2019 SaTC PI Meeting - Project Highlight Slides

2019 SaTC PI Meeting Project Highlight Slides

#Lead PI NameProject Highlight Slide TitleAward Number
1Nael Abu-GhazalehPractical Hardware-Assisted Always-On Malware Detection1619322, 1617915
2Navid AsadiPHIKS - PHysical Inspection and attacKs on electronicS1821780
3Kiran BalaganiLeveraging Movement, Posture, and Anthropometric Contexts to Strengthen the Security of Mobile Biometrics1814846
4Rajeev BalasubramonianEfficient Hardware-Aware and Hardware-Enabled Algorithms for Secure In-Memory Databases1718834
5Alexandru BardasCreating and Managing Structurally-Morphing IT Systems - Moving Targets1850406
6Alexandru BardasA Sociotechnical Metrics Framework for Network and Security Operation Centers1915824, 1915822
7Lujo BauerBetter defenses through adversarial learning1801391, 1801494
8Terry BenzelSharing Expertise and Artifacts for Reuse through Cybersecurity Community Hub (SEARCCH)1925773
9Nicola BezzoOnline Malicious Intent Inference for Safe CPS Operations under Cyber-attacks1816591
10Antonio BianchiVetting and Improving the Usage of Trusted Execution Environments for Authentication in Mobile Devices1949632
11Jean-Francois BiasseAlgebraic Methods for the Computation of Approximate Short Vectors in Ideal Lattices1846166
12Jean-Francois BiasseQuantum-Safe Cryptosystems Based on Isogenies1839805
13Matthieu BlochTowards Stealth Networks Fundamental Limits and Algorithms for Stealth Communications1527387
14Laurin BuchananCyberMiSTS: Curriculum to Broaden Participation in Cybersecurity for Middle School Teachers and Students1821757
15Kevin ButlerDomain Informed Techniques for Detecting and Defending Against Malicious Firmware1815883
16L Jean CampUnderstanding Socio-Technical Failure Modes in Public Key Infrastructures1814518
17L Jean CampLiving in the Internet of Things1565252
18Yinzhi CaoPreventing Web Side-channel Attacks via Atomic Determinism1854001
19Justin Capposin-toto: Securing the Software Supply Chain1801430
20Alvaro CardenasPractical Control Engineering Principles to Improve the Security and Privacy of Cyber-Physical Systems1931573
21David Chan-TinPersonalized Cybersecurity Education and Training1919004
22Sriram ChellappanA Privacy-preserving Meta-data Analysis Framework for Cyber Abuse Research - Foundations, Tools and Algorithms1718071
23Bo ChenEnabling Secure Data Recovery for Mobile Devices against Malicious Attacks1938130
24Hsinchun ChenCybersecurity Big Data Research for Hacker Community: A Topic and Language Modeling Approach1936370
25Qi ChenAutomated Security Analysis of Software-based Control in Emerging Smart Transportation Under Sensor Attacks1850533
26Yingying ChenExploiting Physical Properties in Wireless Networks for Implicit Authentication1717356
27Stephen ChongComputing Over Distributed Sensitive Data1565387
28Nicolas ChristinToward Fully Automated Data-Driven Analysis of Web Censorship1814817
29Laura DabbishSocial Cybersecurity: Applying Social Influence to Improve Cybersecurity1704087
30Kapil DandekarSoftware Defined Radio Framework for Cybersecurity and Information Assurance Education1723606
31Anupam DasAnalyzing Information Leak in Smart Homes1849997
32Azadeh DavoodiAnalysis of Security and Countermeasures for Split Manufacturing of Integrated Circuits1812600
33Sara EftekharnejadSecuring Smart Power Grids under Data Measurement Cyber Threats1600058
34Fariborz FarahmandNeurobiological Basis of Decision Making in Online Environments1358651
35Yunsi FeiAutomating Countermeasures and Security Evaluation against Software Side-channel Attacks1563697
36Yunsi FeiProtecting Confidentiality and Integrity of Deep Neural Networks against Side-channel and Fault Attacks1929300
37Joan FeigenbaumHiding Hay in a Haystack: Integrating Censorship Resistance into the Mainstream Internet1409599
38Wu-chang FengCurricula and CTF Exercises for Teaching Smart Fuzzing and Symbolic Execution1821841
39Domenic ForteiPROBE - An Internal Shielding Approach for Protecting against Frontside and Backside Probing Attacks1717392
40Michael FranzHydra: Hybrid Defenses for Resilient Applications1619211
41Jessica FridrichSteganography in Empirical Sources Using Acquisition Oracle1561446
42Sanjay GoelThe New Security Calculus: Incentivizing Good User Security Behavior1618212
43Sanjay GoelThwarting the Malicious Insider Evolution Process: The Theory of Strained Betrayal1912874
44Samuel GordonNew Protocols and Systems for RAM-Based Secure Computation1564088, 1563722, 1562888
