Project Highlight Slides
Lead PI First NameLead PI Last NameNSF Project Award Number(s)Project Title
Amos    Abbott    2136915    EAGER: Biometric Authentication using Noncontact Cardiovascular Signals
NaelAbu-GhazalehCNS-1619322, 1617915 Collaborative Research: SaTC: CORE: Medium: Leakage-free Isolated Execution: Architectures and Security Models
YuvrajAgarwal1801472SaTC: Core: End-to-End Support for Privacy in the Internet-of-Things
KhairAl Shamaileh2006662Jamming Detection and Classification in OFDM-based UAVs via Feature- and Spectrogram-tailored Machine Learning
LauraAlbert2000986SaTC: CORE: Medium: An Optimization Framework for Identifying Dynamic Risk Management Practices
AhmadAlsharif2153464CRII: SaTC: RUI: Towards Trustworthy and Accountable IoT Data Marketplaces
Mary JeanAmon2053152Bottom-up Psychosocial Interventions for Interpersonal Privacy Preservation in Social Media
NazaninAndalibi2020872Towards Accounting for the Human in Emotion Recognition Technologies
SebastianAngel2045861CAREER: Tools For Building Online Services That Hide Metadata
MohdAnwar2007662Tracking User Behavior, Cognitive Burdens, and the Impact of Behavioral Nudging on Security Updates by Young and Older Adults
NavidAsadi1821780PHIKS - PHysical Inspection and attacKs on electronicS
AdamAviv1845300CAREER: Enhancing Mobile Authentication by Measuring the Authentication Life-Cycle
AdamAviv2138654, 2138078Collaborative Research: SaTC: EDU: Security and Privacy Implications of Remote Proctoring for School Policies and Practices
ErmanAyday2050410SaTC: CORE: Small: Robust, Privacy- and Utility-Preserving Fingerprinting Schemes for Correlated Data
AnysBachaCNS-1947580An Integrated Treatment of Ransomware Through Microarchitecture and Software Solutions
IbrahimBaggili1900210Expanding Digital Forensics Education with Artifact Curation and Scalable, Accessible Artifact Exercises
HamidBahrami1956110SaTC: CORE: Small: A Practical Approach to Study Security in Wireless Networks
ShiBai2122229Cryptographic Hardness of Module Lattices
ShiBai2044855CAREER: Concrete Hardness in Lattice-based Cryptography
KiranBalagani1814846Leveraging Movement, Posture, and Anthropometric Contexts to Strengthen the Security of Mobile Biometric
AlexandruBardas1850406CRII: SaTC: Creating and Managing Structurally-Morphing IT Systems - Moving Targets
AlexandruBardas1915824, 1915822DCL: SaTC: Early-Stage Interdisciplinary Collaboration: A Sociotechnical Metrics Framework for Network and Security Operation Centers
LujoBauer1801391, 2113345SaTC: CORE: Medium: Collaborative: Using Machine Learning to Build More Resilient and Transparent Computer Systems
FranceBelangerSES‐2039172Information Privacy Tensions and Decisions in Families during COVID‐19
TerryBenzel1925773, 1925616, 1925564, 1925588Sharing Expertise and Artifacts for Reuse through Cybersecurity Community Hub (SEARCCH)
JuliaBernd2114229, 2114230Foregrounding Bystanders as Stakeholders in Smart Home Product Design
RaheemBeyah1929580ADIDS: An Air-gapped Distributed Intrusion Detection System for the Power Grid
NicolaBezzo11816591Online Malicious Intent Inference for Safe CPS Operations under Cyber-attacks
ShameekBhattacharjee2030611SaTC CORE: Small: TAURUS: Towards a Unified Robust and Secure Data Driven Approach for Attack Detection in Smart Living
VincentBindschaedler2055123SaTC: CORE: Medium: Countering Surveillanceware Using Deception-Based Generative Models and Systems Mechanisms
GedareBloom2046705CAREER: Foundations for Real-Time System Security
AlexandraBoldyreva1946919Provable Security Analysis of FIDO2 Protocol for Passwordless Authentication on the Web
BorzooBonakdarpour2100989SaTC:CORE:Small:Techniques for Software Model Checking of Hyperproperties
Shaunak D.Bopardikar2134076SaTC: CORE: SMALL: Data-driven Attack and Defense Modeling for Cyber-physical Systems (CPS)
