Amos | Abbott | 2136915 | EAGER: Biometric Authentication using Noncontact Cardiovascular Signals |
Nael | Abu-Ghazaleh | CNS-1619322, 1617915 | Collaborative Research: SaTC: CORE: Medium: Leakage-free Isolated Execution: Architectures and Security Models |
Yuvraj | Agarwal | 1801472 | SaTC: Core: End-to-End Support for Privacy in the Internet-of-Things |
Khair | Al Shamaileh | 2006662 | Jamming Detection and Classification in OFDM-based UAVs via Feature- and Spectrogram-tailored Machine Learning |
Laura | Albert | 2000986 | SaTC: CORE: Medium: An Optimization Framework for Identifying Dynamic Risk Management Practices |
Ahmad | Alsharif | 2153464 | CRII: SaTC: RUI: Towards Trustworthy and Accountable IoT Data Marketplaces |
Mary Jean | Amon | 2053152 | Bottom-up Psychosocial Interventions for Interpersonal Privacy Preservation in Social Media |
Nazanin | Andalibi | 2020872 | Towards Accounting for the Human in Emotion Recognition Technologies |
Sebastian | Angel | 2045861 | CAREER: Tools For Building Online Services That Hide Metadata |
Mohd | Anwar | 2007662 | Tracking User Behavior, Cognitive Burdens, and the Impact of Behavioral Nudging on Security Updates by Young and Older Adults |
Navid | Asadi | 1821780 | PHIKS - PHysical Inspection and attacKs on electronicS |
Adam | Aviv | 1845300 | CAREER: Enhancing Mobile Authentication by Measuring the Authentication Life-Cycle |
Adam | Aviv | 2138654, 2138078 | Collaborative Research: SaTC: EDU: Security and Privacy Implications of Remote Proctoring for School Policies and Practices |
Erman | Ayday | 2050410 | SaTC: CORE: Small: Robust, Privacy- and Utility-Preserving Fingerprinting Schemes for Correlated Data |
Anys | Bacha | CNS-1947580 | An Integrated Treatment of Ransomware Through Microarchitecture and Software Solutions |
Ibrahim | Baggili | 1900210 | Expanding Digital Forensics Education with Artifact Curation and Scalable, Accessible Artifact Exercises |
Hamid | Bahrami | 1956110 | SaTC: CORE: Small: A Practical Approach to Study Security in Wireless Networks |
Shi | Bai | 2122229 | Cryptographic Hardness of Module Lattices |
Shi | Bai | 2044855 | CAREER: Concrete Hardness in Lattice-based Cryptography |
Kiran | Balagani | 1814846 | Leveraging Movement, Posture, and Anthropometric Contexts to Strengthen the Security of Mobile Biometric |
Alexandru | Bardas | 1850406 | CRII: SaTC: Creating and Managing Structurally-Morphing IT Systems - Moving Targets |
Alexandru | Bardas | 1915824, 1915822 | DCL: SaTC: Early-Stage Interdisciplinary Collaboration: A Sociotechnical Metrics Framework for Network and Security Operation Centers |
Lujo | Bauer | 1801391, 2113345 | SaTC: CORE: Medium: Collaborative: Using Machine Learning to Build More Resilient and Transparent Computer Systems |
France | Belanger | SES‐2039172 | Information Privacy Tensions and Decisions in Families during COVID‐19 |
Terry | Benzel | 1925773, 1925616, 1925564, 1925588 | Sharing Expertise and Artifacts for Reuse through Cybersecurity Community Hub (SEARCCH) |
Julia | Bernd | 2114229, 2114230 | Foregrounding Bystanders as Stakeholders in Smart Home Product Design |
Raheem | Beyah | 1929580 | ADIDS: An Air-gapped Distributed Intrusion Detection System for the Power Grid |
Nicola | Bezzo | 11816591 | Online Malicious Intent Inference for Safe CPS Operations under Cyber-attacks |
Shameek | Bhattacharjee | 2030611 | SaTC CORE: Small: TAURUS: Towards a Unified Robust and Secure Data Driven Approach for Attack Detection in Smart Living |
Vincent | Bindschaedler | 2055123 | SaTC: CORE: Medium: Countering Surveillanceware Using Deception-Based Generative Models and Systems Mechanisms |
Gedare | Bloom | 2046705 | CAREER: Foundations for Real-Time System Security |
Alexandra | Boldyreva | 1946919 | Provable Security Analysis of FIDO2 Protocol for Passwordless Authentication on the Web |
Borzoo | Bonakdarpour | 2100989 | SaTC:CORE:Small:Techniques for Software Model Checking of Hyperproperties |
Shaunak D. | Bopardikar | 2134076 | SaTC: CORE: SMALL: Data-driven Attack and Defense Modeling for Cyber-physical Systems (CPS) |
Travis | Breaux | 2007298 | Privacy Impact and Risk Assessment at Design-Time |
Zhipeng | Cai | 1912753 | SaTC: EDU: Collaborative: Advancing Cybersecurity Learning Through Inquiry-based Laboratories on a Container-based Virtualization Platform |
Kelly | Caine | 1940679 | Cryptographic Provenance for Digital Publishing |
L. Jean | Camp | 1565375 | TWC: Large: Collaborative: Living in the Internet of Things |
Yinzhi | Cao | 1854000 | TWC: Medium: Collaborative: Efficient Repair of Learning Systems via Machine Unlearning |
Justin | Cappos | 1801376 | NSF SaTC: TTP: Medium: Collaborative: Securing the Software Supply Chain |
Bogdan | Carbunar | 2013671 | SaTC: CORE: Small: Deconstructing and Neutralizing Search Rank Fraud |
