Poster Session

Visible to the public 

2019 SaTC PI Meeting Poster Session

VIEW POSTER SESSION DIAGRAMS

Undergraduate Research Posters
Presenters Title Award #
Ranuli Abeysinghe Hash functions: Properties, an Attack, and an Application 1652474
Dennis Afanasev Secure and Scalable Network Packet Processing Using OpenNetVM and mTCP 1814234
Zaina Aljallad Co-Designing for Community Oversight: Helping People Make Privacy and Security Decisions Together  
Trevor Ammons & Trent Callahan Side-Channel Attack Evaluation of Post-Quantum Cryptographic Algorithms and Architectures 1801488
Samantha Aziz Eye Movement Driven Authentication in Virtual Reality 1250718
William Barnhart Capacity-achieving Schemes for Private Information Retrieval with Multi-user Collusion 1704274
Rachel Bleiman The Susceptibility of Disclosing Private Security Information in College Students 1453040
Elijah Bouma-Sims Who's Calling You? A Study of Robocalls in the Era of Modern Telephone Networks 1849994
Luciano Brignone Hiding Instructions in a Processor  
Morgan Brockman Promoting Privacy by Design for Software Capstone Courses 1727574, 1821782
Javier Campos Realization and Visualization for Mobile Security  
Baicheng Chen Cardiac Biometrics for Continuous and Non-contact Mobile Authentication 1718375
Michael Cinkoske A New Connection Between Node and Edge Depth Robust Graphs  
Chris Crabtree Using Deep Learning to Bridge the Semantic Gap between Natural Language and Code: An Automated Approach to Improve Privacy Policy Misalignment Scalability  
Jacob Crain IoT Embedded System Implementation  
Noah Curran TrustZone as a Secure Tensor Processor 1718702
Oliver Curry & Zachary Peterson Fakesbook 1802701
Leander Davis Protecting Cyber Physical Systems Using A Game-Theoretic Approach 1814064
Julie Dixon Blockchain-Based Framework for Securing Integrated Circuits in the Supply Chain  
Peter Fenteany Non-malleable Digital Lockers for Efficiently Sampleable Distributions 1849904
Catherine Han The Price is (not) Right: Comparing The Privacy Behaviors of Free vs. Paid Apps 1817248, 1564329
Brandon Kujawa Replay Attack Detection in Multimedia of Things (MoT) 1815724
Christy LaPerriere A Participatory Design Study to Test Community Oversight for Privacy and Security 1814068
Jamie Lee Oblivious K-Nearest Neighbors for Secure Map Applications  
Jun Lin Examination and Detection of Falsified News 1755536
Christie Lincoln & Alvin Zhang Static Information Flow Tracking (SIFT) Analysis for Hardware Design Verification 1718586
Bryan Manzi Physical (PHY) Layer Features for Device Authentication 1329686
Grant McClearn & Sarah Morin A New Statistical Audit for Real Elections 1421373
Jonathan Miao More Complete DOM XSS Detection Through Dynamic Event Generation 1704542
John Mikulskis Snout - An Extensible IoT Pen-Testing Tool 1409053
Monica Moniot Differentially Private Confidence Intervals  
Jeongbin Oh Understanding the performance of SGX-based computations 1815814
Adam Piekarski T-SGX  
Justin Robbins QuaSim: An Interactive Quantum Cryptography Learning Tool 1623380
EJ Seong Boxing Attackers In: Towards Tangible Defenses against Eavesdropping Attacks  
Sixiong "Shawn" Shan Gotta Catch 'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks 1834523
Kaiyan Shi Differentially Private Nonparametric Hypothesis Testing 1817245
John Spokes ActionPoint: Action-Driven App to Strengthen Parent-Teen Relationships to Understand and Identify Cyberbullying 1719722
Trinity Stroud Developing a Deterministic Polymorphic Circuit Generator Using Boolean Logic Representation 1811578
Jonathan Villanueva Physical Inspection for PCB Assurance  
