for network modeling |
| Dana | Dachman-Soled | 1453045 | CAREER: Non-Black-Box Cryptography: Defending Against and Benefiting from Access to Code |
| Anton | Dahbura | 1544493 | Modeling Security/Incentive Behaviors |
| Alberto | Dainotti | 1423659 | HIJACKS: Detecting and Characterizing Internet Traffic Interception based on BGP Hijacking |
| Alberto | Dainotti | 1228994 | Internet Outage Detection and Analysis |
| Anupam | Datta | 1423168 | Accountability via Deviance and Causal Determination |
| Srini | Devadas | 1523572 | Trapdoor Computational Fuzzy Extractors |
| Srini | Devadas | 1411208 | TWC: Small: Ascend: Architecture for Secure Computation on Encrypted Data |
| Jintai | Ding | 1565748 | Implementing Practical Provably Secure Authenticated Key Exchange for the Post-Quantum World |
| Roger | Dingledine | 1619454, 1619067 | TTP: Defending Against Website Fingerprinting in Tor |
| Yevgeniy | Dodis | 1619158 | Designing Secure Hash Functions and Block Ciphers |
| Adam | Doupe | 1623269 | Educating the Security Workforce through On-Demand Live Competitions |
| Tudor | Dumitras | 1464163 | Measuring Patching at Scale |
| April | Edwards (Kontostathis) | 1421896 | SBE: Small: An Analysis of the Relationship Between Cyberaggression and Self-Disclosure among Diverse Youths |
| Sara | Eftekharnejad | 1600058 | Securing Smart Power Grids under Data Measurement Cyber Threats |
| Thomas | Eisenbarth | 1618837 | MIST: Systematic Analysis of Microarchitectural Information Leakage on Mobile Platforms |
| Kirsten | Eisentraeger | 1617802 | Algorithms for number-theoretic problems in cryptography |
| Amr | El Abbadi | 1649469 | EAGER: Towards a Better Understanding of Group Privacy in Social Media Community Detection |
| William | Enck | 1253346 | CAREER: Secure OS Views for Modern Computing Platforms |
| Patrick | Eugster | 1421910 | TWC: Small: Practical Assured Big Data Analysis in the Cloud |
| Patrick | Eugster | 1117065 | TC: Small: Least Privilege Enforcement through Secure Memory Views |
| Daniel | Fabbri | 1526014 | TWC: Small: Analysis and Tools for Auditing Insider Accesses |
| Michalis | Faloutsos | 1314632, 1314603, 1314935 | CoreScope |
| Fariborz | Farahmand | 1544090 | A Mathematical Model of Privacy Decisions: A Behavioral Economic Perspective |
| Nick | Feamster | 1540066 | Facilitating Free and Open Access to Information on the Internet |
| Yunsi | Fei | 1563697 | TWC: Medium: Automating Countermeasures and Security Evaluation against Software Side-channel Attacks |
| Yunsi | Fei | 1314655 | Medium: A Unified Statistics-based Framework for Analysis and Evaluation of Side-channel Attacks in Cryptosystems |
| Wu-chang | Feng | 1623400 | EDU: A Capture-the-Flag Service for Computer Security Courses |
| Michael | Franz | 1513837 | ENCORE: ENhanced program protection through COmpiler-REwriter cooperation |
| Rosanne | Gamble | 1619690, 1619641 | Toward a Test Bed for Heavy Vehicle Cyber Security Experimentation |
| Vinod | Ganapathy | 1441724 | SaTC: Hardware-Assisted Methods for Operating System Integrity |
| Vinod | Ganapathy | 1420815 | TWC: Small: Self-Service Cloud Computing |
| Sanjam | Garg | 1464397 | CRII: SaTC: Expanding the Frontiers of Cryptographic Technologies |
| Paolo | Gasti | 1619023 | Energy-Efficient Privacy-Preserving Active Authentication of Smartphone Users |
| Ryan | Gerdes | 1410000 | Secure and Resilient Vehicular Platooning |
| Gabriel | Ghinita | 1523101 | Capacity Building in Security, Privacy and Trust for Geospatial Applications |
| Grandon | Gill | 1418711 | Cybersecurity Discussion Cases |
| Michael | Goodrich | 1228639, 1228598, 1228485 | Privacy-Preserving Distributed Storage and Computation |
| Samuel | Gordon | 1564088 | TWC: Medium: Collaborative: New Protocols and Systems for RAM-Based Secure Computation |
| Venu | Govindaraju | 1314803 | Long-term Active User Authentication Using Multi-modal Profiles |