Bogdan | Carbunar | 2114911 | Collaborative Research: EAGER: SaTC-EDU: Just-in-Time AI Driven Cyber Abuse Education in Social Networks |
Krishnendu | Chakrabarty | 2049335 | Secure and Trustworthy Cyberphysical Microfluidic Systems |
Krishnendu | Chakrabarty | 2011561 | Security of FPGA-as-a-Service Reconfigurable Systems |
David | Chan-Tin | 1919004, 1918591 | SaTC: EDU: Collaborative: Personalized Cybersecurity Education and Training |
Bo | Chen | 1938130 | EAGER: Enabling Secure Data Recovery for Mobile Devices against Malicious Attacks |
Hao | Chen | 1801751 | SaTC: CORE: Medium: Collaborative: Towards Robust Machine Learning Systems |
Hsinchun | Chen | 1936370 | SaTC: CORE: Small: Cybersecurity Big Data Research for Hacker Communities: A Topic and Language Modeling Approach |
Hsinchun | Chen | CNS-2041770 | CRII: SaTC: Identifying Emerging Threats in the Online Hacker Community for Proactive Cyber Threat Intelligence |
Hsinchun | Chen | 2038483 | EAGER: SaTC-EDU: AI-Cybersecurity Research and Education (AI4Cyber) at Scale |
Qi | Chen | 1930041, 1929771 | Exposing and Mitigating Security/Safety Concerns of CAVs: A Holistic and Realistic Security Testing Platform for Emerging CAVs |
Yingying | Chen | 1820624 | Exploiting Physical Properties in Wireless Networks for Implicit Authentication |
Yingying | Chen | 2114220, 2114161 | Securing IoT and Edge Devices under Audio Adversarial Attacks |
Yu | Chen | CNS-2039342 | EAGER: SAVED: Secure Audio and Video Data from Deepfake Attacks Leveraging Environmental Fingerprints |
Long | Cheng | 2114920, 2114982, 2114936 | EAGER: SaTC-EDU: Learning Platform and Education Curriculum for Artificial Intelligence-Driven Socially-Relevant Cybersecurity |
Adam | Chlipala | 2130671 | Scaling Correct-by-Construction Code Generation for Cryptography |
Christopher | Clifton | CNS-2114123, 2114141 | Broad-Spectrum Facial Image Protection with Provable Privacy Guarantees |
Christian | Collberg | 2040206 | The Tigress Endpoint Protection Tool - Transition to Practice |
Henry | Corrigan-Gibbs | CNS-2054869 | Practical Private Information Retrieval |
Matthew | Costello | 2014065 | RAPID: Exploring the New Wave of Cyber-Harassment Linked to COVID-19 |
Dana | Dachman-Soled | 1933033 | SaTC: CORE: Small: Meta Coding and Applications in Cryptography |
Alberto | Dainotti | 1705024 | Investigating the Susceptibility of the Internet Topology to Country-level Connectivity Disruption and Manipulation |
Melissa | Dark | 2117073 | Assessment Resources for Cybersecurity (ARC) project |
Anupam | Das | 1849997 | CRII: SaTC: Analyzing Information Leak in Smart Homes |
Sauvik | Das | 2029519 | Corporeal Cybersecurity |
Sauvik | Das | 2126058 | Privacy Through Design |
Azadeh | Davoodi | 1812600 | SaTC: STARSS: Small: Analysis of Security and Countermeasures for Split Manufacturing of Integrated Circuits |
Saumya | Debray | 1908313 | Reasoning about Dependencies and Information Flow in Dynamic Code |
Leigh Ann | DeLyser | 2028426 | JROTC-CS Impact Study |
Srini | Devadas | 2115587 | Provably Secure, Usable, and Performant Enclaves in Multicore Processors |
Thang | Dinh | 2140477, 2140411 | Collaborative Research: SaTC: EAGER: Trustworthy and Privacy-preserving Federated Learning |
YEVGENIY | DODIS | 2055578 | Making Crypto Too BIG To Break |
YEVGENIY | DODIS | 1815546 | On the Power of Preprocessing and Non-Uniformity |
Shiri | Dori-Hacohen | 2147305 | FAI: BRIMI - Bias Reduction In Medical Information |
Christopher | Doss | 2039612, 2039613, 2039614 | EAGER: SaTC AI-Cybersecurity: Safeguarding STEM Education and Scientific Knowledge in the age of Hyper realistic AI-Generated Data |
Ramakrishnan | Durairajan | 2132651, 2132643, 2132639 | ONSET: Optics-enabled Network Defenses for Extreme Terabit DDoS Attacks |
Manuel | Egele | 1916393, 1916398 | Taming Memory Corruption with Security Monitors |
Kirsten | Eisentraeger | 2001470 | Classical and Quantum Algorithms For Number-Theoretic Problems Arising in Cryptography |
Salim | El Rouayheb | 1801630 | Secure Distributed Coded Computations for IoT: An Information Theoretic and Network Approach |
William | Enck | 2054911, 2055014 | Collaborative Research: SaTC: CORE: Medium: Enabling Practically Secure Cellular Infrastructure |
William | Enck | 1946273 | SaTC: CORE: Small: Detecting Vulnerabilities and Remediations in Software Dependencies |
Michalis | Faloutsos | 2132642 | SOFIA: Finding and Profiling Malware Source-Code in Public Archives at Scale |
Liyue | Fan | 1949217 | Image Publication with Differential Privacy |
Liyue | Fan | CNS-1951430 | Privacy-Preserving Mobile Data Collection for Social and Behavioral Research |
Fariborz | Farahmand | 2041788 | Advancing Cybersecurity Education to Human-Level Artificial Intelligence |
Lisa | Fazio | 2122640 | SaTC: CORE: Small: How False Beliefs Form and How to Correct Them |