Abigail Vincent False Data Injection Attack Model on AC based Hybrid System 1600058
Haoda Wang LEADER (Low-Rate Denial-of-Service Attacks Defense) 1815495
Xingchen Wang BASCPS: Behavioral Decision Making in Security Games for Protecting Multi-Defender Cyber Physical Systems 1718637
Ashton Woiwood Characterizing and Modeling Threat Feeds for Patch Management 1715152
Charlie Wolfe Khaleesi: Breaking The Advertising & Tracking Redirect Chains 1715152
Laura Zharmukhametova Symbolic Execution for Simple R  
     
SaTC Principal Investigator Posters
Principal Investigator Title Award #
Nael Abu-Ghazaleh Practical Hardware-assisted Always-on Malware Detection 1619322, 1617915
Theodore Allen A Framework For Economical Cyber Security Inspection and Assurance 1912166
Nabil Alshurafa Privacy Enhancing Framework to Advance Models of Behavior 1915847
Ardalan Amiri Sani Securing Mobile Devices by Hardening their System Software 1846230
Aydin Aysu Secure Instruction Set Extensions for Lattice-Based Post-Quantum Cryptosystems 1850373
Kiran Balagani Leveraging Movement, Posture, and Anthropometric Contexts to Strengthen the Security of Mobile Biometrics 1814846
Ritwik Banerjee Tracking Semantic Changes in Medical Information 1834597
Alexandru Bardas Creating and Managing Structurally-Morphing IT Systems - Moving Targets 1850406
Alexandru Bardas Early-Stage Interdisciplinary Collaboration: A Sociotechnical Metrics Framework for Network and Security Operation Centers 1915824
Terry Benzel Sharing Expertise and Artifacts for Reuse through Cybersecurity Community Hub (SEARCCH) 1925773
Jeremiah Blocki Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions 1755708
John Board STINGAR - Deployment of Highly Automated, Reliable, and Fast Cybersecurity Threat Response Systems 1815691
Borzoo Bonakdarpour Formal Specification and Verification of Probabilistic Information-flow Security Policies 1813388
Patrick Brandt Data to Knowledge: Modernizing Political Event Data for Big Data Social Science Research 1539302
Laurin Buchanan CyberMiSTS: Curriculum to Broaden Participation in Cybersecurity for Middle School Teachers and Students 1821757, 1821753
Kevin Butler ProXray: Protocol Model Learning and Guided Firmware Analysis 1815883
L. Jean Camp Living in the Internet of Things 1565375
Bogdan Carbunar An Open Mobile App Platform to Support Research on Fraudulent Reviews 1840714
Steven Carr Visualization for Secure Coding in C  1523017, 1522883
Shantanu Chakrabartty Dynamic Authentication based on Zero-power Quantum-Tunneling Timers 1525476
Bo Chen Enabling Secure Data Recovery for Mobile Devices against Malicious Attacks 1938130
Hao Chen Irregular Traffic Detection for Containerized Microservices RPC in the Real World 1801751
Hsinchun Chen Cybersecurity Big Data Research for Hacker Community: A Topic and Language Modeling Approach 1936370
Qi Alfred Chen Exposing and Mitigating Security/Safety Concerns of CAVs: A Holistic and Realistic Security Testing Platform for Emerging CAVs 1929771
Yingying Chen Exploiting Physical Properties in Wireless Networks for Implicit Authenticatio 1820624
Steven Chong psilence: An R Library for Differential Privacy 1565387
Mo-Yuen Chow Secure Algorithms for Cyber-Physical Systems: Resilient Collaborative Distributed Energy Management System 1505633
Nicolas Christin ICLab: A Global, Longitudinal Internet Censorship Measurement Platform 1814817
John Criswell Shielding Software From Privileged Side-Channel Attacks 1652280
Reza Curtmola in-toto: Securing the Software Supply Chain 1801430
Alberto Dainotti MapKIT: Mapping Key Internet Terrain 1705024
