Project Highlight Slides
Lead PI First NameLead PI Last NameNSF Project Award Number(s)Project Title
WilliamAdams1422078Integrated Smart Grid Analytics for Anomaly Detection
MustaqueAhamad1514035Exposing and Mitigating Cross-Channel Attacks
MustaqueAhamad1318167Securing the New Converged Telephony Landscape
IrfanAhmed1500101EAGER: Peer Instruction for Cybersecurity Education
KemalAkkaya1550313Privacy-Preserving Data Collection and Access in 802.11s-based Smart Grid Applications
EhabAl-Shaer1352238Adversary-aware Host Address Mutation
LauraAlbert McLay1422768An optimization framework for prioritizing mitigations for securing information technology infrastructure
TheodoreAllen1409214Data-Driven Cyber Vulnerability Maintenance
ArdalanAmiri Sani1617513Enhancing the Security and Performance of GPU Access in Web Browsers
BonnieAnderson1422831The Force of Habit:  Using fMRI to Explain Users’ Habituation to Security Warnings 
MohdAnwar1318501Improving Security Behavior of Employees in Cyberspace  through Evidence-based Malware Reports and E-Learning Materials 
RaulAranovich1445079Risk detection in OSS teams with NLP
RezaAzarderakhsh1661557Post-quantum Cryptography
MichaelBachmann1500077Education Initiative TECH MeD: Transdisciplinary Education for Critical Hacks of Medical Devices
SaurabhBagchi1548114Modeling Deception In Information Security As A Hypergame - A Primer
BoazBarak1618026Complexity Assumptions for Cryptographic Schemes
EmeryBerger1525888, 1525992EVADE: EVidence-Assisted Detection and Elimination of Vulnerabilities
DanielBernstein1314885, 1314592, 1314919, 1314540Authenticated Ciphers
BobbyBhattacharjee1314857TWC: Medium: Collaborative: DIORE: Digital Insertion and Observation Resistant Execution
SwarupBhunia1441667, 1603483IPTrust: A Comprehensive Framework for IP Integrity Validation
MattBishop1303048, 1303211Development and Testing of a Secure Programming Clinic
MarinaBlanton1319090Techniques and Tools for General-Purpose Secure Computing and Outsourcing
MatthieuBloch1527387Towards Stealth Networks
AlexandraBoldyreva1421815A Unifying Framework For Theoretical and Empirical  Analysis of Secure Communication Protocols
TravisBreaux1330596Privacy Policy Ambiguity and Privacy Risk
MichaelByrne1550936Protecting Election Integrity Via Automated Ballot Usability Evaluation
KellyCaine1513875Studying Journalists to Identify Requirements for Usable, Secure, and Trustworthy Communication
RanCanetti1414119, 1413920, 1413964, 1413996Modular Approach to Cloud Security
JustinCappos1223588Lock-in-Pop Design: Only Access Popular Paths in the Kernel
CorneliaCaragea1421970Image Privacy Prediction Using Deep Features
BogdanCarbunar1527153, 1526254TWC: Small: Collaborative: Cracking Down Online Deception Ecosystems
BogdanCarbunar1450619 EAGER: Digital Interventions for Reducing Social Networking Risks in Adolescents
AlvaroCardenas1553683Limiting the Impact of Stealthy Attacks in Industrial Control Systems
DavidCash1453132Cryptography for Secure Outsourcing
ShantanuChakrabartty1525476Zero-Power Dynamic Signature for Trust Verification of Passive Sensors and Tags
JohnChandy1318964EDU: A Virtual Lab for a Hardware Security Curriculum
PoloChau1526254TWC: Small: Collaborative: Cracking Down Online Deception Ecosystems
RuiChen1554373, 1554480, 1651060Response to OPM Data Breach
HsinchunChen1314631Identifying SCADA Devices and their Vulnerabilities on the IoT
MaggieCheng1537538Factoring User Behavior into Network Security Analysis
TimCheng1526695Detection of Hardware Trojans Hidden in Unspecified Design Functionality 
JerryCheng1449958Towards Understanding Smartphone User Privacy: Implication, Derivation, and Protection
DavidChoffnes1618955Enabling Practical Traffic Analysis Resistance
StephenChong1524052Extensible Access Control
with Authorization Contracts
StephenChong1421770Whip: Higher-Order Contracts for Modern Services
StephenChong1054172Automatic Enforcement of