Earlence | Fernandes | 2144376 | Security and Privacy Foundations of Internet-Scale User-Centered Automation |
Renato | Figueiredo | 1814557 | FIRMA: Personalized Cross-Layer Continuous Authentication |
Renato | Figueiredo | 2028734 | Lumen: A Machine Learning Framework to Expose Influence Cues in Texts |
Ferdinando | Fioretto | 2133169 | Collaborative Research: SaTC: CORE: Small: Privacy and Fairness in Critical Decision Making |
Alvis | Fong | 2017289 | CyberTraining: Pilot: Modular Experiential Learning for Secure, Safe, and Reliable AI (MELSSRAI) |
Domenic | Forte | 1717392 | iPROBE - An Internal Shielding Approach for Protecting against Frontside and Backside Probing Attacks |
Xing | Gao | 2054657 | CRII: SaTC: Securing Containers in Multi-Tenant Environment via Augmenting Linux Control Groups |
Lixin | Gao | 1918187 | Privacy-Preserving Policy Verification of Interdomain Routing |
Christina | Garman | 2047991 | Removing the Human Element: Securing Deployed Cryptographic Systems through the use of Cryptographic Automation |
Jean-Luc | Gaudiot | 2026675 | Securing Information Systems with Flexible Hardware Techniques |
Daniel | Genkin | CNS-1954712 | CORE: Medium: Collaborative: Hardening Off-the-Shelf Software Against Side Channel Attacks |
Sandra | Gonzalez-Bailon | 2017655 | Behavioral Effects of Exposure to Extremist Content in Social Media |
Guofei | Gu | 1816497 | Adversarial Learning via Modeling Interpretation |
Danna | Gurari | 2126314 | Novel Algorithms and Tools for Empowering People Who Are Blind to Safeguard Private Visual Content |
Nikhil | Gupta | DGE-1931724 | SaTC-EDU: Collaborative: Cybersecurity Education for Additive Manufacturing |
Maanak | Gupta | 2025682 | Collaborative Research: SaTC: EDU: Artificial Intelligence Assisted Malware Analysis |
Shuang | Hao | 2146448 | CAREER: Empowering White-box Driven Analytics to Detect AI-synthesized Deceptive Content |
Ian | Harris | 1813858 | Detecting Social Engineering Attacks Using Semantic Language Analysis |
John | Harris | 1801599 | REVELARE: A Hardware-Supported Dynamic Information Flow Tracking Framework for IoT Security and Forensics |
Willie | Harrison | 1910812 | CIF: Small: Best Wiretap Codes for Real-world Physical-layer Security |
Ting | He | 1946022 | SaTC: CORE: Small: Adversarial Network Reconnaissance in Software Defined Networking |
Nadia | Heninger | 1913167, 1913210 | Short Vectors in Lattices |
Nadia | Heninger | 2048563 | CAREER: Cryptographic Security at Internet Scale |
Matthew | Hicks | 2046589 | CAREER: Designing and Defending Novel Ultra-stealthy andControllable Design-time Analog-domain Hardware Trojans |
Viet Tung | Hoang | 1755539 | Towards Stronger and Verified Security for Real-World Cryptography |
Viet Tung | Hoang | 2046540 | New Analytic Frontiers for Symmetric Cryptography |
Yuan | Hong | CNS-2034870, 2034615 | Collaborative Research: SaTC: CORE: Small: Privately Collecting and Analyzing V2X Data for Urban Traffic Modeling |
Nicholas | Hopper | 1815757 | Models and Measurements for Website Fingerprinting |
Nicholas | Hopper | 1814753 | Consistent and Private Group Communication |
Khaza Anuarul | Hoque | 2114035 | Modeling and Defense of Cyber Attacks for Improving Social Virtual Reality Resilience |
Tamzidul | Hoque | 2114157, 2114165, 2114200 | Hardware Security Education for All Through Seamless Extension of Existing Curricula |
Amir | Houmansadr | 1553301 | CAREER: Sustainable Censorship Resistance Systems for the Next Decade |
Justin | Hsu | 2152831 | CORE: Medium: SPIPS: Security and Privacy in Programmable Switches |
Fei | Hu | DGE#1723250 | Captivology-Stimuli-based Learning (CAPITAL) of Big Data Security (BigSec): Towards a Science/Engineering, Career-Oriented Train |
Hongxin | Hu | 2129164 | CAREER: Towards Elastic Security with Safe and Efficient Network Security Function Virtualization |
Jeff | Huang | 1901482 | New Defenses for Data-Only Attacks |
Cahrles | Hughes | 2114808 | Improving Cybersecurity Education for Adolescents with Autism Through Automated Augmented Self-Monitoring Applications |
Stratis | Ioannidis | 1717213 | MaSSIF: Massively Scalable Secure Computation Infrastructure using FPGAs |
Trent | Jaeger | 1801534 | DataGuard System - "The Taming of the Stack" - NDSS 2022 |
Shweta | Jain | CNS-2131182 | CISE: MSI: Cultivating and Developing Research Talent to Support Research in Cyber-Security |
Ahmad | Javaid | 1903419, 1903423 | INteractive Animated VIsualization and PracTice basEd Cybersecurity Curriculum and Training (InviteCyber) Framework |
Sampath | Jayarathna | 2149607 | REU Site: Research Experiences for Undergraduates in Disinformation Detection and Analytics |
Limin | Jia | 1704542 | Towards a Usable, Practical, and Provably Secure Browser Infrastructure |
Limin | Jia | CNS-2114148, 2114074 | Toward Safe, Private, and Secure Home Automation: From Formal Modeling to User Evaluation |