Kapil Dandekar Software Defined Radio Framework for Cybersecurity and Information Assurance Education 1723606
Anupam Datta Accountable Information Use: Privacy and Fairness in Decision-Making Systems: SoK: Differential Privacy as a Causal Property 1704985, 1704845
Edmundo de Souza e Silva INSaNE: Improving Network Security at the Network Edge 1740895
Jintai Ding A Cryptanalysis of LUOV using the Subfield Differential Attack (SDA) 1814221
Wenliang Du Expanding TrustZone in Android OS & Developing SEED Labs 1718086
Sara Eftekharnejad Anomaly detection and risk assessment in power grids under data measurement threats 1600058
Salim El Rouayheb Secure Distributed Coded Computations for IoT: An Information Theoretic and Network Approach 1801630
Dmitry Evtyushkin Secure Branch Predictors for High Performance 1850365
Liyue Fan Image Obfuscation with Quantifiable Privacy 1755884
Fariborz Farahmand Neurobiological Basis of Decision Making in Online Environments 1358651
Nick Feamster Practical Privacy for DNS, From ODNS to DoH 1602399
Yunsi Fei Protecting Confidentiality and Integrity of Deep Neural Networks against Side-channel and Fault Attacks 1929300
Christopher Fletcher Data Oblivious ISA Extensions for Side Channel-Resistant and High-Performance Computing 1816226
Domenic Forte iPROBE - An Internal Shielding Approach for Protecting against Frontside and Backside Probing Attacks 1717392
Ryan Gerdes Secure and Resilient Vehicular Platooning 1410000
Ryan Gerdes Enforcement of Geofencing Policies for Commercial Unmanned Aircraft Systems 1801611
Jessica Fridrich Steganography with Two JPEGS of the Same Scene 1561446
Ujjwal Guin Robust Design-for-Security (DFS) Architecture for Enabling Trust in Integrated Circuits (IC) Manufacturing and Test 1755733
Sanjay Goel THE NEW SECURITY CALCULUS: Incentivizing Good User Security Behavior 1618212
Sanjay Goel Thwarting the Malicious Insider Evolution Process: The Theory of Strained Betrayal 1912874
Nikhil Gupta Secure and Trustworthy Computer Aided Designs for Additive Manufacturing 1931724
Deniz Gurkan Network Design for Security using Protocol Trust Boundary Observations 1907537
Yuan Hong Privacy Preserving Cooperation among Microgrids for Efficient Load Management on the Grid 1745894
Amir Houmansadr MassBrowser: Fighting Internet Censorship in a Mass 1553301
Stratis Ioannidis, Miriam Leeser MaSSIF: Massively Scalable Secure Computation Infrastructure Using FPGAs 1717213
Cynthia Irvine Labtainers - Create a Cyber Range on a Laptop 1438893, 1932950
Rashmi Jha Opportunities and Challenges for Resistive Random Access Memory Devices in Hardware Security and Trust 1556301
Ranjit Jhala Data-Dependent Instruction Timing Channels 1514435
Limin Jia Practical and Trustworthy Dependency Management 1717022
Zhanpeng Jin Brain Hacking: Assessing Psychological and Computational Vulnerabilities in Brain-Based Biometrics 1840790
Criswell John IskiOS: Lightweight Defense Against Kernel-Level Code-Reuse Attacks 1618213
Patrick Juola Is "Fake" a Writing Style?  Detecting Stylistic Alteration 1814602
David Kaeli Side-Channel Analysis and Resiliency Targeting Accelerators 1618379
Zbigniew Kalbarczyk Data-Driven Study of Attacks on Cyber-Physical Infrastructure Supporting Large Computing Systems 1816673
Chris Kanich Enabling Long-Term Security and Privacy through Retrospective Data Management 1801644, 1801663
Karen Karavanic System Infrastructure for SMM-based Runtime Integrity Measurement 1528185
Murat Kantarcioglu A Data Firewall based Approach for Securing Big Data 1111529, 1758628
Mahmut Karakaya Improving Performance of Standoff Iris Recognition Systems Using Deep Learning Frameworks 1909276