Expressive Security Policies using Enclaves
DavidCok1314674Library annotations and tools for checking software
JedidiahCrandall1420716V-DIFT: Vector-Based Dynamic Information Flow Tracking
HarryCrane1523785Edge exchangeability: a new framework for network modeling
DanaDachman-Soled1453045CAREER: Non-Black-Box Cryptography: Defending Against and Benefiting from Access to Code
AntonDahbura1544493Modeling Security/Incentive Behaviors
AlbertoDainotti1423659HIJACKS: Detecting and Characterizing Internet Traffic Interception based on BGP Hijacking
AlbertoDainotti1228994Internet Outage Detection and Analysis
AnupamDatta1423168Accountability via Deviance and Causal Determination
SriniDevadas1523572Trapdoor Computational Fuzzy Extractors
SriniDevadas1411208TWC: Small: Ascend: Architecture for Secure Computation on Encrypted Data
JintaiDing1565748Implementing Practical Provably Secure Authenticated Key Exchange for the Post-Quantum World
RogerDingledine1619454, 1619067TTP: Defending Against Website Fingerprinting in Tor
YevgeniyDodis1619158Designing Secure Hash Functions and Block Ciphers
AdamDoupe1623269Educating the Security Workforce through On-Demand Live Competitions
TudorDumitras1464163Measuring Patching at Scale
AprilEdwards (Kontostathis)1421896SBE: Small: An Analysis of the Relationship Between Cyberaggression and Self-Disclosure among Diverse Youths
SaraEftekharnejad1600058Securing Smart Power Grids under Data Measurement Cyber Threats
ThomasEisenbarth1618837MIST: Systematic Analysis of Microarchitectural Information Leakage on Mobile Platforms
KirstenEisentraeger1617802Algorithms for number-theoretic problems in cryptography
AmrEl Abbadi1649469EAGER: Towards a Better Understanding of Group Privacy in Social Media Community Detection
WilliamEnck1253346CAREER: Secure OS Views for Modern Computing Platforms
PatrickEugster1421910 TWC: Small: Practical Assured Big Data Analysis in the Cloud
PatrickEugster1117065TC: Small: Least Privilege Enforcement through Secure Memory Views
DanielFabbri1526014TWC: Small: Analysis and Tools for Auditing Insider Accesses
MichalisFaloutsos1314632, 1314603, 1314935CoreScope
FariborzFarahmand1544090A Mathematical Model of Privacy Decisions: A Behavioral Economic Perspective
NickFeamster1540066Facilitating Free and Open Access to Information on the Internet
YunsiFei1563697TWC: Medium: Automating Countermeasures and Security Evaluation against Software Side-channel Attacks
YunsiFei1314655Medium: A Unified Statistics-based Framework for Analysis and Evaluation of Side-channel Attacks in Cryptosystems 
Wu-changFeng1623400EDU: A Capture-the-Flag Service for Computer Security Courses
MichaelFranz1513837ENCORE: ENhanced program protection through COmpiler-REwriter cooperation
RosanneGamble1619690, 1619641Toward a Test Bed for Heavy Vehicle
Cyber Security Experimentation
VinodGanapathy1441724SaTC: Hardware-Assisted Methods for Operating System Integrity
VinodGanapathy1420815TWC: Small: Self-Service Cloud Computing
SanjamGarg1464397 CRII: SaTC: Expanding the Frontiers of Cryptographic Technologies
PaoloGasti1619023Energy-Efficient Privacy-Preserving Active Authentication of Smartphone Users 
RyanGerdes1410000Secure and Resilient Vehicular Platooning
GabrielGhinita1523101Capacity Building in Security, Privacy  and Trust for Geospatial Applications
GrandonGill1418711Cybersecurity Discussion Cases
MichaelGoodrich1228639, 1228598, 1228485Privacy-Preserving Distributed Storage and Computation
SamuelGordon1564088TWC: Medium: Collaborative: New Protocols and Systems for RAM-Based Secure Computation
VenuGovindaraju1314803Long-term Active User Authentication  Using Multi-modal Profiles
NoelGreis1319045 TWC SBE: Option: Small: Building Public Cyber Health - Designing and Testing the Efficacy of a School-Focused, Gamification Approach to Create a Secure Computing Environment
YongGuan1527579Time-Advantage-Based Key Establishment