45Vipul GoyalTransforming Non-Malleable Cryptography1916939
46Ronen GradwohlUtilitarian Implications of Privacy Protections1718670
47Adam GroceDifferentially Private Hypothesis Testing1817245
48Ian HarrisDetecting Social Engineering Attacks Using Semantic Language Analysis1813858
49Willie HarrisonBest Wiretap Codes for Real-world Physical-layer Security1910812
50Viet Tung HoangTowards Stronger and Verified Security for Real-World Cryptography1755539
51Yuan HongPrivacy Preserving Cooperation among Microgrids for Efficient Load Management on the Grid1745894
52Nicholas HopperConsistent and Private Group Communication1814753
53Nicholas HopperModels and Measurements for Website Fingerprinting1815757
54Amir HoumansadrSustainable Censorship Resistance Systems for the Next Decade1553301
55Fei HuBig Data Security Education1723250
56Stratis IoannidisMassively Scalable Secure Computation Infrastructure Using FPGAs1717213
57Ahmad JavaidINteractive VIsualization and PracTice basEd Cybersecurity Curriculum and Training (InviteCyber) Frame1903419, 1903423
58Niraj JhaSHARKS: Smart Hacks, Attacks, RisKs and Security in IoT based on Machine Learning1617628
59Limin JiaTowards a Usable, Practical, and Provably Secure Browser Infrastructure1704542
60Yier JinOnline Digital Forensics Courses and Labs for Students and Professionals1802701
61Yier JinRESULTS: Reverse Engineering Solutions on Ubiquitous Logic for Trustworthiness and Security1812071, 1703602
62Zhanpeng JinBrain Hacking: Assessing Psychophysiological and Computational Vulnerabilities in Brain-based Biometrics1840790, 1564104
63Gail KaiserToward Trustworthy Mutable Replay for Security Patches1563555
64Zbigniew KalbarczykData-Driven Study of Attacks on Cyber-Physical Infrastructure Supporting Large Computing Systems1816673
65Faisal KaleemCFEAR: Cyber Forensics Education through Augmented Reality1500055
66Chris KanichEnabling Long-Term Security and Privacy through Retrospective Data Management1801663
67Eun KimWireless, Battery-less, Monolithic Tamper Detector for Semiconductor Chip Authenticity1716953
68Joerg KliewerCommunication under Adversarial Attacks in Complex Networks - Fundamental Limits and Secure Coding Strategies1526547
69Joerg KliewerCovert/Secret and Efficient Message Transfer in (Mobile) Multi-Agent Environments1815322
70Oleg KomogortsevEye Movement Biometrics in Virtual and Augmented Reality171462
71Cedric LangbortFrom Threat to Boon: Understanding and Controlling Strategic Information Transmission in Cyber-Socio-Physical1619339
72Aron LaszkaTowards Efficient and Scalable Crowdsourced Vulnerability-Discovery using Bug-Bounty Programs1850510
73Loukas LazosSecure Cloud Storage Verification Methods1813401
74Christopher LeberknightNeural Network Prediction of Censorable Language1704113
75Jun LiOnline Social Network Fraud and Attack Research and Identification1564348, 1564250, 1564039
76Dan LiniPrivacy: Automatic Recommendation of Personalized Privacy Settings for Image Sharing1651455
77Hui LinPreempting Physical Damage from Control-related Attacks on Smart Grids' Cyber-physical Infrastructure1850377
78Heather LipfordLeveraging community oversight to enhance collective efficacy for security and privacy1814110, 1814068, 1814439
79Feng-Hao LiuEfficient Crypto Solutions for the Next Generation Applications1657040
80Hongbo LiuSecurity Assurance in Short Range Communication with Wireless Channel Obfuscation1815908
81Kangjie LuMOSE: Automated Detection of Module-Specific Semantic Errors1815621
82Bo LuoPrivacy Protection in Social Networks: Bridging the Gap Between User Perception and Privacy Enforcement1422206
83William MahoneyEvaluating Performance and Security of Executable Steganography for Surreptitious Programs1811560, 1811578
84Florence MartinDigital Citizenship for Middle Grades1723746
85Gerome MiklauRe[DP]: Realistic Data Mining Under Differential Privacy1409143
86Jiang MingTowards Paving the Way for Large-Scale Malware Analysis: New Directions in Generic Binary Unpacking1850434
87Jelena MirkovicHardening Systems Against Low-Rate DDoS Attacks1815495
88Tanushree MitraDesigning Trustworthy and Transparent Information Platforms (News Platforms)1915755
89Tyler MooreExamining the Impact of Cybersecurity Shocks on Cryptocurrency Platforms1714291
90Tyler MooreDeveloping Robust Longitudinal Indicators and Early Warnings of Cybercrime1714291