| Noel | Greis | 1319045 | TWC SBE: Option: Small: Building Public Cyber Health - Designing and Testing the Efficacy of a School-Focused, Gamification Approach to Create a Secure Computing Environment |
| Yong | Guan | 1527579 | Time-Advantage-Based Key Establishment for Low-Cost Wireless Systems |
| Mina | Guirguis | 1149397 | Securing Mobile CPS against Stealthy Attacks |
| Abhishek | Gupta | 1565487 | CRII: CPS & SaTC: Securing Smart Cyberphysical Systems against Man-in-the-Middle Attacks |
| Andreas | Haeberlen | 1065130 | Secure Network Provenance |
| John | Hale | 1524940 | Scalable Hybrid Attack Graph Modeling and Analysis |
| Michael | Hay | 1409125, 1409143, 1408982 | Pythia: Algorithm Selection for Differential Privacy |
| Haibo | He | 1117314 | Secure the Electrical Power Grid: Smart Grid versus Smart Attacks |
| Xiali | Hei | 1566166 | CPS security for insulin pumps |
| Jeffrey | Hoffstein | 1561709 | Development and Evaluation of Next Generation Homomorphic Encryption Schemes |
| Daniel | Holcomb | 1619558 | STARSS: Small: SecureDust -- The Physical Limits of Information Security |
| Yuan | Hong | 1618221 | Privacy Preserving Cooperation among Microgrids for Efficient Load Management |
| Jason | Hong | 1347186 | Social Cybersecurity |
| Jason | Hong | 1228813 | PrivacyGrade.org Grading the Privacy of Smartphone Apps |
| Nicholas | Hopper | 1314637 | TWC: Option: Medium: Measurement-Based Design and Analysis of Censorship Circumvention Schemes |
| Mark | Horowitz | 1563113 | PRISM: Platform for Rapid Investigation of efficient Scientific-computing & Machine-learning |
| Amir | Houmansadr | 1553301 | CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content |
| Amir | Houmansadr | 1525642 | TWC: Small: Linking the Unlinkable: Design, Analysis, and Implementation of Network Flow Fingerprints for Fine-grained Traffic Analysis |
| Hongxin | Hu | 1537924 | Defending Against Visual Cyberbullying Attacks in Emerging Mobile Social Networks |
| Fei | Hu | 1315328 | Cyber-physical System and Big Data Security: Training National Warriors |
| Dijiang | Huang | 1528099, 1523994, 1526299 | SRN: Secure and Resilient Networking |
| Florence | Hudson | 1650445 | EAGER: Cybersecurity Transition To Practice (TTP) Acceleration |
| Warren | Hunt | 1525472 | Formal Analysis of x86 Machine-Code Programs |
| Trent | Jaeger | 1408880 | Retrofitting Software for Defense-in-Depth |
| Matthew | Jensen | 1421580 | Building the Human Firewall |
| Niraj | Jha | 1617628 | TWC: Small: Physiological Information Leakage: A New Front on Health Information Security |
| Limin | Jia | 1320470 | Provably Enforcing Practical Multi-Layer Policies in Today’s Extensible Software Platforms |
| Zhanpeng | Jin | 1564046, 1564104 | Exploring Vulnerabilities of Brain Biometrics |
| Zhanpeng | Jin | 1422417, 1423061 | Brainprint: A Psychophysiological Biometric |
| Yier | Jin | 1319105, 1318860 | Toward Trusted 3rd-Party Microprocessor Cores: A Proof Carrying Code Approach |
| Mark | Jones | 1422979 | Using a Capability-Enhanced Microkernel as a Testbed for Language-based Security |
| David | Kaeli | 1618379 | STARSS: Small: Side-Channel Analysis and Resiliency Targeting Accelerators |
| Gai | Kaiser | 1563555 | TWC: Medium: Toward Trustworthy Mutable Replay for Security Patches |
| Faisal | Kaleem | 1500055 | CFEAR: Cyber Forensics Education via Augmented Reality |
| Burak | Kantarci | 1464273 | Context-Aware Incentives for Trustworthy Crowdsensing via Mobile Social Networks |
| Apu | Kapadia | 1408730, 1407788 | A Socio-Technical Approach to Privacy
in a Camera-Rich World |
| Jonathan | Katz | 1111599 | TC: Large: Collaborative Research: Practical Secure Two-Party Computation: Techniques, Tools, and Applications |
| Eric | Keller | 1406192, 1406225, 1406177 | Switch-level Network Security With The OpenFlow Extension Framework (OFX) |