TravisBreaux2007298Privacy Impact and Risk Assessment at Design-Time
ZhipengCai1912753SaTC: EDU: Collaborative: Advancing Cybersecurity Learning Through Inquiry-based Laboratories on a Container-based Virtualization Platform
KellyCaine1940679Cryptographic Provenance for Digital Publishing
L. JeanCamp1565375TWC: Large: Collaborative: Living in the Internet of Things
YinzhiCao1854000TWC: Medium: Collaborative: Efficient Repair of Learning Systems via Machine Unlearning
JustinCappos1801376NSF SaTC: TTP: Medium: Collaborative: Securing the Software Supply Chain
BogdanCarbunar2013671SaTC: CORE: Small: Deconstructing and Neutralizing Search Rank Fraud
BogdanCarbunar2114911Collaborative Research: EAGER: SaTC-EDU: Just-in-Time AI Driven Cyber Abuse Education in Social Networks
KrishnenduChakrabarty2049335Secure and Trustworthy Cyberphysical Microfluidic Systems
KrishnenduChakrabarty2011561Security of FPGA-as-a-Service Reconfigurable Systems
DavidChan-Tin1919004, 1918591SaTC: EDU: Collaborative: Personalized Cybersecurity Education and Training
BoChen1938130EAGER: Enabling Secure Data Recovery for Mobile Devices against Malicious Attacks
HaoChen1801751SaTC: CORE: Medium: Collaborative: Towards Robust Machine Learning Systems
HsinchunChen1936370SaTC: CORE: Small: Cybersecurity Big Data Research for Hacker Communities: A Topic and Language Modeling Approach
HsinchunChenCNS-2041770CRII: SaTC: Identifying Emerging Threats in the Online Hacker Community for Proactive Cyber Threat Intelligence
HsinchunChen2038483EAGER: SaTC-EDU: AI-Cybersecurity Research and Education (AI4Cyber) at Scale
QiChen1930041, 1929771Exposing and Mitigating Security/Safety Concerns of CAVs: A Holistic and Realistic Security Testing Platform for Emerging CAVs
YingyingChen1820624Exploiting Physical Properties in Wireless Networks for Implicit Authentication
YingyingChen2114220, 2114161Securing IoT and Edge Devices under Audio Adversarial Attacks
YuChenCNS-2039342EAGER: SAVED: Secure Audio and Video Data from Deepfake Attacks Leveraging Environmental Fingerprints
LongCheng2114920, 2114982, 2114936EAGER: SaTC-EDU: Learning Platform and Education Curriculum for Artificial Intelligence-Driven Socially-Relevant Cybersecurity
AdamChlipala2130671Scaling Correct-by-Construction Code Generation for Cryptography
ChristopherCliftonCNS-2114123, 2114141Broad-Spectrum Facial Image Protection with Provable Privacy Guarantees
ChristianCollberg2040206The Tigress Endpoint Protection Tool - Transition to Practice
HenryCorrigan-GibbsCNS-2054869Practical Private Information Retrieval
MatthewCostello2014065RAPID: Exploring the New Wave of Cyber-Harassment Linked to COVID-19
DanaDachman-Soled1933033SaTC: CORE: Small: Meta Coding and Applications in Cryptography
AlbertoDainotti1705024Investigating the Susceptibility of the Internet Topology to Country-level Connectivity Disruption and Manipulation
MelissaDark2117073Assessment Resources for Cybersecurity (ARC) project
AnupamDas1849997CRII: SaTC: Analyzing Information Leak in Smart Homes
SauvikDas2029519Corporeal Cybersecurity
SauvikDas2126058Privacy Through Design
AzadehDavoodi1812600SaTC: STARSS: Small: Analysis of Security and Countermeasures for Split Manufacturing of Integrated Circuits
SaumyaDebray1908313Reasoning about Dependencies and Information Flow in Dynamic Code
Leigh AnnDeLyser2028426JROTC-CS Impact Study
SriniDevadas2115587Provably Secure, Usable, and Performant Enclaves in Multicore Processors
ThangDinh2140477, 2140411Collaborative Research: SaTC: EAGER: Trustworthy and Privacy-preserving Federated Learning
YEVGENIYDODIS2055578Making Crypto Too BIG To Break
YEVGENIYDODIS1815546On the Power of Preprocessing and Non-Uniformity
ShiriDori-Hacohen2147305FAI: BRIMI - Bias Reduction In Medical Information
ChristopherDoss2039612, 2039613, 2039614EAGER: SaTC AI-Cybersecurity: Safeguarding STEM Education and Scientific Knowledge in the age of Hyper realistic AI-Generated Data