Latifur Khan Mitigating Cyber Attacks Using Domain Adaptation 1516425
Joerg Kliewer Secure and Private Distributed Coded Computation for Learning and Storage Applications 1526547
Selcuk Kose The Strength of Combined Distinguishers and Combined Side-channel Attacks 1929774
Yonghwi Kwon Secure and Comprehensive Forensic Audit Infrastructure for Transparent Heterogeneous Computing 1850392
Aron Laszka Towards Efficient and Scalable Crowdsourced Vulnerability-Discovery using Bug-Bounty Programs 1850510
Loukas Lazos Secure Cloud Storage Verification Methods 1813401
Jun Li Online Social Network Fraud and Attack Research and Identification 1564348, 1564250, 1564039
Qinghua Li Towards Automated Security Vulnerability and Patch Management for Power Grid Operations 1751255
Heather Lipford Leveraging community oversight to enhance collective efficacy for privacy and security 1814110, 1814068, 1814439
Hongbo Liu Security Assurance in Short Range Communication with Wireless Channel Obfuscation 1815908
Vinod Lohani Development and Analysis of a Spiral Theory-based Cybersecurity Curriculum 1623047
Wenjing Lou Toward Enforceable Data Usage Control in Cloud-based IoT Systems 1916902, 1916926
Long Lu OAT: Attesting Operation Integrity of Embedded Devices 1748334
Bo Luo Privacy Protection in Social Networks: Bridging the Gap Between User Perception and Privacy Enforcement 1422206
William Mahoney Evaluating Performance and Security of Executable  Steganography for Surreptitious Programs 1811560, 1811578
Khalid Malik ForensicExaminer: Testbed for Benchmarking Digital Audio Forensic Algorithms 1815724, 1816019
Florence Martin Establishing Digital Citizenship by Implementing Cyber Safety Curriculum with Middle School Students 1723746
Donatello Materassi Wireless Hardware Analog Encryption for Secure, Ultra-Low Power Transmission of Data 1816703
Nasir Memon DeepMasterPrints: Generating MasterPrints For Dictionary Attacks via Latent Variable Evolution 1618750
Hoda Mehrpouyan Formal Specification and Verification of User-centric Privacy Policies for Ubiquitous Systems 1657774
Hoda Mehrpouyan FALCON: Framework for Anomaly Detection in IndustrialControl Systems 1846493
Ana Milanova SecureMCMR: Privacy-Preserving Computation Outsourcing for MapReduce Applications 1814898
Stephen Miller Number theory and side-channel attacks from normalized running time distributions 1815562
Tanushree Mitra Designing Trustworthy and Transparent Information Platforms (News Platforms) 1915755
Ida Ngambeki An Assessment Driven Approach to Self-Directed Learning in Secure Programming (SecTutor) 1934279, 1934269, 1934285
Daniela Oliveira API Blindspots: Why Experienced Developers Write Vulnerable Code 1513572
Alina Oprea Intrusion Resilience in Game Theoretical APT Models 1717634
Xinming Ou Ethnographic Study of Secure Software Development Processes in a Real Company​ 1801633
Xinming Ou A Systematic Study of Comparing Traditional Machine Learning and Deep Learning for Security Vetting of Android Apps 1717862, 1717871, 1718214
Laura Osburn Improving O&M and IT Collaboration to Keep our Buildings Smart and Secure 1932769
Charalampos Papanmanthou Edrax: A Cryptocurrency with Stateless Transaction Validation  
Charalampos Papanmanthou Zero-Knowledge Proofs Through Composition  
Charalampos Papanmanthou SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage  
Abhishek Parakh QuaSim: An Interactive Quantum Cryptography Learning Tool 1623380
Sameer Patil Incorporating Sociotechnical Cybersecurity Learning Within Undergraduate Capstone Courses 1821782