Naima | Kaabouch | 2006674 | GPS Spoofing Attacks on UAS: Detection Techniques Based on Machine and Deep Learning |
Chris | Kanich | CNS-1801663 | Enabling Long-Term Security and Privacy through Retrospective Data Management |
Apu | Kapadia | 1814476 | Socio-Technical Strategies for Enhancing Privacy in Photo Sharing |
Apu | Kapadia | 1814513, 1814866 | Tangible Privacy: User-Centric Sensor Designs for Assured Privacy |
Nathan | Kaplan | DMS 1802281 | Counting Problems in Number Theory: Elliptic and Plane Quartic Curves over Finite Fields |
Robert | Karam | DGE-1954259 | SaTC: EDU: Improving Student Learning through Competitive Embedded System Security Challenges |
Nima | Karimian | 2104520 | Physical Side Channel Attacks in Biometric System |
Omer | Khan | 1929261 | SaTC: CORE: Small: A Secure Processor that Exploits Multicore Parallelism while Protecting Against Microarchitecture State Attacks |
Mohammad | Khan | 1750908 | CAREER: The Role of Emotion and Social Motives in Communicating Risk: Implications for User Behavior in the Cyber Security Context |
Latifur | Khan | 1931800 | Curriculum Development for Secure Blockchain Technologies |
Latifur | Khan | 2039542 | Secure and Privacy-Preserving Adaptive Artificial Intelligence Curriculum Development for Cyber Security |
Anurag | Khandelwal | 2054957 | Mixed Distribution Models for Encrypted Data Stores |
Farshad | Khorrami | 2039615 | NSF SATC: TTP: Small: Tracking Run-time Anomalies in Code Execution (TRACE) |
Aleksandra | Korolova | 1943584 | CAREER: Towards Privacy and Fairness in Multi-Sided Platforms |
David | Kotz | CNS-1955805, 1955172, 1955228, 1955231 | SPLICE: Security and Privacy in the Lifecycle of IoT for Consumer Environments |
Brent | Lagesse | 2113954, 2113955 | EAGER: SaTC: EDU: AI-enhanced Cybersecurity: Workforce Needs and Barriers to Learning |
Yingjie | Lao | 2047384 | CAREER: Protecting Deep Learning Systems against Hardware-Oriented Vulnerabilities |
Loukas | Lazos | 1813401 | SaTC: CORE: Small: Secure Cloud Storage Verification Methods |
Kisung | Lee | 2032745 | RAPID: Investigating Public Health and Social Information Disparities During the COVID-19 Pandemic |
Jaewoo | Lee | 1943046 | CAREER: Robust Adaptive Optimization Algorithms for Differentially Private Learning |
Kyumin | Lee | 1755536 | Tracking, Revealing and Detecting Crowdsourced Manipulation |
Adam | Lee | 1704139, 1703853 | Scalable Dynamic Access Control for Untrusted Cloud Environments |
Ada | Lerner | CNS-1948344 | Understanding and Addressing the Security and Privacy Needs of At-Risk Populations |
Jun | Li | 1564348, 1564250, 1564039 | Collaborative: Online Social Network Fraud and Attack Research and Identification |
Zhou | Li | 2039634 | Multi-Level Attack and Defense Simulation Environment for Artificial Intelligence Education and Research |
Frank | Li | 2055549 | SaTC: CORE: Small: Understanding, Analyzing, and Improving Password Authentication Practices across the Web |
Qinghua | Li | 1751255 | Towards Automated Security Vulnerability and Patch Management for Power Grid Operations |
Dan | Lin | 2027398, 2027114 | Self-Learning and Self-Evolving Detection of Altered, Deceptive Images and Videos |
Hui | Lin | 2144513 | PARP: Mislead Physical-Disruption Attacks by Preemptive Anti-Reconnaissance for Power Grids' Cyber-Physical Infrastructures |
Heather | Lipford | 1814110, 1814068, 1814439 | Leveraging Community Oversight to Enhance Collective Efficacy for Privacy and Security |
Ling | Liu | 2038029 | Privacy Enhancing Techniques and Innovations for AI-Cybersecurity Cross Training |
Yao | Liu | 2024300 | Creating Content Verification Tools to Protect Document Integrity |
Wenjing | Lou | 1916902, 1916926 | Toward Enforceable Data Usage Control in Cloud-based IoT Systems |
Lannan | Luo | CNS-1953073 | SaTC: CORE: Small: Semantics-Oriented Binary Code Analysis Learning from Recent Advances in Deep Learning |
Siwei | Lyu | 2153112 | SaTC: CORE: Small:
Combating AI Synthesized Fake Media Beyond Detection |
Hemanta | Maji | 2055605 | SaTC: CORE: Small: Optimal Coin-flipping Protocols |
Hafiz | Malik | 1815724, 1816019 | Forensic Examiner: Testbed for Benchmarking Digital Audio Forensic Algorithms |
Hafiz | Malik | 2035770 | Linking2Source: Security of In-Vehicle Networks via Source Identification |
Athina | Markopoulou | 1956393, 1955227, 2103439, 1956435 | ProperData: Protecting Personal Data Flow on the Internet |
Florence | Martin | 2015554 | Digital Safety Immersion for Elementary School Students |
Amirreza | Masoumzadeh | 2047623 | CAREER: Black-Box Learning of Web Application Authorization Policies |
Aaron | Massey | 1938121 | Enabling Regulatory Compliance for Software Engineering |
Michelle | Mazurek | 1801545, 1801633 | Understanding Security in the Software Development Lifecycle: A Holistic, Mixed-Methods Approach |