| Oliver | Kennedy | 1409551, 1409303 | Data is Social: Exploiting Data Relationships to Detect Insider Attacks |
| Mohammad | Khan | 1343766 | The Role of Emotion in Risk Communication and Warning: Application to Risks of Failures to Update Software |
| Daniel | Kifer | 1228669 | WC SBES: Medium: Utility for Private Data Sharing in Social Science |
| Taesoo | Kim | 1563848 | Secure Design of SGX Enclaves |
| Jonathan | Kimball | 1505610, 1505633 | Secure Algorithms for Cyber-Physical Systems |
| Matthias | Kirchner | 1464275 | Camera-based Mobile Device Authentication |
| Andrew | Klapper | 1420227 | TWC: Small: Design and Analysis of Symmetric Key Ciphers |
| Joerg | Kliewer | 1526547 | Communication under Adversarial Attacks in Complex Networks |
| Alfred | Kobsa | 1640664 | EAGER: Collaborative: PRICE: Using process tracing to improve household IoT users' privacy decisions |
| Alfred | Kobsa | 1544373 | The Effect of Sensory Stimuli on the Performance of Security-Critical Tasks |
| Alfred | Kobsa | 142362 | Cross-Cultural Privacy Prediction |
| Tadayoshi | Kohno | 1565252 | TWC: Large: Collaborative: Living in the Internet of Things |
| Oleg | Komogortsev | 1250718 | CAREER: Secure and Trustworthy Ocular Biometrics |
| Chakraborty | Koushik | 1421068 | Mitigating the Threat of a Malicious Network-on-Chip |
| Onur | Koyluoglu | 1617335 | Coding-based Mechanisms for Building Secure Cloud Storage Systems |
| Shriram | Krishnamurthi | 1449236 | EAGER: By the People, For the People: Community Ratings for App Privacy |
| Ram | Krishnan | 1553696 | CAREER: Group-Centric Secure Information Sharing - Models, Properties, and Implementation |
| Ram | Krishnan | 1423481 | TWC: Small: Attribute Based Access Control for Cloud Infrastructure as a Service |
| Stephane | Lafortune | 1421122 | Intrusion Detection and Resilience Against Attacks in Cyber and Cyber-Physical Control Systems |
| Cedric | Langbort | 1619339 | Strategic information transmission in cyber-socio-physical systems – from threat to boon |
| Robert | LaRose | 1318885 | Online Safety for the Ages |
| Lucas | Layman | 1619084 | Pocket Security: Smartphone Cybercrime in the Wild |
| Kyumin | Lee | 1553035 | Tracking, Revealing and Detecting Crowdsourced Manipulation |
| Gwendolyn | Lee | 1537528 | Understanding the Strategic Values of Privacy Practices in Organizations |
| Ruby | Lee | 1526493 | STARSS: Small: Collaborative: Practical and Scalable Security Verification of Security-Aware Hardware Architectures |
| Insup | Lee | 1505799 | Security and Privacy-Aware Cyber-Physical Systems |
| Wenke | Lee | 1409635 | EPICA |
| David | Levin | 1564143 | Key Sharing in the HTTPS Ecosystem |
| Jun | Li | 1564348, 1564250, 1564039 | Online Social Network Fraud and Attack Research and Identification |
| Ninghui | Li | 1640374 | Bridging The Gap between Theory and Practice in Data Privacy |
| Zhenhui | Li | 1544455 | Toward Transparency in Public Policy via Privacy Enhanced Social Flow Analysis with Applications to Ecological Networks and Crim |
| Feifei | Li | 1514520 | TWC: Medium: Collaborative: Seal: Secure Engine for AnaLytics - From Secure Similarity Search to Secure Data Analytics |
| Kang | LI | 1318881 | EDU: Enhancing and Broadening Computer Security Education with Stepwise and Reusable Problem-solving Challenges |
| Ninghui | Li | 1314688 | TWC SBE: Medium: Collaborative: User-Centric Risk Communication and Control on Mobile Devices |
| Katrina | Ligett | 1254169 | CAREER: The Value of Privacy |
| Dan | Lin | 1651455, 1651166 | iPrivacy: Automatic Recommendation of Personalized Privacy Settings for Image Sharing |
| Zhiqiang | Lin | 1623276 | Using Virtual Machine Introspection for Deep Cybersecurity Education |
| Huijia | Lin | 1528178 | TWC: Small: Oblivious Cloud Storage Systems, from Theory to Practice --- Simpler, More Efficient, More Robust |