RamakrishnanDurairajan2132651, 2132643, 2132639ONSET: Optics-enabled Network Defenses for Extreme Terabit DDoS Attacks
ManuelEgele1916393, 1916398Taming Memory Corruption with Security Monitors
KirstenEisentraeger2001470Classical and Quantum Algorithms For Number-Theoretic Problems Arising in Cryptography
SalimEl Rouayheb1801630Secure Distributed Coded Computations for IoT: An Information Theoretic and Network Approach
WilliamEnck2054911, 2055014Collaborative Research: SaTC: CORE: Medium: Enabling Practically Secure Cellular Infrastructure
WilliamEnck1946273SaTC: CORE: Small: Detecting Vulnerabilities and Remediations in Software Dependencies
MichalisFaloutsos2132642SOFIA: Finding and Profiling Malware Source-Code in Public Archives at Scale
LiyueFan1949217Image Publication with Differential Privacy
LiyueFanCNS-1951430Privacy-Preserving Mobile Data Collection for Social and Behavioral Research
FariborzFarahmand2041788Advancing Cybersecurity Education to Human-Level Artificial Intelligence
LisaFazio2122640SaTC: CORE: Small: How False Beliefs Form and How to Correct Them
EarlenceFernandes2144376Security and Privacy Foundations of Internet-Scale User-Centered Automation
RenatoFigueiredo1814557FIRMA: Personalized Cross-Layer Continuous Authentication
RenatoFigueiredo2028734Lumen: A Machine Learning Framework to Expose Influence Cues in Texts
FerdinandoFioretto2133169Collaborative Research: SaTC: CORE: Small: Privacy and Fairness in Critical Decision Making
AlvisFong2017289CyberTraining: Pilot: Modular Experiential Learning for Secure, Safe, and Reliable AI (MELSSRAI)
DomenicForte1717392iPROBE - An Internal Shielding Approach for Protecting against Frontside and Backside Probing Attacks
XingGao2054657CRII: SaTC: Securing Containers in Multi-Tenant Environment via Augmenting Linux Control Groups
LixinGao1918187Privacy-Preserving Policy Verification of Interdomain Routing
ChristinaGarman2047991Removing the Human Element: Securing Deployed Cryptographic Systems through the use of Cryptographic Automation
Jean-LucGaudiot2026675Securing Information Systems with Flexible Hardware Techniques
DanielGenkinCNS-1954712CORE: Medium: Collaborative: Hardening Off-the-Shelf Software Against Side Channel Attacks
SandraGonzalez-Bailon2017655Behavioral Effects of Exposure to Extremist Content in Social Media
GuofeiGu1816497Adversarial Learning via Modeling Interpretation
DannaGurari2126314Novel Algorithms and Tools for Empowering People Who Are Blind to Safeguard Private Visual Content
NikhilGuptaDGE-1931724SaTC-EDU: Collaborative: Cybersecurity Education for Additive Manufacturing
MaanakGupta2025682Collaborative Research: SaTC: EDU: Artificial Intelligence Assisted Malware Analysis
ShuangHao2146448CAREER: Empowering White-box Driven Analytics to Detect AI-synthesized Deceptive Content
IanHarris1813858Detecting Social Engineering Attacks Using Semantic Language Analysis
JohnHarris1801599REVELARE: A Hardware-Supported Dynamic Information Flow Tracking Framework for IoT Security and Forensics
WillieHarrison1910812CIF: Small: Best Wiretap Codes for Real-world Physical-layer Security
TingHe1946022SaTC: CORE: Small: Adversarial Network Reconnaissance in Software Defined Networking
NadiaHeninger1913167, 1913210Short Vectors in Lattices
NadiaHeninger2048563CAREER: Cryptographic Security at Internet Scale
MatthewHicks2046589CAREER: Designing and Defending Novel Ultra-stealthy andControllable Design-time Analog-domain Hardware Trojans
Viet TungHoang1755539Towards Stronger and Verified Security for Real-World Cryptography
Viet TungHoang2046540New Analytic Frontiers for Symmetric Cryptography
YuanHongCNS-2034870, 2034615Collaborative Research: SaTC: CORE: Small: Privately Collecting and Analyzing V2X Data for Urban Traffic Modeling