Patrick | McDaniel | 1805310 | The Center for Trustworthy Machine Learning |
Muhammad Taqi Raza | Mehdi | CNS-2051621 | Automatic Exploits Detection and Mitigation for Industrial Control System Protocols |
Hoda | Mehrpouyan | 1846493 | CAREER: Formal TOols foR SafEty aNd Security of Industrial Control Systems (FORENSICS) |
Peihan | Miao | 2055358 | SaTC: CORE: Small: Expanding the Realm of Oblivious Transfer: New Tools for Cryptography |
Stephen | Miller | CNS-2124692 | Lattices, number theory, and distribution questions in cryptography |
Andrew | Miller | 2112726, 2112751 | Hybridizing Trusted Execution Environments and Secure Multiparty Computation |
Jiang | Ming | 2128703 | SaTC: CORE: Small: A Transparent and Customizable Android Container-Based Virtualization Architecture for Dynamic Malware Analysis |
Jelena | Mirkovic | 1815495 | SaTC: CORE: Small: Hardening Systems Against Low-Rate DDoS Attacks |
Prabhat | Mishra | 1936040 | SaTC: CORE: Small: Trustworthy System-on-Chip Design using Secure On-Chip Communication Architecture |
Tyler | Moore | 1652610 | CAREER: Developing Robust Longitudinal Indicators and Early Warnings of Cybercrime |
Chrystalla | Mouza | 1821794 | Cybersecurity Education Using Interactive Storytelling with Social Robots |
Frank | Mueller | 1813004 | T-Sys & T-Pack: Intrusion Detection for CPS |
Manohar | Murthi | 2123635, 2123618 | Multi-Disciplinary Analyses of the Nature and Spread of Unverified Information Online |
Adwait | Nadkarni | 1815336 | SaTC: CORE: Small: Enabling Systematic Evaluation of the Soundness of Android Security Analysis Techniques |
Hoda | Naghibijouybari | 2130978 | SaTC: CORE: Small: Microarchitectural side channel attacks and defenses in integrated CPU-GPU systems |
Tempestt | Neal | 2039373, 2039379 | Toward Age-Aware Continuous Authentication on Personal Computing Devices |
Ida | Ngambeki | 1934269, 1934279, 1934285 | An Assessment Driven Approach to Self-Directed Learning in Secure Programming (SecTutor) |
Nick | Nikiforakis | 1941617 | CAREER: Tools and Techniques for Preserving Integrity on the Web |
Nick | Nikiforakis | 1813974 | SaTC: CORE: Small: Understanding, Measuring, and Defending against Malicious Web Crawlers |
Rui | Ning | 2153358 | CRII: SaTC: Backdoor Detection, Mitigation, and Prevention in Deep Neural Networks |
Chandra | Orrill | 2114981 | Opening Doors for Cybersecurity & AI: An Interdisciplinary Approach to Engaging Middle School Students |
Laura | Osburn | 1932769 | Medium: Knowledge Work and Coordination to Improve O&M and IT Collaboration to Keep Our Buildings Smart AND Secure |
Balaji | Palanisamy | 2020071 | Blockchain-based Mechanisms for Timed Data Release and Timed Transactions |
Anand | Panangadan | 2125654 | SCC-IRG Track 2: Designing and Testing Remote Services to Support Formerly Homeless Persons in Permanent Housing |
Omkant | Pandey | 2028920 | SaTC: CORE: Small: Nested Black-Box Constructions in Cryptography |
Charalampos | Papamanthou | 1652259 | Efficient and Secure Distributed Consensus |
Bryan | Parno | 1801369, 1801321 | Automated Support for Writing High-Assurance Smart Contracts |
Yilang | Peng | 2150723 | Collaborative Research: SaTC: CORE: Small: Understanding How Visual Features of Misinformation Influence Credibility Perceptions |
Roberto | Perdisci | 2126641 | Defending Against Social Engineering Attacks with In-Browser AI |
Alfredo | Perez | 1950416 | An REU Site in Security and Privacy for Mobile Sensing and the IoT |
Hai | Phan | CNS-1935928, 1935923 | When Adversarial Learning Meets Differential Privacy: Theoretical Foundation and Applications |
James | Pierce | 1910218, 2142795 | Multidisciplinary Design Approaches to IoT Privacy and Security |
Michalis | Polychronakis | 2104148 | SaTC: CORE: Small: Selective Data Protection against Data-oriented and Transient Execution Attacks |
Atul | Prakash | 2039445 | Identifying Educational Conceptions and Challenges in Cybersecurity and Artificial Intelligence |
Viktor | Prasanna | 2104264 | Accelerating Privacy Preserving Deep Learning for Real-time Secure Applications |
Calton | Pu | 2039653 | Live Reality: Sustainable and Up-to-Date Information Quality in Live Social Media through Continuous Evidence-Based Knowledge |
Yanjun | Qi | CNS-124538 | Generalizing Adversarial Examples in Natural Language: White-box Testing of NLP models with Mask Neuron Coverage |
Mizanur | Rahman | 2104999 | CRII: SaTC: Cyber Resilient Localization and Navigation for Autonomous Vehicles |
Akond | Rahman | 2026869 | eSLIC: Enhanced Security Static Analysis of Configuration Scripts |
Ajita | Rattani | 2129173 | Probing Fairness of Ocular Biometrics Methods Across Demographic Variations |
Indrakshi | Ray | CNS-1715458 | Detecting and Reconstructing Network Anomalies and Intrusions in Heavy Duty Vehicles |
Julia | Rayz | 2039605 | EAGER: SaTC-EDU: AI-based Humor-Integrated Social Engineering (SE) Training |