91Adwait NadkarniEnabling Systematic Evaluation of the Soundness of Android Security Analysis Techniques1815336
92Ida NgambekiAn Assessment Driven Approach to Self-Directed Learning in Secure Programming (SecTutor)1934279, 1934269, 1934285
93Nick NikiforakisUnderstanding, Measuring, and Defending against Malicious Web Crawlers1813974
94Nick NikiforakisEmerging Attacks Against the Mobile Web and Novel Proxy Technologies for Their Containment1617593
95Alina OpreaAn Integrated Approach for Enterprise Intrusion Resilience1717634
96Michael OrshanskySimulation-Based Analysis of EM Side Channels in Embedded Systems: From Software to Fields1901446
97Laura OsburnImproving O&M and IT Collaboration to Keep our Buildings Smart and Secure1932769
98Xinming OuData-driven Approaches for Large-scale Security Analysis of Mobile Applications1717862, 1717871, 1718214
99Younghee ParkEnhancing Security Education through Transiting Research on Security in Emerging Network Technologies1723804
100Bryan ParnoAutomated Support for Writing High-Assurance Smart Contracts1801369, 1801321
101Vishal PatelPresentation-Attack-Robust Biometrics Systems via Computational Imaging of Physiology and Materials1801435, 1801372, 1801382
102Sameer PatilIncorporating Sociotechnical Cybersecurity Learning Within Undergraduate Capstone Courses1821782
103Brian PayneCreating Cybersecurity Pathways Between Community Colleges and Universities1914613
104Roberto PerdisciLeveraging High-Density Internet Peering Hubs to Mitigate Large-Scale DDoS Attacks1741608
105Edoardo PersichettiSecure and Efficient Solutions for Post-Quantum Cryptography from Codes with Compact Representations1906360
106Jason PolakisBlack-Box Flaw Discovery in Web Authentication and Authorization Mechanisms1934597
107Jules PolonetskyRCN: Applied Privacy Research Coordination Network: An Industry-Academic Network to Transition Promising Privacy Research to Practice1837413
108Michalis PolychronakisCombating Environment-aware Malware1617902
109Michalis PolychronakisPrincipled and Practical Software Shielding against Advanced Exploits1749895
110Dmitry PonomarevSide Channels through Lower-Level Caches: Attacks, Defenses and Security Metrics1422401
111Donald PorterAttacking and Defending the Lifespan of Mobile and Embedded Flash Storage1816263
112Yanjun QiFeature Squeezing: Detecting Adversarial Examples in Deep Neural Networks1619098
113Emilee RaderDesigning a Coordination Mechanism for Managing Privacy as a Common-Pool Resource1524296
114Indrakshi RayDetecting and Reconstructing Network Anomalies and Intrusions in Heavy Vehicles1715458
115Bradley ReavesTechniques for Measuring and Characterizing Robocalls1849994
116Franziska RoesnerTowards Secure Augmented Reality Platforms1651230
117Atanas RountevPrivAid: Differentially-Private Analytics for Android Apps1907715
118Jared SaiaProof of Work Without All the Work1816250, 1816076
119Brendan SaltaformaggioGEMINI: Guided Execution Based Mobile Advanced Persistent Threat Investigation1755721
120Sagar SamtaniIdentifying Emerging Threats in the Online Hacker Community for Proactive Cyber Threat Intelligence: A Diachronic Graph Convolutional Autoencoder Framework1850362
121Nitesh SaxenaSPHINX: A Password Store that Perfectly Hides Passwords from Itself1714807
122Alessandra ScafuroA Broad Treatment of Privacy in Blockchains1718074
123David SchusterUnderstanding Human Cognition in Computer Network Defense1553018
124Vyas SekarHandling a Trillion Unfixable Flaws on Billions of Internet-of-Things1564009
125Koushik SenMachine Learning for Effective Fuzz Testing1817122
126Thomas ShrimptonAPI-centric Cryptography1816375
127Tao ShuTowards Securing Visible Light Communications1745254
128Akbar Siami NaminImproving Student Learning and Engagement in Digital Forensics through Collaborative Investigation of Cyber Securit1821560
129Akbar Siami NaminUser-Centric Design of a Sonification System for Automatically Alarming Security Threats and Impact1564293
130Yasin SilvaBullyBlocker - Identifying Cyberbullying in Social Networking Sites1719722
131Alice SilverbergAn algebraic approach to secure multilinear maps for cryptography1703321, 1701567, 1701785
132Vivek SinghEarly-Stage Interdisciplinary Collaboration: Fair and Accurate Information Quality Assessment Algorithm1915790
133Christian SkalkaA New Approach to Federated Network Security1717581, 1718036, 1718083
134Geoffrey SmithQuantifying Information Leakage in Searchable Encryption1749014