NicholasHopper1815757Models and Measurements for Website Fingerprinting
NicholasHopper1814753Consistent and Private Group Communication
Khaza AnuarulHoque2114035Modeling and Defense of Cyber Attacks for Improving Social Virtual Reality Resilience
TamzidulHoque2114157, 2114165, 2114200Hardware Security Education for All Through Seamless Extension of Existing Curricula
AmirHoumansadr1553301CAREER: Sustainable Censorship Resistance Systems for the Next Decade
JustinHsu2152831CORE: Medium: SPIPS: Security and Privacy in Programmable Switches
FeiHuDGE#1723250Captivology-Stimuli-based Learning (CAPITAL) of Big Data Security (BigSec): Towards a Science/Engineering, Career-Oriented Train
HongxinHu2129164CAREER: Towards Elastic Security with Safe and Efficient Network Security Function Virtualization
JeffHuang1901482New Defenses for Data-Only Attacks
CahrlesHughes2114808Improving Cybersecurity Education for Adolescents with Autism Through Automated Augmented Self-Monitoring Applications
StratisIoannidis1717213MaSSIF: Massively Scalable Secure Computation Infrastructure using FPGAs
TrentJaeger1801534DataGuard System - "The Taming of the Stack" - NDSS 2022
ShwetaJainCNS-2131182CISE: MSI: Cultivating and Developing Research Talent to Support Research in Cyber-Security
AhmadJavaid1903419, 1903423INteractive Animated VIsualization and PracTice basEd Cybersecurity Curriculum and Training (InviteCyber) Framework
SampathJayarathna2149607REU Site: Research Experiences for Undergraduates in Disinformation Detection and Analytics
LiminJia1704542Towards a Usable, Practical, and Provably Secure Browser Infrastructure
LiminJiaCNS-2114148, 2114074Toward Safe, Private, and Secure Home Automation: From Formal Modeling to User Evaluation
NaimaKaabouch2006674GPS Spoofing Attacks on UAS: Detection Techniques Based on Machine and Deep Learning
ChrisKanichCNS-1801663Enabling Long-Term Security and Privacy through Retrospective Data Management
ApuKapadia1814476Socio-Technical Strategies for Enhancing Privacy in Photo Sharing
ApuKapadia1814513, 1814866Tangible Privacy: User-Centric Sensor Designs for Assured Privacy
NathanKaplanDMS 1802281Counting Problems in Number Theory: Elliptic and Plane Quartic Curves over Finite Fields
RobertKaramDGE-1954259SaTC: EDU: Improving Student Learning through Competitive Embedded System Security Challenges
NimaKarimian2104520Physical Side Channel Attacks in Biometric System
OmerKhan1929261SaTC: CORE: Small: A Secure Processor that Exploits Multicore Parallelism while Protecting Against Microarchitecture State Attacks
MohammadKhan1750908CAREER: The Role of Emotion and Social Motives in Communicating Risk: Implications for User Behavior in the Cyber Security Context
LatifurKhan1931800Curriculum Development for Secure Blockchain Technologies
LatifurKhan2039542Secure and Privacy-Preserving Adaptive Artificial Intelligence Curriculum Development for Cyber Security
AnuragKhandelwal2054957Mixed Distribution Models for Encrypted Data Stores
FarshadKhorrami2039615NSF SATC: TTP: Small: Tracking Run-time Anomalies in Code Execution (TRACE)
AleksandraKorolova1943584CAREER: Towards Privacy and Fairness in Multi-Sided Platforms
DavidKotzCNS-1955805, 1955172, 1955228, 1955231SPLICE: Security and Privacy in the Lifecycle of IoT for Consumer Environments
BrentLagesse2113954, 2113955EAGER: SaTC: EDU: AI-enhanced Cybersecurity: Workforce Needs and Barriers to Learning
YingjieLao2047384CAREER: Protecting Deep Learning Systems against Hardware-Oriented Vulnerabilities
LoukasLazos1813401SaTC: CORE: Small: Secure Cloud Storage Verification Methods
KisungLee2032745RAPID: Investigating Public Health and Social Information Disparities During the COVID-19 Pandemic
JaewooLee1943046CAREER: Robust Adaptive Optimization Algorithms for Differentially Private Learning
KyuminLee1755536Tracking, Revealing and Detecting Crowdsourced Manipulation