Bradley | Reaves | CNS-1849994 | CRII: SaTC: Techniques for Measuring and Characterizing Robocalls |
Aunshul | Rege | 2032292 | SaTC: EDU: Educating STEM Students and Teachers about the Relevance of Social Engineering in Cyberattacks and Cybersecurity |
Matthew | Reimherr | SES-1853209 | Formal Privacy for Complex Data Objects |
Ling | Ren | 2143058 | CAREER: Algorithms Foundations of Blockchains |
Yi | Ren | 2101052 | SaTC: Core: Small: Decentralized Attribution and Secure Training of Generative Models |
Franziska | Roesner | 2041894 | Studying Problematic Content in the Web Advertising Ecosystem |
Franziska | Roesner | 1651230 | CAREER: Towards Secure Augmented Reality Platforms |
Jennie | Rogers | 2016240, 2016393 | Quicksilver: A Write-Oriented Private, Outsourced Database Management System |
Jerzy | Rozenblit | CNS-1615890 | SAFES: A Software-based Architecture for Ensuring Security and Resilience in Medical Device Design |
Alexander | Russell | 1801487 | Theory and Practice of Cryptosystems Secure Against Subversion |
Goel | Sanjay | 1912874 | Thwarting the Malicious Insider Evolution Process: The Theory of Strained Betrayal |
Armin | Sarabi | 20122001 | A Deep Learning Framework for Intelligent Active and Passive Measurements in the Age of Internet of Things |
Ioannis | Savidis | CNS-1751032 | Parameter Obfuscation: A Novel Methodology for the Protection of Analog Intellectual Property |
Jarecki | Saxena | 2030575 | Intrusion-Tolerant Outsourced Storage for Cyber-Infrastructure (TTP: Medium) |
Alessandra | Scafuro | 1717067, 1764025 | A Broad Treatment of Privacy in Blockchains |
Patrick | Schaumont | 1931639 | SaTC: CORE: Small: Finding and Mitigating Side-channel Leakage in Embedded Architectures |
David | Schuster | 1553018 | CAREER: Understanding the Cognitive Processes of Computer Network Defense |
Alexander | Schwarzmann | 2131538 | A Robust Framework with Rigorous Semantics and Security Guarantees for Election-Day Voter Check-in |
Kent | Seamons | 1816929 | Usable Key Management and Forward Secrecy for Secure Email |
Vyas | Sekar | 1564009 | Handling a Trillion Unfixable Flaws on Billions of Internet-of-Things |
R | Sekar | 1918667 | RADAR: Real-time Advanced Detection and Attack Reconstruction |
Hossain | Shahriar | 2100115 | Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware |
Micah | Sherr | CNS-1925497 | Expanding Research Frontiers with a Next-Generation Anonymous Communication Experimentation (ACE) Framework |
Weisong | Shi | CNS-1928331, 1928349 | SaTC: CORE: Small: Collaborative: Hardware-assisted Plausibly Deniable System for Mobile Devices |
Katie | Shilton | 2131508 | Community-Centered Design of Automated Content Moderation |
Vitaly | Shmatikov | 1916717 | Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures |
Tao | Shu | 2006998 | Enabling Privacy-Preserving Routing-on-Context in IoT |
Craig | Shue | 1814402 | Fine-Grained Protection for Scalable Single-use Services |
Akbar | Siami Namin | 1564293 | SBE: Medium: User-Centric Design of a Sonification System for Automatically Alarming Security Threats and Impact |
Akbar | Siami Namin | 1821560 | SaTC: EDU: Improving Student Learning and Engagement in Digital Forensics through Collaborative Investigation of Cyber Security Incidents and Simulated Capture-The-Flag Exercises |
Yasin | Silva | 2036127 | BullyBlocker - Interdisciplinary Models to Identify and Understand Cyberbullying |
Alice | Silverberg | 1703321, 1701567, 1701785 | An Algebraic Approach to Secure Multilinear Maps for Cryptography |
Radu | Sion | 2052951 | SATC: CORE: Small: Efficient Plausible Deniability Systems |
Rebecca | Slayton | 1553069 | Enacting Cybersecurity Expertise |
Linhai | Song | CNS-1955965 | Understanding and Detecting Memory Bugs in Rust |
WenZhan | Song | 2019311 | Cyber-threat Detection and Diagnosis in Multistage Manufacturing Systems through Cyber and Physical Data Analytics |
Houbing | Song | 1956193 | SaTC: EDU: Collaborative: Bolstering UAV Cybersecurity Education through Curriculum Development with Hands-on Laboratory Framework |
Drew | Springall | 2115025 | EAGER: Transformative Educational Approaches to Meld Artificial Intelligence and Cybersecurity Mindsets |
Anna | Squicciarini | CNS-2029976, 2029881 | Collaborative research: SaTC: Core: Small: Privacy protection of Vehicles Location in Spatial Crowdsourcing Under Realistic Adversarial Models |
Meera | Sridhar | 1947295 | Enhancing Security Education in Hybrid Mobile and Internet of Things Firmware Through Inclusive, Engaging, Learning Modules (E-SHIIELD) |
Sudarshan | Srinivasan | 2117190 | SaTC: CORE: Small: Formal Verification Techniques For Microprocessor Security Vulnerabilities and Trojans |
Katherine | Stange | CNS-1652238 | CAREER: Research and Education: Number Theory, Geometry and Cryptography |