| Janne | Lindqvist | 1228777 | TWC: Medium: Collaborative: Capturing People's Expectations of Privacy with Mobile Apps by Combining Automated Scanning and Crowdsourcing Techniques |
| Heather | Lipford | 1500052 | A Body of Knowledge for Usable Security and Privacy Education |
| Heather | Lipford | 1318854 | Discovering Software Vulnerabilities through Interactive Static Analysis |
| Peng | Liu | 1422215, 1422206 | Privacy Protection in Social Networks: Bridging the Gap Between User Perception and Privacy Enforcement |
| Yao | Liu | 1553304 | A Pathway towards Channel Camouflage and Manipulation Techniques for Wireless Security |
| Yao | Liu | 1527144 | TWC: Small: Techniques and Tools for Enforcing Proximity-based Policies in Wireless Systems |
| Alex | Liu | 1524698 | Multipath TCP Side Channel Vulnerabilities and Defenses |
| Peng | Liu | 1422594 | Towards Agile and Privacy Preserving Cloud Computing |
| Mingyan | Liu | 1422211 | TWC: Small: Understanding Network Level Malicious Activities: Classification, Community Detection and Inference of Security Interdependence |
| Vinod | Lohani | 1623047 | Development and Analysis of a Spiral Theory-based Cybersecurity Curriculum |
| Songwu | Lu | 1528122 | Cellular Network Services in Peril: A Perspective on Control-Plane and Data-Plane Design |
| Songwu | Lu | 1422835 | Secure Data Charging Architecture for Mobile Devices in 3G/4G Cellular Networks: Vulnerabilities and Solutions |
| Long | Lu | 1421824 | STRUCT: Secure and Trustworthy Compartments in Mobile Applications |
| Roman | Lysecky | 1615890 | TWC: Small: Time-Centric Modeling of Correct Behaviors for Efficient Non-intrusive Runtime Detection of Unauthorized System Actions |
| Anna | Lysyanskaya | 1422361 | Empowering Anonymity |
| Mohamed | Mahmoud | 1619250 | Multi-Layer Approaches for Securing Enhanced AMI Networks against Traffic Analysis Attacks |
| Hemanta | Maji | 1618822 | TWC: Small: General and Modular Secure Computation in the Offline-Online Paradigm |
| Hemanta | Maji | 1566499 | CRII: SaTC: Computational Correlations: A New Tool for Cryptography |
| Yiorgos | Makris | 1514050 | Hardware Trojans in Wireless Networks: Risks & Remedies |
| Zhuoqing | Mao | 1318306, 1526455 | MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era |
| Stephen | McCamant | 1526319 | Quantitative Information Flow Measurement |
| Jay | McCarthy | 1617307 | Automated Protocol Design and Refinement |
| Hoda | Mehrpouyan | 1657774 | Privacy Management in Ubiquitous Environments |
| Stephen | Miller | 1526663 | Lattices, modularity, and crypto |
| Jelena | Mirkovic | 1319215 | FRADE: Flash cRowd Attack DEfense |
| Jelena | Mirkovic | 1224035 | Revitalizing Cyber-Security Education Through Competitions |
| Alan | Mislove | 1563320 | Measuring and Improving the Management of Today's PKI |
| Alan | Mislove | 1421444 | Towards Robust Crowd Computations |
| John | Mitchell | 1500089 | Cybersecurity Education for Policy Makers |
| Prateek | Mittal | 1423139 | Anonymity Against AS-level Adversaries |
| Sibin | Mohan | 1423334 | Behavior-Based Zero-Day Intrusion Detection for Real-time Cyber-Physical Systems |
| Arjun | Mukherjee | 1527364 | Statistical Models for Opinion Spam Detection Leveraging Linguistic and Behavioral Cues |
| Venkitasubramaniam | Muthuramakrishnan | 1526377 | Understanding the Complexity of Concurrent Security |
| Brad | Myers | 1423054 | TWC: Small: Empirical Evaluation of the Usability and Security Implications of Application Programming Interface Design |
| Arvind | Narayanan | 1526353 | Online tracking: Threat Detection, Measurement and Response |
| David | Naumann | 1228930 | TWC: Medium: Collaborative: Flexible and Practical Information Flow Assurance for Mobile Apps |
| Nick | Nikiforakis | 1617593 | TWC: Small: Emerging Attacks Against the Mobile Web and Novel Proxy Technologies for Their Containment |