AdamLee1704139, 1703853Scalable Dynamic Access Control for Untrusted Cloud Environments
AdaLernerCNS-1948344Understanding and Addressing the Security and Privacy Needs of At-Risk Populations
JunLi1564348, 1564250, 1564039Collaborative: Online Social Network Fraud and Attack Research and Identification
ZhouLi2039634Multi-Level Attack and Defense Simulation Environment for Artificial Intelligence Education and Research
FrankLi2055549SaTC: CORE: Small: Understanding, Analyzing, and Improving Password Authentication Practices across the Web
QinghuaLi1751255Towards Automated Security Vulnerability and Patch Management for Power Grid Operations
DanLin2027398, 2027114Self-Learning and Self-Evolving Detection of Altered, Deceptive Images and Videos
HuiLin2144513PARP: Mislead Physical-Disruption Attacks by Preemptive Anti-Reconnaissance for Power Grids' Cyber-Physical Infrastructures
HeatherLipford1814110, 1814068, 1814439Leveraging Community Oversight to Enhance Collective Efficacy for Privacy and Security
LingLiu2038029Privacy Enhancing Techniques and Innovations for AI-Cybersecurity Cross Training
YaoLiu2024300Creating Content Verification Tools to Protect Document Integrity
WenjingLou1916902, 1916926Toward Enforceable Data Usage Control in Cloud-based IoT Systems
LannanLuoCNS-1953073SaTC: CORE: Small: Semantics-Oriented Binary Code Analysis Learning from Recent Advances in Deep Learning
SiweiLyu2153112SaTC: CORE: Small:
Combating AI Synthesized Fake Media Beyond Detection
HemantaMaji2055605SaTC: CORE: Small: Optimal Coin-flipping Protocols
HafizMalik1815724, 1816019Forensic Examiner: Testbed for Benchmarking Digital Audio Forensic Algorithms
HafizMalik2035770Linking2Source: Security of In-Vehicle Networks via Source Identification
AthinaMarkopoulou1956393, 1955227, 2103439, 1956435ProperData: Protecting Personal Data Flow on the Internet
FlorenceMartin2015554Digital Safety Immersion for Elementary School Students
AmirrezaMasoumzadeh2047623CAREER: Black-Box Learning of Web Application Authorization Policies
AaronMassey1938121Enabling Regulatory Compliance for Software Engineering
MichelleMazurek1801545, 1801633Understanding Security in the Software Development Lifecycle: A Holistic, Mixed-Methods Approach
PatrickMcDaniel1805310The Center for Trustworthy Machine Learning
Muhammad Taqi RazaMehdiCNS-2051621Automatic Exploits Detection and Mitigation for Industrial Control System Protocols
HodaMehrpouyan1846493CAREER: Formal TOols foR SafEty aNd Security of Industrial Control Systems (FORENSICS)
PeihanMiao2055358SaTC: CORE: Small: Expanding the Realm of Oblivious Transfer: New Tools for Cryptography
StephenMillerCNS-2124692Lattices, number theory, and distribution questions in cryptography
AndrewMiller2112726, 2112751Hybridizing Trusted Execution Environments and Secure Multiparty Computation
JiangMing2128703SaTC: CORE: Small: A Transparent and Customizable Android Container-Based Virtualization Architecture for Dynamic Malware Analysis
JelenaMirkovic1815495SaTC: CORE: Small: Hardening Systems Against Low-Rate DDoS Attacks
PrabhatMishra1936040SaTC: CORE: Small: Trustworthy System-on-Chip Design using Secure On-Chip Communication Architecture
TylerMoore1652610CAREER: Developing Robust Longitudinal Indicators and Early Warnings of Cybercrime
ChrystallaMouza1821794Cybersecurity Education Using Interactive Storytelling with Social Robots
FrankMueller1813004T-Sys & T-Pack: Intrusion Detection for CPS
ManoharMurthi2123635, 2123618Multi-Disciplinary Analyses of the Nature and Spread of Unverified Information Online
AdwaitNadkarni1815336SaTC: CORE: Small: Enabling Systematic Evaluation of the Soundness of Android Security Analysis Techniques
HodaNaghibijouybari2130978SaTC: CORE: Small: Microarchitectural side channel attacks and defenses in integrated CPU-GPU systems