Peter Peterson Enabling a New Generation of Experts by Finding and Fixing Students' Persistent Misconceptions 1821788
Jim Plusquellic Side-channel Power Resistance for Encryption Algorithms using Dynamic Partial Reconfiguration 1813945
Jules Polonetsky RCN: Applied Privacy Research Coordination Network: An Industry-Academic Network to Transition Promising Privacy Research to Practice 1837413
Dmitry Ponomarev Side-Channels through Lower-Level Caches: Attacks, Defenses and Security Metrics 1422401
Aravind Prakash Recovering High Level Constructs from C++ Binaries 1566532
Yanjun Qi Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers 1619098
Yanjun Qi Feature Squeezing- Detecting Adversarial Examples in Deep Neural Networks 1619098
Raghav Rao Unauthorized Access Attempts on Information Systems: The Role of Opportunity Contexts 1724725
Alexander Rasin End-to-End Database Storage Analysis 1656268
Indrakshi Ray Machine Learning for Anomaly Detection in Heavy Vehicles 1715458
Aunshul Rege Understanding Adaptive Adversarial Behavior and Decision-Making Processes in Cyberattacks 1453040
Daniel Roche Oblivious k-Nearest Neighbors for Secure Map Applications 1618269
Jennie Rogers VaultDB: Efficient Query Processing for Private Data Federations 1846447
Norman Sadeh Personalized Privacy Assistants 1513957
Norman Sadeh The Usable Privacy Policy Project 1330596
Norman Sadeh Answering People's Privacy Questions: Weaving Together User-Centered Design, Natural Language Processing and Legal Considerations 1914486
Sagar Samtani Identifying Emerging Threats in the Online Hacker Community for Proactive Cyber Threat Intelligence: A Diachronic Graph Convolutional Autoencoder Framework 1850362
Fareena Saqib A Key Update Scheme for Side-Channel Attack Mitigation 1814420
Anand Sarwate PERMIT: Privacy-Enabled Resource Management for IoT Networks 1617849
Visvesh Sathe Computationally Enabled Robust, Low-Power True Random Number Generation 1714496
Ioannis Savidis Parameter Obfuscation: A Novel Methodology for the Protection of Analog Intellectual Property 1751032
Lori Scarlatos CyberMiSTS: Curriculum to Broaden Participation in Cybersecurity for Middle School Teachers and Students 1821753
Patrick Schaumont Energy-harvested Security for the Internet of Things 1704176
Patrick Schaumont Finding and Mitigating Side-channel Leakage in Embedded Architectures 1931639
Kent Seamons Usable Key Management and Forward Secrecy for Secure Email 1816929
Vyas Sekar Handling a Trillion Unfixable Flaws on Billions of Internet-of-Things 1564009
Edoardo Serra Capacity Building: Integrating Data Science into Cybersecurity Curriculum 1820685
Akbar Siami Namin User-Centric Design of a Sonification System for  Automatically Alarming Security Threats and Impact 1564293
Akbar Siami Namin Improving Student Learning and Engagement in Digital Forensics through Collaborative Investigation of Cyber Security Incidents and Simulated Capture-the-Flaag Exercises 1821560
Yasin Silva BullyBlocker - Identifying Cyberbullying in Social Networking Sites 1719722
Stephanie Singer Data Science for Election Verification 1936809
Christian Skalka PCNC: Proof-Carrying Network Code 1718036
Geoffrey Smith Quantifying Information Leakage in Searchable Encryption 1749014
Scott Stoller Access Control Policy Mining and Management 1421893
Cynthia Sturton Transys: Leveraging Common Security Properties Across Hardware Designs 1816637
Berk Sunar Super-Human Cryptanalysis for Scalable Side-Channel Analysis 1814406
Ravi Tandon Robust Physical Layer Security with Limited Channel Knowledge 1715947
Yuzhe Tang Scalable Secure Computations on Intel SGX via Lazy Program Partitioning 1815814