for Low-Cost Wireless Systems
MinaGuirguis1149397Securing Mobile CPS against Stealthy Attacks
AbhishekGupta1565487CRII: CPS & SaTC: Securing Smart Cyberphysical Systems against Man-in-the-Middle Attacks
AndreasHaeberlen1065130Secure Network Provenance
JohnHale1524940Scalable Hybrid Attack Graph Modeling and Analysis
MichaelHay1409125, 1409143, 1408982Pythia: Algorithm Selection for Differential Privacy
HaiboHe1117314Secure the Electrical Power Grid: Smart Grid versus Smart Attacks
XialiHei1566166CPS security for insulin pumps
JeffreyHoffstein1561709Development and Evaluation of Next Generation Homomorphic Encryption Schemes
DanielHolcomb1619558STARSS: Small: SecureDust -- The Physical Limits of Information Security
YuanHong1618221Privacy Preserving Cooperation among Microgrids for Efficient Load Management
JasonHong1347186Social Cybersecurity Grading the Privacy of Smartphone Apps
NicholasHopper1314637TWC: Option: Medium: Measurement-Based Design and Analysis of Censorship Circumvention Schemes
MarkHorowitz1563113PRISM: Platform for Rapid Investigation of efficient Scientific-computing & Machine-learning
AmirHoumansadr1553301CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content
AmirHoumansadr1525642TWC: Small: Linking the Unlinkable: Design, Analysis, and Implementation of Network Flow Fingerprints for Fine-grained Traffic Analysis
HongxinHu1537924Defending Against Visual Cyberbullying Attacks in Emerging Mobile Social Networks
FeiHu1315328Cyber-physical System and Big Data Security: Training National Warriors
DijiangHuang1528099, 1523994, 1526299SRN: Secure and Resilient Networking
FlorenceHudson1650445EAGER: Cybersecurity Transition To Practice (TTP) Acceleration 
WarrenHunt1525472Formal Analysis of x86 Machine-Code Programs
TrentJaeger1408880Retrofitting Software for Defense-in-Depth
MatthewJensen1421580Building the Human Firewall
NirajJha1617628TWC: Small: Physiological Information Leakage: A New Front on Health Information Security
LiminJia1320470Provably Enforcing Practical Multi-Layer Policies in Today’s Extensible Software Platforms 
ZhanpengJin1564046, 1564104Exploring Vulnerabilities of Brain Biometrics
ZhanpengJin1422417, 1423061Brainprint: A Psychophysiological Biometric
YierJin1319105, 1318860Toward Trusted 3rd-Party Microprocessor Cores:  A Proof Carrying Code Approach
MarkJones1422979Using a Capability-Enhanced Microkernel as a Testbed for Language-based Security 
DavidKaeli1618379STARSS: Small: Side-Channel Analysis and Resiliency Targeting Accelerators
GaiKaiser1563555TWC: Medium: Toward Trustworthy Mutable Replay for Security Patches
FaisalKaleem1500055CFEAR: Cyber Forensics Education via Augmented Reality
BurakKantarci1464273Context-Aware Incentives for Trustworthy Crowdsensing via Mobile Social Networks
ApuKapadia1408730, 1407788A Socio-Technical Approach to Privacy 
in a Camera-Rich World
JonathanKatz1111599TC: Large: Collaborative Research: Practical Secure Two-Party Computation: Techniques, Tools, and Applications
EricKeller1406192, 1406225, 1406177Switch-level Network Security With The OpenFlow Extension Framework (OFX)
OliverKennedy1409551, 1409303Data is Social: Exploiting Data Relationships  to Detect Insider Attacks
MohammadKhan1343766The Role of Emotion in Risk Communication and Warning:  Application to Risks of Failures to Update Software
DanielKifer1228669WC SBES: Medium: Utility for Private Data Sharing in Social Science
TaesooKim1563848Secure Design of SGX Enclaves
JonathanKimball1505610, 1505633Secure Algorithms for Cyber-Physical Systems
MatthiasKirchner1464275Camera-based Mobile Device Authentication
AndrewKlapper1420227 TWC: Small: Design and Analysis of Symmetric Key Ciphers
JoergKliewer1526547Communication under Adversarial Attacks in Complex Networks 
AlfredKobsa1640664EAGER: Collaborative: PRICE: Using process tracing to improve household IoT users' privacy decisions