TempesttNeal2039373, 2039379Toward Age-Aware Continuous Authentication on Personal Computing Devices
IdaNgambeki1934269, 1934279, 1934285An Assessment Driven Approach to Self-Directed Learning in Secure Programming (SecTutor)
NickNikiforakis1941617CAREER: Tools and Techniques for Preserving Integrity on the Web
NickNikiforakis1813974SaTC: CORE: Small: Understanding, Measuring, and Defending against Malicious Web Crawlers
RuiNing2153358CRII: SaTC: Backdoor Detection, Mitigation, and Prevention in Deep Neural Networks
ChandraOrrill2114981Opening Doors for Cybersecurity & AI: An Interdisciplinary Approach to Engaging Middle School Students
LauraOsburn1932769Medium: Knowledge Work and Coordination to Improve O&M and IT Collaboration to Keep Our Buildings Smart AND Secure
BalajiPalanisamy2020071Blockchain-based Mechanisms for Timed Data Release and Timed Transactions
AnandPanangadan2125654SCC-IRG Track 2: Designing and Testing Remote Services to Support Formerly Homeless Persons in Permanent Housing
OmkantPandey2028920SaTC: CORE: Small: Nested Black-Box Constructions in Cryptography
CharalamposPapamanthou1652259Efficient and Secure Distributed Consensus
BryanParno1801369, 1801321Automated Support for Writing High-Assurance Smart Contracts
YilangPeng2150723Collaborative Research: SaTC: CORE: Small: Understanding How Visual Features of Misinformation Influence Credibility Perceptions
RobertoPerdisci2126641Defending Against Social Engineering Attacks with In-Browser AI
AlfredoPerez1950416An REU Site in Security and Privacy for Mobile Sensing and the IoT
HaiPhanCNS-1935928, 1935923When Adversarial Learning Meets Differential Privacy: Theoretical Foundation and Applications
JamesPierce1910218, 2142795Multidisciplinary Design Approaches to IoT Privacy and Security
MichalisPolychronakis2104148SaTC: CORE: Small: Selective Data Protection against Data-oriented and Transient Execution Attacks
AtulPrakash2039445Identifying Educational Conceptions and Challenges in Cybersecurity and Artificial Intelligence
ViktorPrasanna2104264Accelerating Privacy Preserving Deep Learning for Real-time Secure Applications
CaltonPu2039653Live Reality: Sustainable and Up-to-Date Information Quality in Live Social Media through Continuous Evidence-Based Knowledge
YanjunQiCNS-124538Generalizing Adversarial Examples in Natural Language: White-box Testing of NLP models with Mask Neuron Coverage
MizanurRahman2104999CRII: SaTC: Cyber Resilient Localization and Navigation for Autonomous Vehicles
AkondRahman2026869eSLIC: Enhanced Security Static Analysis of Configuration Scripts
AjitaRattani2129173Probing Fairness of Ocular Biometrics Methods Across Demographic Variations
IndrakshiRayCNS-1715458Detecting and Reconstructing Network Anomalies and Intrusions in Heavy Duty Vehicles
JuliaRayz2039605EAGER: SaTC-EDU: AI-based Humor-Integrated Social Engineering (SE) Training
BradleyReavesCNS-1849994CRII: SaTC: Techniques for Measuring and Characterizing Robocalls
AunshulRege2032292SaTC: EDU: Educating STEM Students and Teachers about the Relevance of Social Engineering in Cyberattacks and Cybersecurity
MatthewReimherrSES-1853209Formal Privacy for Complex Data Objects
LingRen2143058CAREER: Algorithms Foundations of Blockchains
YiRen2101052SaTC: Core: Small: Decentralized Attribution and Secure Training of Generative Models
FranziskaRoesner2041894Studying Problematic Content in the Web Advertising Ecosystem
FranziskaRoesner1651230CAREER: Towards Secure Augmented Reality Platforms
JennieRogers2016240, 2016393Quicksilver: A Write-Oriented Private, Outsourced Database Management System
JerzyRozenblitCNS-1615890SAFES: A Software-based Architecture for Ensuring Security and Resilience in Medical Device Design
AlexanderRussell1801487Theory and Practice of Cryptosystems Secure Against Subversion
GoelSanjay1912874Thwarting the Malicious Insider Evolution Process: The Theory of Strained Betrayal