| Nick | Nikiforakis | 1527086 | TWC: Small: Cross-application and Cross-platform Tracking of Web Users: Techniques and Countermeasures |
| Kobbi | Nissim | 1565387, 1565365 | Computing over Distributed Sensitive Data |
| Cristina | Nita-Rotaru | 1654137 | Improving Protocol Vulnerability Discovery via Semantic Interpretation of Textual Specifications |
| Guevara | Noubir | 1409453, 1409053 | TWC: Medium: Collaborative: Strengthening Wi-Fi Network Wide |
| Sewoong | Oh | 1527754 | Fundamental limits of differential privacy |
| Daniela | Oliveira | 1513055 | TWC: Medium: Collaborative: Developer Crowdsourcing: Capturing, Understanding, and Addressing Security-related Blind Spots in APIs |
| Daniela | Olivera | 1464794 | Age-Related Vulnerabilities to Social-Engineering Attacks |
| Michael | Orshansky | 1527888 | STARSS: Small: Simulation-Based Verification of EM Side-Channel Attack Resilience of Embedded Cryptographic Systems |
| Michael | Orshansky | 1441484 | SaTC: STARSS: Hardware Authentication through High-Capacity PUF-Based Secret Key Generation and Lattice Coding |
| Rafail | Ostrovsky | 1619348 | Cryptography and Communication Complexity |
| Xinming | Ou | 1314925 | Bringing Anthropology into Cybersecurity |
| Charalampos | Papamanthou | 1526631, 1526950, 1525044 | Applications of Data Structures to Security Problems |
| Charalampos | Papamanthou | 1514261, 1526950 | IntegriDB: Verifiable SQL for Outsourced Databases |
| Abhishek | Parakh | 1623380 | EDU: QuaSim: A Virtual Interactive Quantum Cryptography Educator-A Project-based Gamified Educational Paradigm |
| Keshab | Parhi | 1441639 | SaTC: STARSS: Design of Secure and Anti-Counterfeit Integrated Circuits |
| Sameer | Patil | 1548779 | Privacy Compliance by Design |
| Vern | Paxson | 1518918, 1518523, 1602399, 1518845 | Towards a Science of Censorship Resistance |
| Mathias | Payer | 1464155 | Data Confidentiality and Integrity |
| Chunyi | Peng | 1527613 | Cellular Network Services in Peril: A Perspective on Control-Plane and Data-Plane Design |
| Chunyi | Peng | 1421933 | Secure Data Charging Architecture for Mobile Devices in 3G/4G Cellular Networks: Vulnerabilities and Solutions |
| Roberto | Perdisci | 1149051 | Reconstructing and investigating in-the-wild web-based malware downloads |
| Michael | Petullo | 1464121 | CRII: SaTC: Next-Generation Robust Software |
| Vir | Phoha | 1527795 | Spoof-resistant Authentication Through Phone and Wearables |
| Benjamin | Pierce | 1513854 | TWC: Medium: Micro-Policies: A Framework for Tag-Based Security Monitors |
| Jules | Polonetsky | 1654085 | Privacy Research and Data Responsibility Research Coordination Network (RCN) |
| Michalis | Polychronakis | 1617902 | TWC: Small: Combating Environment-aware Malware |
| Dmitry | Ponomarev | 1422401 | TWC: Small: Side Channels through Lower-Level Caches: Attacks, Defenses and Security Metrics |
| Atul | Prakash | 1318722 | TWC: Small: Discovering and Restricting Undesirable Information Flows Between Multiple Spheres of Activities |
| Zhiyun | Qian | 1464410 | TCP Side Channels – Real Threats |
| Emilee | Rader | 1116544, 1115926 | Influencing Mental Models of Security |
| Emilee | Rader | 1524296 | TWC: Small: Designing a Coordination Mechanism for Managing Privacy as a Common-Pool Resource |
| Jeyavijayan | Rajendran | 1618797 | Secure Split Manufacturing |
| Zvonimir | Rakamaric | 1527526 | DEKER: DECOMPOSING OS KERNELS |
| Samuel | Ransbotham | 1350061 | Using Analytics on Security Data to Understand Negative Innovations |
| Raghav | Rao | 1651475 | An Investigation of the Propagation of Error-Resistant and Error-Prone Messages Over Large-Scale Information Networks |
| Alexander | Rasin | 1656268 | TTP: Small: A Kit for Exploring Databases under the Hood for Security, Forensics and Data Recovery |
| Indrakshi | Ray | 1619641 | Toward a Test Bed for Heavy Vehicle Cyber Security Experimentation |