AlfredKobsa1544373The Effect of Sensory Stimuli on the Performance of Security-Critical Tasks
AlfredKobsa142362Cross-Cultural Privacy Prediction 
TadayoshiKohno1565252TWC: Large: Collaborative: Living in the Internet of Things
OlegKomogortsev1250718CAREER: Secure and Trustworthy Ocular Biometrics
ChakrabortyKoushik1421068Mitigating the Threat of a Malicious Network-on-Chip
OnurKoyluoglu1617335Coding-based Mechanisms for Building Secure Cloud Storage Systems
ShriramKrishnamurthi1449236 EAGER: By the People, For the People: Community Ratings for App Privacy
RamKrishnan1553696 CAREER: Group-Centric Secure Information Sharing - Models, Properties, and Implementation
RamKrishnan1423481TWC: Small: Attribute Based Access Control for Cloud Infrastructure as a Service
StephaneLafortune1421122Intrusion Detection and Resilience Against Attacks in Cyber and Cyber-Physical Control Systems
CedricLangbort1619339Strategic information transmission in cyber-socio-physical systems – from threat to boon
RobertLaRose1318885Online Safety for the Ages
LucasLayman1619084Pocket Security:
Smartphone Cybercrime in the Wild
KyuminLee1553035Tracking, Revealing and Detecting Crowdsourced Manipulation
GwendolynLee1537528Understanding the Strategic Values of Privacy Practices in Organizations
RubyLee1526493STARSS: Small: Collaborative: Practical and Scalable Security Verification of Security-Aware Hardware Architectures
InsupLee1505799Security and Privacy-Aware Cyber-Physical Systems
DavidLevin1564143Key Sharing in the HTTPS Ecosystem
JunLi1564348, 1564250, 1564039Online Social Network Fraud and Attack Research and Identification
NinghuiLi1640374Bridging The Gap between Theory and Practice in Data Privacy
ZhenhuiLi1544455Toward Transparency in Public Policy via Privacy Enhanced Social Flow Analysis with Applications to Ecological Networks and Crim
FeifeiLi1514520TWC: Medium: Collaborative: Seal: Secure Engine for AnaLytics - From Secure Similarity Search to Secure Data Analytics
KangLI1318881EDU: Enhancing and Broadening Computer Security Education with Stepwise and Reusable Problem-solving Challenges
NinghuiLi1314688TWC SBE: Medium: Collaborative: User-Centric Risk Communication and Control on Mobile Devices
KatrinaLigett1254169CAREER: The Value of Privacy
DanLin1651455, 1651166iPrivacy: Automatic Recommendation of  Personalized Privacy Settings for Image Sharing
ZhiqiangLin1623276Using Virtual Machine Introspection for Deep Cybersecurity Education
HuijiaLin1528178TWC: Small: Oblivious Cloud Storage Systems, from Theory to Practice --- Simpler, More Efficient, More Robust
JanneLindqvist1228777TWC: Medium: Collaborative: Capturing People's Expectations of Privacy with Mobile Apps by Combining Automated Scanning and Crowdsourcing Techniques
HeatherLipford1500052A Body of Knowledge for Usable Security and Privacy Education
HeatherLipford1318854Discovering Software Vulnerabilities through Interactive Static Analysis
PengLiu1422215, 1422206Privacy Protection in Social Networks: Bridging the Gap Between User Perception and Privacy Enforcement
YaoLiu1553304A Pathway towards Channel Camouflage and Manipulation Techniques for Wireless Security
YaoLiu1527144TWC: Small: Techniques and Tools for Enforcing Proximity-based Policies in Wireless Systems
AlexLiu1524698Multipath TCP Side Channel Vulnerabilities and Defenses
PengLiu1422594Towards Agile and Privacy Preserving Cloud Computing
MingyanLiu1422211TWC: Small: Understanding Network Level Malicious Activities: Classification, Community Detection and Inference of Security Interdependence
VinodLohani1623047Development and Analysis of a Spiral Theory-based Cybersecurity Curriculum
SongwuLu1528122Cellular Network Services in Peril:  A Perspective on Control-Plane and Data-Plane Design
SongwuLu1422835Secure Data Charging Architecture for Mobile Devices  in 3G/4G Cellular Networks: Vulnerabilities and Solutions