Kate | Starbird | 2120496 | Rapid-Response Frameworks for Mitigating Online Disinformation |
Kevin | Steinmetz | 1916284 | SaTC: Core: Small: Collaborative: Understanding Law-Enforcement Cyber Investigations |
Alley | Stoughton | 1801564 | Towards Mechanized Proofs of Composable Security Properties |
Gianluca | Stringhini | 2114407 | Detecting Accounts Involved in Influence Campaigns on Social Media |
Megan | Stubbs-Richardson | 2031246 | RAPID: Analyses of Emotions Expressed in Social Media and Forums During the COVID-19 Pandemic |
Cynthia | Sturton | 1816637 | SaTC STARSS: Tackling the Corner Cases: Finding Security Vulnerabilities in CPU Designs |
Xiaoyan | Sun | 2105801 | Developing Ready-to-Use Hands-on Labs with Portable Operating Environments for Digital Forensics Education |
Shreyas | Sundaram | CNS-1718637 | The Impacts of Human Decision-Making on Security and Robustness of Interdependent Systems |
Daniel | Takabi | 2006329 | SaTC: CORE: Small: An Attribute-based Insider Threat Mitigation Framework |
Daniel | Takabi | 2054968 | SaTC: EDU: Secure and Private Artificial Intelligence |
Ravi | Tandon | 1715947 | SaTC: CORE: Small: Robust Physical Layer Security with Channel Knowledge Uncertainty |
Yuzhe | Tang | 1922507 | SaTC: CORE: Small: External Obliviousness in Trusted Execution Environments |
Yuzhe | Tang | 2104532 | Collaborative Research: SaTC: EDU: Developing Instructional Laboratories for Blockchain Security Applications |
Unal | Tatar | 1948261 | CRII: SaTC: Graph-based Probabilistic Cyber Risk Modeling |
Himanshu | Thapliyal | 1845448 | CAREER: Utilizing Principles of Energy Recovery Computing for Low-Energy and DPA-Resistant IoT Devices |
Yuan | Tian | 1943100 | CAREER: Secure Voice-Controlled Platforms |
Andrew | Tolmach | 2048499 | Specifying and Verifying Secure Compilation of C Code to Tagged Hardware |
Stavros | Tripakis | 1801546, 1801342, 1801399 | SaTC: CORE: Medium: Collaborative: Bridging the Gap Between Protocol Design and Implementation through Automated Mapping |
Timothy | Tsai | 1948531 | A Cross-Verification Approach for Identifying Tampered Audio |
Michael Carl | Tschantz | 2055772, 2055773 | Narrowing The Gap Between Privacy Expectations and Reality in Mobile Health |
Guan-Hua | Tu | 1815636 | Side-channel Attacks Against Mobile Users: Singularity Detection, Behavior Identification, and Automated Rectification |
Carlene | Turner | 1956428 | Excellence in Research - The Impact of Cybersecurity Policies on Employees' Efficiency and Performance Predictability |
Jonathan | Ullman | 2120603, 2120611, 2120667, 2120544 | Foundations for the Next Generation of Private Learning Systems |
Blase | Ur | 2047827 | CAREER: Usable, Data-Driven Transparency and Access for Consumer Privacy |
Krishna | Venkatasubramanian | 1947022 | SaTC: CORE: Small: Authentication Solutions for Individuals with Upper Extremity Impairment |
Christelle | Vincent | DMS-1802323 | Applications to Cryptography of the Construction of Curves from Modular Invariants |
Jessica | Vitak | 1951688 | SaTC EDU: Collaborative: Connecting Contexts: Building Foundational Digital Privacy and Security Skills for Elementary School Ch |
Ting | Wang | 1953893 | Trustworthy Machine Learning from Untrusted Models |
Boyang | Wang | 1947913 | CRII: SaTC: Fingerprinting Encrypted Voice Traffic on Smart Speakers |
Gang | Wang | 2055233 | SaTC: CORE: Small: Towards Label Enrichment and Refinement to Harden Learning-based Security Defenses |
Gang | Wang | 2030521 | CAREER: Machine Learning Assisted Crowdsourcing for Phishing Defense |
Yang | Wang | 2114991 | Teach High School Students about Cybersecurity and AI Ethics via Empathy-Driven Hands |
Yang | Wang | 1652497 | Inclusive Privacy and Security for People with Visual Impairments (PVI) |
XiaoFeng | Wang | 1801432, 1850725, 1801652 | SaTC: CORE: Medium: Collaborative: Understanding and Discovering Emerging Cybercrimes through Automatic Analysis of Online Text |
Shuo | Wang | 1812071 | SaTC: TTP: Medium: Collaborative: RESULTS: Reverse Engineering Solutions on Ubiquitous Logic for Trustworthiness and Security |
Tao | Wei | 2027069 | SaTC: CORE: Medium: Introducing DIVOT: A Novel Architecture for Runtime Anti-Probing/Tampering on I/O Buses |
Sheng | Wei | 1912593 | Security of Heterogeneous CPU-FPGA Systems |
Jin | Wei-Kocsis | 2114974 | EAGER: SaTC-EDU: Cybersecurity Education in the Age of Artificial Intelligence: A Novel Proactive and Collaborative Learning Paradigm |
Eliane | Wiese | 2041960 | EAGER: SaTC-EDU: Teaching Security in Undergraduate AI with Transparency and Contextualization |
Eric | Williams | 2037535 | SaTC: CORE: Small: Managing Privacy and Environment for Used and End-of-Life Electronic Devices |
Jake | Williams | 1850014 | Moderating Effects of Automation on Information Transmission in Social Forums |
Laurie | Williams | 2055554 | SaTC: CORE: Small: Risk-based Secure Checked-in Credential Reduction for Software Development |