| Aunshul | Rege | 1453040 | Understanding Adaptive Adversarial Behavior and Decision-Making Processes in Cyberattacks |
| Michael | Reiter | 1330599, 1330308, 1330659 | Rethinking Security in the Era of Cloud Computing |
| Kui | Ren | 1262277 | CAREER: Secure and Privacy-assured Data Service Outsourcing in Cloud Computing |
| Leonid | Reyzin | 1422965 | TWC: Small: Noisy Secrets as Alternatives to Passwords and PKI |
| Golden | Richard | 1358723 | EAGER: Integrating Cognitive and Computer Science to Improve Cyber Security |
| Franziska | Roesner | 1463968 | CRII: SaTC: Improving Computer Security Technologies through Analyzing Security Needs and Practices of Journalists |
| Franziska | Roesner | 1513575 | TWC: Medium: Collaborative: Studying Journalists to Identify Requirements for Usable, Secure, and Trustworthy Communication |
| Phillip | Rogaway | 1228828 | Deconstructing Encryption |
| Keith | Ross | 1318659 | Protecting the Online Privacy of Users of Social Networks |
| Norman | Sadeh | 1513957 | Towards Personalized Privacy Assistant: Understanding Privacy Decision Making and Behavioral Impact |
| Amit | Sahai | 1413955, 1414000, 1414023, 1414082 | CEF: Center for Encrypted Functionalities |
| Ravinderpal | Sandhu | 1111925 | Security Metrics |
| Lalitha | Sankar | 1350914 | CAREER: Privacy-Guaranteed Distributed Interactions in Critical Infrastructure Networks |
| Fareena | Saqib | 1623299 | HACE Lab: An Online Hardware Security Attack and Countermeasure Evaluation Lab |
| Fareena | Saqib | 1566530 | Hardware based Authentication and Trusted Platform Module functions (HAT) for IoTs |
| Anand | Sarwate | 1617849 | TWC: Small: PERMIT: Privacy-Enabled Resource Management for IoT Networks |
| Ioannis | Savidis | 1648878 | On-Chip Real-Time Hardware Trojan Detection |
| Lori | Scarlatos | 1623150 | Branching Interactive Graphic Stories for Cybersecurity Education |
| Patrick | Schaumont | 1441710 | FAME: Fault-attack aware Microprocessor |
| Stephanie | Schuckers | 1314792 | Long-term Active User Authentication Using Multi-modal Profiles |
| David | Schuster | 1553018 | Understanding Human Cognition in Computer Network Defense |
| Kent | Seamons | 1528022 | TrustBase |
| Vyas | Sekar | 1564009 | TWC: Medium: Handling a Trillion Unfixable Flaws on Billions of Internet-of-Things |
| Ramasubramanian | Sekar | 1319137 | TWC: Small: A platform for enhancing security of binary code |
| Shamik | Sengupta | 1528167 | Establishing market based mechanisms for CYBer security information EXchange (CYBEX) |
| Sanjit | Seshia | 1528108 | STARSS: Small: Collaborative: Specification and Verification for Secure Hardware |
| Micah | Sherr | 1527401 | TWC: TTP Option: Small: Collaborative: Enhancing Anonymity Network Resilience against Pervasive Internet Attacks |
| Micah | Sherr | 1149832 | CAREER: Private Communication in Strongly Adversarial Networks |
| Amit | Sheth | 1513721 | Context-Aware Harassment Detection on Social Media |
| Yaoyun | Shi | 1526928 | A Quantum Approach to Hardware Security |
| Akbar | Siami Namin | 1347521 | Sonifying Cyber-Security Cues |
| Lisa | Singh | 1223825 | Assessing Online Information Exposure Using Web Footprints |
| Radu | Sion | 1562376 | CipherLocker: Encrypted Regulatory-Compliant Privacy-Enabled Drag and Drop Cloud Storage |
| Radu | Sion | 1526707 | Practical Plausible Deniability for Storage Systems |
| Adam | Slagell | 1314891 | Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids |
| Jonathan | Smith | 1513687 | HARDWARE-ASSISTED LIGHTWEIGHT CAPABILITY OPTIMIZATION (HALCYON) |
| Meera | Sridhar | 1566321 | CRII: SaTC: A Language Based Approach to Hybrid Mobile App Security |
| Matthew | Stamm | 1553610 | CAREER: Scaling Forensic Algorithms for Big Data and Adversarial Environments |
| Kevin | Steinmetz | 1616804 | Technological Con-Artistry |
| Scott | Stoller | 1421893 | Access Control Policy Mining and Management |