LongLu1421824STRUCT: Secure and Trustworthy Compartments in Mobile Applications
RomanLysecky1615890TWC: Small: Time-Centric Modeling of Correct Behaviors for Efficient Non-intrusive Runtime Detection of Unauthorized System Actions
AnnaLysyanskaya1422361Empowering Anonymity
MohamedMahmoud1619250Multi-Layer Approaches for Securing Enhanced AMI Networks against Traffic Analysis Attacks
HemantaMaji1618822TWC: Small: General and Modular Secure Computation in the Offline-Online Paradigm
HemantaMaji1566499CRII: SaTC: Computational Correlations: A New Tool for Cryptography
YiorgosMakris1514050Hardware Trojans in Wireless Networks: Risks & Remedies
ZhuoqingMao1318306, 1526455MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era
StephenMcCamant1526319Quantitative Information Flow Measurement
JayMcCarthy1617307Automated Protocol Design and Refinement
HodaMehrpouyan1657774Privacy Management in Ubiquitous Environments
StephenMiller1526663Lattices, modularity, and crypto
JelenaMirkovic1319215FRADE: Flash cRowd Attack DEfense
JelenaMirkovic1224035Revitalizing Cyber-Security Education Through Competitions
AlanMislove1563320Measuring and Improving the Management of Today's PKI
AlanMislove1421444Towards Robust Crowd Computations
JohnMitchell1500089Cybersecurity Education for Policy Makers
PrateekMittal1423139Anonymity Against AS-level Adversaries
SibinMohan1423334Behavior-Based Zero-Day Intrusion Detection for Real-time Cyber-Physical Systems
ArjunMukherjee1527364Statistical Models for Opinion Spam Detection Leveraging Linguistic and Behavioral Cues
VenkitasubramaniamMuthuramakrishnan1526377Understanding the Complexity of Concurrent Security
BradMyers1423054TWC: Small: Empirical Evaluation of the Usability and Security Implications of Application Programming Interface Design
ArvindNarayanan1526353Online tracking: Threat Detection, Measurement and Response
DavidNaumann1228930TWC: Medium: Collaborative: Flexible and Practical Information Flow Assurance for Mobile Apps
NickNikiforakis1617593TWC: Small: Emerging Attacks Against the Mobile Web and Novel Proxy Technologies for Their Containment
NickNikiforakis1527086TWC: Small: Cross-application and Cross-platform Tracking of Web Users: Techniques and Countermeasures
KobbiNissim1565387, 1565365Computing over Distributed Sensitive Data
CristinaNita-Rotaru1654137Improving Protocol Vulnerability Discovery via Semantic  Interpretation of Textual Specifications 
GuevaraNoubir1409453, 1409053TWC: Medium: Collaborative: Strengthening Wi-Fi Network Wide
SewoongOh1527754Fundamental limits of differential privacy
DanielaOliveira1513055TWC: Medium: Collaborative: Developer Crowdsourcing: Capturing, Understanding, and Addressing Security-related Blind Spots in APIs
DanielaOlivera1464794Age-Related Vulnerabilities to Social-Engineering Attacks
MichaelOrshansky1527888STARSS: Small: Simulation-Based Verification of EM Side-Channel Attack Resilience of Embedded Cryptographic Systems
MichaelOrshansky1441484SaTC: STARSS: Hardware Authentication through High-Capacity PUF-Based Secret Key Generation and Lattice Coding
RafailOstrovsky1619348Cryptography and Communication Complexity
XinmingOu1314925Bringing Anthropology into Cybersecurity
CharalamposPapamanthou1526631, 1526950, 1525044Applications of Data Structures to Security Problems
CharalamposPapamanthou1514261, 1526950IntegriDB: Verifiable SQL for Outsourced Databases
AbhishekParakh1623380EDU: QuaSim: A Virtual Interactive Quantum Cryptography Educator-A Project-based Gamified Educational Paradigm
KeshabParhi1441639SaTC: STARSS: Design of Secure and Anti-Counterfeit Integrated Circuits
SameerPatil1548779Privacy Compliance by Design


1518523, 1602399, 1518845


Towards a Science of Censorship Resistance
Mathias Payer1464155Data Confidentiality and Integrity
ChunyiPeng1527613Cellular Network Services in Peril:  A Perspective on Control-Plane and Data-Plane Design