Yuzhe Tang Blockchain-based Fork Prevention in Securing Cloud Storage Services  
Himanshu Thapliyal Utilizing Principles of Energy Recovery Computing for Low-Energy and DPA-Resistant IoT Devices 1845448
Michael Thomas A Cybersecurity Collectable Card Game for Children 1623267
Nikos Triandopoulos Towards Scalable Private Collaborative Learning  
A. Selcuk Uluagac Securing Sensory Side-Channels in Cyber-Physical Systems 1453647
A. Selcuk Uluagac Privacy-Aware Wearable-Assisted Continuous Authentication Framework 1718116
Ashish Venkat Context-Sensitive Fencing: Securing Speculative Execution via Microcode Customization 1850436
Jessica Vitak Mapping Privacy and Surveillance Dynamics in Emerging Mobile Ecosystems: Practices and Contexts in the Netherlands and US 1640640
Roopa Vishwanathan Automated Proof Construction and Verification for Attribute-based Cryptography 1800088
Roopa Vishwanathan Blockchain-enabled Payment Networks 1800088
Gang Wang Re-examining Email Spoofing in the Context of Spear Phishing 1750101, 1717028
Kuang-Ching Wang Towards a Traffic Analysis Resistant Internet Architecture 1643020
Weichao Wang Developing Security Education Materials for Future Advanced Manufacturing Engineering Workforce 1523096
XiaoFeng Wang Understanding and Discovering Emerging Cybercrimes through Automatic Analysis of Online Text Traces 1801432
Xiaoyin Wang GUILeak: Tracing Privacy Policy Claims on User Input Data for Android Applications 1748109
Nicholas Weaver Understanding and Illuminating Non-Public Data Flows: Evaluating Anti-Fingerprinting Privacy Enhancing Technologies 1514509
Sheng Wei HISA: Hardware Isolation-based Secure Architecturefor CPU-FPGA Heterogenous Systems 1912593
Wujie Wen Invisible Shield: Can Compression Harden Deep Neural Networks Universally Against Adversarial Attacks? 1840813
Andrew Whinston Information Disclosure and Security Policy Design: A Large-Scale Randomization Experiment in Pan-Asia 1718600
Pamela Wisniewski A Participatory Design Study to Test Community Oversight for Privacy and Security 1814068
Matthew Wright Website Fingerprinting in Tor: An Adversarial ML Approach 1816851, 1722743
Dinghao Wu Dynamic and Static Program Analysis for Side Channel Vulnerability Detection and Mitigation 1652790
Li Xiong PriSTE: Protecting Spatiotemporal Event Privacy in Continuous LBS 1618932
Qiben Yan URadio: Towards Secure Smart Home IoT Communication Using Hybrid Ultrasonic-RF Radio 1950171
Zheng Yan Where are the Weakest Links in Cybersecurity Judgment of Elementary School Students, Middle School Students, High School Students, and School Teachers 1649872
Danfeng Yao Deployment-quality and Accessible Solutions  for Cryptography Code Development 1929701
Attila A Yavuz CAREER: Lightweight and Fast Authentication for Internet of Things 1652389
Qiaoyan Yu Managing Hardware Security in Three Dimensional Integrated Circuits 1717130
Yanfang (Fanny) Ye Intelligent Malware Detection Utilizing Novel File Relation-Based Features and Resilient Techniques for Adversarial Attacks 1946327
Yanfang (Fanny) Ye Securing Cyberspace: Gaining Deep Insights into the Online Underground Ecosystem 1940859
Philip S. Yu Learning Dynamic and Robust Defenses Against Co-Adaptive Spammers 1931042
Zizhan Zheng Towards Robust Moving Target Defense: A Game Theoretic and Learning Approach 1816495
Huiyang Zhou Towards Smart and Secure Non Volatile Memory 1717550
Lina Zhou Implicit One-handed Mobile User Authentication by Induced Thumb Biometrics on Touch-screen Handheld Devices 1704800, 1917537
     
     

TERRACE ROOM

MAGNOLIA BALLROOM