135William StaplesDigital Inequalities in the Heartland1742815
136Kevin SteinmetzLaw-Enforcement Cyber Investigations: An In-Depth Qualitative Study1916284
137Kevin SteinmetzTechnological Con-Artistry: An Analysis of Social Engineering1616804
138Scott StollerAccess Control Policy Mining and Management1421893
139Alley StoughtonTowards Mechanized Proofs of Composable Security Properties1801564
140Gookwon SuhLanguage-Hardware Co-Design for Practical and Verifiable Information Flow Control1513797
141Kun SunEnhancing Container Security via Fine-Grained System Resource Constraints1815650
142Himanshu ThapliyalUtilizing Principles of Energy Recovery Computing for Low-Energy and DPA-Resistant IoT Devices1845448
143Stavros TripakisBridging the Gap between Protocol Design and Implementation through Automated Mapping1801546
144Guan-Hua TuSide-channel Attacks Against Mobile Users: Singularity Detection, Behavior Identification, and Automated Rectification1815636
145A. Selcuk UluagacSecuring Sensory Side-Channels in Cyber-Physical Systems1453647
146A. Selcuk UluagacPrivacy-Aware Wearable-Assisted Continuous Authentication Framework1718116
147Krishna VenkatasubramanianA Suite of Authentication Solutions for Individuals with Upper Extremity Impairment1901540, 1947022
148Roopa VishwanathanAutomated Proof Generation and Verification for Attribute-based Cryptography1800088
149Kristen WalkerAn Exploratory Study of Technology Adoption in K-12: Educational Benefits vs Privacy Costs1936837
150Haining WangIntegrating Cybersecurity Education with Cloud Computing1821744
151Weichao WangDeveloping Security Education Materials for Future Advanced Manufacturing Engineering Workforce1523096
152XiaoFeng WangUnderstanding and Discovering Emerging Cybercrimes through Automatic Analysis of Online Text Traces1801432
153XiaoFeng WangSafeguarding Mobile Cloud Services: New Challenges and Solutions1618493
154Yang WangPredicting Personalized Privacy Preferences in the Smart Home1464347
155Yang WangCooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies1652497
156Richard WashUsing Stories to Improve Computer Security Decision Making1714126
157Wujie WenInvisible Shield: Can Compression Harden Deep Neural Networks Universally Against Adversarial Attacks?1840813
158Timothy WoodFine Grained Protection for Scalable Single-Use Services1814234, 1814402
159Matthew WrightAdversarial ML in Traffic Analysis1816851
160Dinghao WuAdvanced Trace-oriented Binary Code Analysis1652790
161Xusheng XiaoAutomatic Identification of Sensitive UI Widgets based on Icon Classification for Android Apps1755772
162Aiping XiongModeling Memory Illusion for Predicting Trust in Online Information1915801
163Dianxiang XuBenchmarking Testing Methods for Access Control Policies1618229
164Shouhuai XuA Framework for Enhancing the Resilience of Cyber Attack Classification and Clustering Mechanisms1814825
165Qiben YanToward Non-intrusive Detection of Resilient Mobile Malware and Botnet using Application Traffic Measurement1566388
166Qiben YanURadio: Towards Secure Smart Home IoT Communication Using Hybrid Ultrasonic-RF Radio1950171
167Danfeng YaoDeployment-quality and Accessible Solutions for Cryptography Code Development1929701
168Attila A YavuzLightweight and Fast Authentication for Internet of Things1652389
169Yanfang (Fanny) YeIntelligent Malware Detection Utilizing Novel File Relation-Based Features and Resilient Techniques for Adversarial Attacks1946327
170Yanfang (Fanny) YeSecuring Cyberspace: Gaining Deep Insights into the Online Underground Ecosystem1940859
171Vinod YegneswaranMALDIVES: Developing a Comprehensive Understanding of Malware Delivery Mechanisms1514503
172Qiaoyan YuManaging Hardware Security in Three Dimensional Integrated Circuits1717130
173Qiaoyan YuProactive Defense Methods for Chip Integrity and Security1652474
174Shimeng YuDesign of Light-weight RRAM based Hardware Security Primitives for IoT Devices1903631
175Qiang ZengEnabling Precise and Automated Insecurity Analysis of Middleware on Mobile Platforms1856380
176Fengwei ZhangHardware-assisted Plausibly Deniable System for Mobile Devices1928331
177Zhiru ZhangAutomatic Synthesis of Verifiably Secure Hardware Accelerators1618275
178Zizhan ZhengTowards Robust Moving Target Defense: A Game Theoretic and Learning Approach1816495
179Huiyang ZhouTowards Smart and Secure Non Volatile Memory1717550
180Sencun ZhuReputation-Escalation-as-a-Service: Analyses and Defenses1618684