ChunyiPeng1421933Secure Data Charging Architecture for Mobile Devices  in 3G/4G Cellular Networks: Vulnerabilities and Solutions
RobertoPerdisci1149051Reconstructing and investigating in-the-wild web-based malware downloads
MichaelPetullo1464121CRII: SaTC: Next-Generation Robust Software
VirPhoha1527795Spoof-resistant Authentication Through Phone and Wearables
BenjaminPierce1513854TWC: Medium: Micro-Policies: A Framework for Tag-Based Security Monitors
JulesPolonetsky1654085Privacy Research and Data Responsibility Research Coordination Network (RCN)
MichalisPolychronakis1617902TWC: Small: Combating Environment-aware Malware
DmitryPonomarev1422401TWC: Small: Side Channels through Lower-Level Caches: Attacks, Defenses and Security Metrics
AtulPrakash1318722TWC: Small: Discovering and Restricting Undesirable Information Flows Between Multiple Spheres of Activities
ZhiyunQian1464410TCP Side Channels – Real Threats
EmileeRader1116544, 1115926Influencing Mental Models of Security
EmileeRader1524296TWC: Small: Designing a Coordination Mechanism for Managing Privacy as a Common-Pool Resource
JeyavijayanRajendran1618797Secure Split Manufacturing
SamuelRansbotham1350061Using Analytics on Security Data to Understand Negative Innovations
RaghavRao1651475An Investigation of the Propagation of Error-Resistant and
Error-Prone Messages Over Large-Scale Information Networks
AlexanderRasin1656268TTP: Small: A Kit for Exploring Databases under the Hood for Security, Forensics and Data Recovery
IndrakshiRay1619641Toward a Test Bed for Heavy Vehicle  Cyber Security Experimentation
AunshulRege1453040Understanding Adaptive Adversarial Behavior and Decision-Making Processes in Cyberattacks

1330599, 1330308, 


Rethinking Security in the Era of Cloud Computing
KuiRen1262277CAREER: Secure and Privacy-assured Data Service Outsourcing in Cloud Computing
LeonidReyzin1422965TWC: Small: Noisy Secrets as Alternatives to Passwords and PKI
GoldenRichard1358723EAGER: Integrating Cognitive and Computer Science to Improve Cyber Security
FranziskaRoesner1463968CRII: SaTC: Improving Computer Security Technologies through Analyzing Security Needs and Practices of Journalists
FranziskaRoesner1513575TWC: Medium: Collaborative: Studying Journalists to Identify Requirements for Usable, Secure, and Trustworthy Communication
PhillipRogaway1228828Deconstructing Encryption
KeithRoss1318659Protecting the Online Privacy of Users of Social Networks 
NormanSadeh1513957Towards Personalized Privacy Assistant: Understanding Privacy Decision Making and Behavioral Impact
AmitSahai1413955, 1414000, 1414023, 1414082CEF: Center for Encrypted Functionalities
RavinderpalSandhu1111925Security Metrics
LalithaSankar1350914CAREER: Privacy-Guaranteed Distributed Interactions in Critical Infrastructure Networks
FareenaSaqib1623299HACE Lab: An Online Hardware Security Attack and Countermeasure Evaluation Lab
FareenaSaqib1566530Hardware based Authentication and Trusted Platform Module functions (HAT) for IoTs
AnandSarwate1617849TWC: Small: PERMIT: Privacy-Enabled Resource Management for IoT Networks
IoannisSavidis1648878On-Chip Real-Time Hardware Trojan Detection
LoriScarlatos1623150Branching Interactive Graphic Stories for Cybersecurity Education 
PatrickSchaumont1441710FAME: Fault-attack aware Microprocessor
StephanieSchuckers1314792Long-term Active User Authentication Using Multi-modal Profiles 
DavidSchuster1553018Understanding Human Cognition in Computer Network Defense
VyasSekar1564009TWC: Medium: Handling a Trillion Unfixable Flaws on Billions of Internet-of-Things
RamasubramanianSekar1319137TWC: Small: A platform for enhancing security of binary code
ShamikSengupta1528167Establishing market based mechanisms for CYBer security information EXchange (CYBEX)
SanjitSeshia1528108STARSS: Small: Collaborative: Specification and Verification for Secure Hardware