Laurie | Williams | 1909516 | SHF: Small: Detecting the 1%: Growing the Science of Vulnerability Detection |
Shomir | Wilson | 2105736 | A Large-Scale, Longitudinal Resource to Advance Technical and Legal Understanding of Textual Privacy Information |
Damon | Woodard | 2131480 | SaTC: I-C-U: AI-Enabled Recovery and Assurance of Semiconductor IP from SEM Images |
David | Wu | 2151131 | SaTC: CORE: Small: Expanding the Frontiers of Lattice-Based Cryptography |
Xusheng | Xiao | 2028748 | Scalable Cyber Attack Investigation using Declarative Queries and Interrogative Analysis |
Jiafeng | Xie | 2020625 | SaTC: CORE: Small: Fast Algorithm Originated Fault Detection Scheme for Ring-LWE based Cryptographic Hardware |
Li | Xiong | 2124104 | PREMED: Privacy-Preserving and Robust Computational Phenotyping using Multisite EHR Data |
Weifeng | Xu | 2039289 | Exploring Visualized and Explainable AI to Improve Students' Learning Experience in Digital Forensics Education |
Dianxiang | Xu | 1954327 | TWC: Small: Benchmarking Testing Methods for Access Control Policies |
Shouhuai | Xu | 2122631 | A Framework for Enhancing the Resilience of Cyber Attack Classification Mechanisms |
Jun | Xu | 2213727 | Collaborative Research: SaTC: CORE: Medium: Rethinking Fuzzing for Security |
Dongpeng | Xu | 1948489 | Simplification of Mixed Boolean-Arithmetic Obfuscated Expression |
Qiben | Yan | 1950171 | Interactive Attack on Smartphone Voice Systems |
Mengjia | Yan | 2046359 | A Quantitative Framework for Analyzing and Mitigating Microarchitectural Side Channels |
Baijian | Yang | 1820573, 1820608 | CHEESE: Cyber Human Ecosystem of Engaged Security Education |
Danfeng | Yao | 1929701 | SaTC: TTP: Medium: Collaborative: Deployment-quality and Accessible Solutions for Cryptography Code Development |
Fan | Yao | 2019536, 2019548 | SaTC: Small: Understanding and Taming Deterministic Model Bit Flip Attacks in Deep Neural Networks |
Attila A | Yavuz | 1917627 | CAREER: Lightweight and Fast Authentication for Internet of Things |
Tuba | Yavuz | CNS-1942235 | CAREER: Towards a Secure and Reliable Internet of Things through Automated Model Extraction and Analysis |
Arkady | Yerukhimovich | 1955620, 1955264, 1955319 | New Approaches for Large Scale Secure Computation |
Heng | Yin | 1719175 | Towards Robust and Scalable Search of Binary Code and Data |
Man-Ki | Yoon | 1945541 | SaTC: CORE: Small: Partition-Oblivious Real-Time Hierarchical Scheduling |
Jeffrey | Yost | 2022484 | EAGER: Mining a Useable Past: Perspectives, Paradoxes, & Possibilities in Security and Privacy |
Chansu | Yu | 2028397 | SaTC: EDU: Transdisciplinary Cybersecurity Education for Law and Engineering Students |
Philip | Yu | 1930941 | Learning Dynamic and Robust Defenses Against Co-Adaptive Spammers |
Qiaoyan | Yu | 1652474 | CAREER: Proactive Defense Methods for Chip Integrity and Security |
Qiaoyan | Yu | 2022279 | SaTC:CORE:Small: Towards Securing the Hardware and Software for Approximate Computing Systems |
Shucheng | Yu | 1817438 | Toward Usable and Ubiquitous Trust Initialization and Secure Networking in Wireless Ad Hoc Networks |
Shuhan | Yuan | 2103829 | SaTC: CORE: Small: Deep Learning for Insider Threat Detection |
Qiang | Zeng | CNS-1856380 | SaTC: CORE: Small: Collaborative: Enabling Precise and Automated Insecurity Analysis of Middleware on Mobile Platforms |
Zhenkai | Zhang | CNS-2147217 | SaTC: CORE: Small: Leveraging Physical Side-Channel Information to Build Detection-Based Rowhammer Defenses |
Danfeng | Zhang | 1956032 | Automatic Software Patching against Microarchitectual Attacks |
Ziming | Zhao | 2037798 | Securing Internet of Things Against Cache-based Attacks |
Yanbin | Zhao | 1949650 | SaTC: CORE: Medium: Hidden Rules in Neural Networks as Attacks and Adversarial Defenses |
Zizhan | Zheng | CNS-1816495 | SaTC: CORE: Small: Towards Robust Moving Target Defense: A Game Theoretic and Learning Approach |
Qian | Zhiyun | 1953932, 1953933 | SaTC: CORE: Small: Collaborative: Deep and Efficient Dynamic Analysis of Operating System Kernels |
Hai | Zhou | 2113704 | Efficient Logic Encryptions for Hardware IP Protection |
Lina | Zhou | 1917537 | Implicit One-handed Mobile User Authentication by Induced Thumb Biometrics on Touch-screen Handheld Devices |
Sebastian | Zimmeck | 2055196 | Improving Internet Privacy with Global Privacy Control (GPC) |
Rae | Zimmerman | 2122060 | Understanding Human Misperception of Cyber Risks and Integrative Design of Human-Centered Intervention Mechanisms: Component |
Cliff | Zou | 1915780 | SaTC: EDU: Collaborative: Building a Low-cost and State-of-the-art IoT Security Hands-on Laboratory |
Xukai | Zou | DGE-2011117, 2011175 | Building an Electronic Voting Technology Inspired Interactive Teaching and Learning Framework for Cybersecurity Education |