| Cynthia | Sturton | 1651276 | Identifying Security Critical Properties of a Processor |
| Cynthia | Sturton | 1464209 | CRII: SaTC: Detecting Security Vulnerabilities in Instruction Set Architectures |
| Gookwon | Suh | 1513797 | TWC: Medium: Language-Hardware Co-Design for Practical and Verifiable Information Flow Control |
| S. Shyam | Sundar | 1450500 | Why Do We Reveal or Withhold Private Information? Exploring Heuristics and Designing Interface Cues for Secure Computing |
| Jakub | Szefer | 1524680, 1526493 | Practical and Scalable Security Verification of Security-Aware Hardware Architectures |
| Patrick | Tague | 1149582 | CAREER: Inference-Based Adaptation Techniques for Next Generation Jamming and Anti-Jamming Capabilities |
| Gang | Tan | 1624126 | TWC: Medium: Collaborative: Retrofitting Software for Defense-in-Depth |
| Gang | Tan | 1624124 | CAREER: User-Space Protection Domains for Compositional Information Security |
| Chiu | Tan | 1618398 | TWC: Small: Evidence of Presence for Intelligent Vehicles using Environment-Based Security |
| Mark | Tehranipoor | 1561023 | Design of Low-Cost Memory-Based Security Primitives and Techniques for High-Volume Products |
| Stefano | Tessaro | 1553758 | CAREER: The Theoretical Foundations of Symmetric Cryptography |
| Stefano | Tessaro | 1423566 | TWC: Small: Better Security for Efficient Secret-Key Cryptography |
| Russell | Tessier | 1318497 | New Directions in FPGA Security |
| Michael | Thomas | 1623267 | A Cybersecurity Collectable Card Game for Urban Youth |
| Donald | Towsley | 1564067 | Limits and Algorithms for Covert Communications |
| Donald | Truxillo | 1544535 | Exploring Job Applicant Privacy Concerns |
| Salil | Vadhan | 1237235 | Privacy Tools for Sharing Research Data |
| Jaideep | Vaidya | 1422501 | Privacy Preserving Outlier Detection |
| Joe | Valacich | 1615696 | Identifying Malicious Insiders through Mouse Cursor Movements |
| Narseo | Vallina-Rodriguez | 1564329 | Lumen: Fine-Grained Visibility and Control of Mobile Traffic in User-Space |
| Marten | van Dijk | 1617774 | Self-Recovering Certificate Authorities using Backward and Forward Secure Key Management |
| Nico | van Eijk and Daniel Weitzner | 1639994 | Transparency Bridges: Exploring Transparency Requirements in Smartphone Ecosystems |
| Barbara | van Schewick | 1330141, 1330596, 1330214 | The Usable Privacy Policy Project |
| Eugene | Vasserman | 1224007, 1253930 | TWC TTP: Small: Security, Privacy, and Trust for Systems of Coordinating Medical Devices |
| Guru | Venkataramani | 1618786 | STARSS: Small: Defending Against Hardware Covert Timing Channels |
| Giovanni | Vigna | 1408632 | TrustDroid |
| Roopa | Vishwanathan | 1566297 | CRII: SaTC: Automated Proof Construction and Verification for Attribute-based Cryptography |
| David | Voorhees | 1500033 | SaTC-EDU: EAGER: INCUBATE - INjecting and assessing Cybersecurity edUcation with little internal suBject mATter Expertise |
| Michael | Walfish | 1514422 | TWC: Medium: Scaling proof-based verifiable computation |
| Kuang-Ching | Wang | 1643020 | EAGER: Towards a Traffic Analysis Resistant Internet Architecture |
| Ting | Wang | 1566526 | CRII: SaTC: Re-Envisioning Contextual Services and Mobile Privacy in the Era of Deep Learning |
| Weichao | Wang | 1523096 | Developing Security Education Materials for Future Advanced Manufacturing Engineering Workforce |
| Yang | Wang | 1464347 | Individualized Mental Model and Universal Privacy Dashboard |
| Zhi | Wang | 1453020 | CAREER: Towards Trustworthy Operating Systems |
| Jingguo | Wang | 1420758 | Risk of Data Breaches in Financial Institutions: A Routine Activity Perspective |
| Weichao | Wang | 1303356 | Integrated Learning Environment for Cyber Security of Smart Grid |
| Wendy Hui | Wang | 1350324 | Verifiable Outsourcing of Data Mining Computations |
| Steven | Weber | 1228847 | TTP: Medium Securing the Wireless Philadelphia Network |