MicahSherr1527401TWC: TTP Option: Small: Collaborative: Enhancing Anonymity Network Resilience against Pervasive Internet Attacks
MicahSherr1149832CAREER: Private Communication in Strongly Adversarial Networks
AmitSheth1513721Context-Aware Harassment Detection on Social Media
YaoyunShi1526928A Quantum Approach to Hardware Security
AkbarSiami Namin1347521Sonifying Cyber-Security Cues
LisaSingh1223825Assessing Online Information Exposure
Using Web Footprints 
RaduSion1562376CipherLocker: Encrypted Regulatory-Compliant Privacy-Enabled Drag and Drop Cloud Storage
RaduSion1526707Practical Plausible Deniability for Storage Systems
AdamSlagell1314891Runtime Semantic Security Analysis to Detect and Mitigate  Control-Related Attacks in Power Grids
MeeraSridhar1566321CRII: SaTC: A Language Based Approach to Hybrid Mobile App Security
MatthewStamm1553610 CAREER: Scaling Forensic Algorithms for Big Data and Adversarial Environments
KevinSteinmetz1616804Technological Con-Artistry
ScottStoller1421893Access Control Policy Mining and Management
CynthiaSturton1651276Identifying Security Critical Properties of a Processor
CynthiaSturton1464209CRII: SaTC: Detecting Security Vulnerabilities in Instruction Set Architectures
GookwonSuh1513797TWC: Medium: Language-Hardware Co-Design for Practical and Verifiable Information Flow Control 
S. ShyamSundar1450500Why Do We Reveal or Withhold Private Information? Exploring Heuristics and Designing Interface Cues for Secure Computing
JakubSzefer1524680, 1526493Practical and Scalable Security Verification of Security-Aware Hardware Architectures
PatrickTague1149582CAREER: Inference-Based Adaptation Techniques for Next Generation Jamming and Anti-Jamming Capabilities
GangTan1624126TWC: Medium: Collaborative: Retrofitting Software for Defense-in-Depth
GangTan1624124CAREER: User-Space Protection Domains for Compositional Information Security
ChiuTan1618398TWC: Small: Evidence of Presence for Intelligent Vehicles using Environment-Based Security
MarkTehranipoor1561023Design of Low-Cost Memory-Based Security Primitives and Techniques for High-Volume Products
StefanoTessaro1553758CAREER: The Theoretical Foundations of Symmetric Cryptography
StefanoTessaro1423566TWC: Small: Better Security for Efficient Secret-Key Cryptography
RussellTessier1318497New Directions in FPGA Security
MichaelThomas1623267A Cybersecurity Collectable Card Game for Urban Youth
DonaldTowsley1564067Limits and Algorithms for Covert Communications
DonaldTruxillo1544535Exploring Job Applicant Privacy Concerns
SalilVadhan1237235Privacy Tools for Sharing Research Data
JaideepVaidya1422501Privacy Preserving Outlier Detection
JoeValacich1615696Identifying Malicious Insiders through Mouse Cursor Movements 
NarseoVallina-Rodriguez1564329Lumen: Fine-Grained Visibility and Control of Mobile Traffic in User-Space
Martenvan Dijk1617774Self-Recovering Certificate Authorities using Backward and Forward Secure Key Management
Nicovan Eijk and Daniel Weitzner1639994Transparency Bridges: Exploring Transparency Requirements in Smartphone Ecosystems
Barbaravan Schewick1330141, 1330596, 1330214The Usable Privacy Policy Project
EugeneVasserman1224007, 1253930TWC TTP: Small: Security, Privacy, and Trust for Systems of Coordinating Medical Devices
GuruVenkataramani1618786STARSS: Small: Defending Against Hardware Covert Timing Channels
RoopaVishwanathan1566297CRII: SaTC: Automated Proof Construction and Verification for Attribute-based Cryptography
DavidVoorhees1500033SaTC-EDU: EAGER: INCUBATE - INjecting and assessing Cybersecurity edUcation with little internal suBject mATter Expertise
MichaelWalfish1514422TWC: Medium: Scaling proof-based verifiable computation
Kuang-ChingWang1643020EAGER: Towards a Traffic Analysis Resistant Internet Architecture
TingWang1566526 CRII: SaTC: Re-Envisioning Contextual Services and Mobile Privacy in the Era of Deep Learning
WeichaoWang1523096Developing Security Education Materials for Future Advanced Manufacturing Engineering Workforce
YangWang1464347Individualized Mental Model and Universal Privacy Dashboard 
ZhiWang1453020CAREER: Towards Trustworthy Operating Systems
JingguoWang1420758Risk of Data Breaches in Financial Institutions:  A Routine Activity Perspective
WeichaoWang1303356Integrated Learning Environment for Cyber Security of Smart Grid
Wendy HuiWang 1350324Verifiable Outsourcing of Data Mining Computations
StevenWeber1228847TTP: Medium Securing the Wireless Philadelphia Network
HoeteckWee1445424SaTC: Small: New Challenges in Functional Encryption
ShuangqingWei1320351Security in Dynamic Environments:
Harvesting Network Randomness and Diversity
NingWeng1623353, 1623247, 1623268, 1623277EDU: Collaborative: Integrating Embedded Systems Security into Computer Engineering and Science Curricula
LaurieWilliams 1318428Motivating and Reaching University Students and Professionals with Software Security Education
TilmanWolf1617458TWC: Small: Hardware Security for Embedded Computing Systems
RebeccaWright1646856, 1646890Anomaly Detection in Multilayer Networks
XintaoWu1523115, 1523154Enhancing Education in Genetic Privacy
DinghaoWu1223710Translingual Obfuscation
TaoXie1513939, 1513690TWC: Medium: Collaborative: Improving Mobile-Application Security via Text Analytics
KaiqiXiong1620862EAGER: Collaborative: Computational Cognitive Modeling of User Security and Incentive Behaviors
LiXiong1618932Spatiotemporal Privacy for Location Based Applications
DongyanXu1409668, 1409534Binary-Centric Forensic Analysis of Advanced Cyber Attacks Against Enterprise Environments
DianxiangXu1522847Software Artifact Repository
DianxiangXu1359590Automated Conformance Testing of Attribute-Based Access Control and Obligation Policies
GuanhuaYan1618631TWC: Small: A Moving Target Approach to Enhancing Machine Learning-Based Malware Defense
QibenYan1566388Non-intrusive Detection of Mobile Malware and Botnets
JunfengYang1564055, 1563843TWC: Medium: Collaborative: Efficient Repair of Learning Systems via Machine Unlearning
ShanchiehYang1526383Automating Attack Strategy Recognition to Enhance Cyber Threat Prediction 
BaijianYang1500046Enhancing Cybersecurity Education Through a Representational Fluency Model
AlecYasinsac1636470Cybersecurity Technology Transfer to Practice (TTP)
YanfangYe1618629Intelligent Malware Detection Utilizing Novel File Relation-Based Features and Resilient Techniques for Adversarial Attacks
VinodYegneswaran1514503MALDIVES: Toward a Comprehensive Understanding of Malware Delivery Mechanisms
LeiYing1618768TWC SBE: Small: Towards an Economic Foundation of Privacy-Preserving Data Analytics: Incentive Mechanisms and Fundamental Limits
MengYu1422355, 1422594Towards Agile and Privacy-Preserving Cloud Computing
ShimengYu1615774Design of RRAM based Hardware Security Primitives 
AlenkaZajic1318934Quantitative Analysis and Reporting of Electromagnetic Covert and Side Channel Vulnerabilities
KaiZeng1619073Secure Near Field Communications between Mobile Devices
MarkZhandry1616442Encryptor Combiners
YanchaoZhang1421999, 1700032TWC: Small: Collaborative: Secure and Usable Mobile Authentication for People with Visual Impairment
YanchaoZhang1700032TWC: Small: Collaborative: Secure and Usable Mobile Authentication for People with Visual Impairment
YanchaoZhang1619251TWC: Small: Secure Mobile Devices through Multiple Lines of Defense
ZhiruZhang1618275STARSS: Small: Automatic Synthesis of Verifiably Secure Hardware Accelerators
YinqianZhang1566444Rethinking Side Channel Security on Untrusted OS
GangZhou1618300Energy-Efficient Privacy-Preserving
Active Authentication of Smartphone Users 
YiluZhou1551004Can You Trust Apps Age Recommendations?  Inconsistent and Unreliable Maturity Ratings on Mobile Platforms
LinaZhou1527684What Online Reviewer Behaviors Really Matter?
SencunZhu1618684Reputation-Escalation-as-a-Service: Analyses and Defenses