| Hoeteck | Wee | 1445424 | SaTC: Small: New Challenges in Functional Encryption |
| Shuangqing | Wei | 1320351 | Security in Dynamic Environments: Harvesting Network Randomness and Diversity |
| Ning | Weng | 1623353, 1623247, 1623268, 1623277 | EDU: Collaborative: Integrating Embedded Systems Security into Computer Engineering and Science Curricula |
| Laurie | Williams | 1318428 | Motivating and Reaching University Students and Professionals with Software Security Education |
| Tilman | Wolf | 1617458 | TWC: Small: Hardware Security for Embedded Computing Systems |
| Rebecca | Wright | 1646856, 1646890 | Anomaly Detection in Multilayer Networks |
| Xintao | Wu | 1523115, 1523154 | Enhancing Education in Genetic Privacy |
| Dinghao | Wu | 1223710 | Translingual Obfuscation |
| Tao | Xie | 1513939, 1513690 | TWC: Medium: Collaborative: Improving Mobile-Application Security via Text Analytics |
| Kaiqi | Xiong | 1620862 | EAGER: Collaborative: Computational Cognitive Modeling of User Security and Incentive Behaviors |
| Li | Xiong | 1618932 | Spatiotemporal Privacy for Location Based Applications |
| Dongyan | Xu | 1409668, 1409534 | Binary-Centric Forensic Analysis of Advanced Cyber Attacks Against Enterprise Environments |
| Dianxiang | Xu | 1522847 | Software Artifact Repository |
| Dianxiang | Xu | 1359590 | Automated Conformance Testing of Attribute-Based Access Control and Obligation Policies |
| Guanhua | Yan | 1618631 | TWC: Small: A Moving Target Approach to Enhancing Machine Learning-Based Malware Defense |
| Qiben | Yan | 1566388 | Non-intrusive Detection of Mobile Malware and Botnets |
| Junfeng | Yang | 1564055, 1563843 | TWC: Medium: Collaborative: Efficient Repair of Learning Systems via Machine Unlearning |
| Shanchieh | Yang | 1526383 | Automating Attack Strategy Recognition to Enhance Cyber Threat Prediction |
| Baijian | Yang | 1500046 | Enhancing Cybersecurity Education Through a Representational Fluency Model |
| Alec | Yasinsac | 1636470 | Cybersecurity Technology Transfer to Practice (TTP) |
| Yanfang | Ye | 1618629 | Intelligent Malware Detection Utilizing Novel File Relation-Based Features and Resilient Techniques for Adversarial Attacks |
| Vinod | Yegneswaran | 1514503 | MALDIVES: Toward a Comprehensive Understanding of Malware Delivery Mechanisms |
| Vinod | Yegneswaran | 1314956 | HIMALAYAS |
| Lei | Ying | 1618768 | TWC SBE: Small: Towards an Economic Foundation of Privacy-Preserving Data Analytics: Incentive Mechanisms and Fundamental Limits |
| Meng | Yu | 1422355, 1422594 | Towards Agile and Privacy-Preserving Cloud Computing |
| Shimeng | Yu | 1615774 | Design of RRAM based Hardware Security Primitives |
| Alenka | Zajic | 1318934 | Quantitative Analysis and Reporting of Electromagnetic Covert and Side Channel Vulnerabilities |
| Kai | Zeng | 1619073 | Secure Near Field Communications between Mobile Devices |
| Mark | Zhandry | 1616442 | Encryptor Combiners |
| Yanchao | Zhang | 1421999, 1700032 | TWC: Small: Collaborative: Secure and Usable Mobile Authentication for People with Visual Impairment |
| Yanchao | Zhang | 1700032 | TWC: Small: Collaborative: Secure and Usable Mobile Authentication for People with Visual Impairment |
| Yanchao | Zhang | 1619251 | TWC: Small: Secure Mobile Devices through Multiple Lines of Defense |
| Zhiru | Zhang | 1618275 | STARSS: Small: Automatic Synthesis of Verifiably Secure Hardware Accelerators |
| Yinqian | Zhang | 1566444 | Rethinking Side Channel Security on Untrusted OS |
| Gang | Zhou | 1618300 | Energy-Efficient Privacy-Preserving Active Authentication of Smartphone Users |
| Yilu | Zhou | 1551004 | Can You Trust Apps Age Recommendations? Inconsistent and Unreliable Maturity Ratings on Mobile Platforms |
| Lina | Zhou | 1527684 | What Online Reviewer Behaviors Really Matter? |
| Sencun | Zhu | 1618684 | Reputation-Escalation-as-a-Service: Analyses and Defenses |