ArminSarabi20122001A Deep Learning Framework for Intelligent Active and Passive Measurements in the Age of Internet of Things
IoannisSavidisCNS-1751032Parameter Obfuscation: A Novel Methodology for the Protection of Analog Intellectual Property
JareckiSaxena2030575Intrusion-Tolerant Outsourced Storage for Cyber-Infrastructure (TTP: Medium)
AlessandraScafuro1717067, 1764025A Broad Treatment of Privacy in Blockchains
PatrickSchaumont1931639SaTC: CORE: Small: Finding and Mitigating Side-channel Leakage in Embedded Architectures
DavidSchuster1553018CAREER: Understanding the Cognitive Processes of Computer Network Defense
AlexanderSchwarzmann2131538A Robust Framework with Rigorous Semantics and Security Guarantees for Election-Day Voter Check-in
KentSeamons1816929Usable Key Management and Forward Secrecy for Secure Email
VyasSekar1564009Handling a Trillion Unfixable Flaws on Billions of Internet-of-Things
RSekar1918667RADAR: Real-time Advanced Detection and Attack Reconstruction
HossainShahriar2100115Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware
MicahSherrCNS-1925497Expanding Research Frontiers with a Next-Generation Anonymous Communication Experimentation (ACE) Framework
WeisongShiCNS-1928331, 1928349SaTC: CORE: Small: Collaborative: Hardware-assisted Plausibly Deniable System for Mobile Devices
KatieShilton2131508Community-Centered Design of Automated Content Moderation
VitalyShmatikov1916717Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures
TaoShu2006998Enabling Privacy-Preserving Routing-on-Context in IoT
CraigShue1814402Fine-Grained Protection for Scalable Single-use Services
AkbarSiami Namin1564293SBE: Medium: User-Centric Design of a Sonification System for Automatically Alarming Security Threats and Impact
AkbarSiami Namin1821560SaTC: EDU: Improving Student Learning and Engagement in Digital Forensics through Collaborative Investigation of Cyber Security Incidents and Simulated Capture-The-Flag Exercises
YasinSilva2036127BullyBlocker - Interdisciplinary Models to Identify and Understand Cyberbullying
AliceSilverberg1703321, 1701567, 1701785An Algebraic Approach to Secure Multilinear Maps for Cryptography
RaduSion2052951SATC: CORE: Small: Efficient Plausible Deniability Systems
RebeccaSlayton1553069Enacting Cybersecurity Expertise
LinhaiSongCNS-1955965Understanding and Detecting Memory Bugs in Rust
WenZhanSong2019311Cyber-threat Detection and Diagnosis in Multistage Manufacturing Systems through Cyber and Physical Data Analytics
HoubingSong1956193SaTC: EDU: Collaborative: Bolstering UAV Cybersecurity Education through Curriculum Development with Hands-on Laboratory Framework
DrewSpringall2115025EAGER: Transformative Educational Approaches to Meld Artificial Intelligence and Cybersecurity Mindsets
AnnaSquicciariniCNS-2029976, 2029881Collaborative research: SaTC: Core: Small: Privacy protection of Vehicles Location in Spatial Crowdsourcing Under Realistic Adversarial Models
MeeraSridhar1947295Enhancing Security Education in Hybrid Mobile and Internet of Things Firmware Through Inclusive, Engaging, Learning Modules (E-SHIIELD)
SudarshanSrinivasan2117190SaTC: CORE: Small: Formal Verification Techniques For Microprocessor Security Vulnerabilities and Trojans
KatherineStangeCNS-1652238CAREER: Research and Education: Number Theory, Geometry and Cryptography
KateStarbird2120496Rapid-Response Frameworks for Mitigating Online Disinformation
KevinSteinmetz1916284SaTC: Core: Small: Collaborative: Understanding Law-Enforcement Cyber Investigations
AlleyStoughton1801564Towards Mechanized Proofs of Composable Security Properties
GianlucaStringhini2114407Detecting Accounts Involved in Influence Campaigns on Social Media
MeganStubbs-Richardson2031246RAPID: Analyses of Emotions Expressed in Social Media and Forums During the COVID-19 Pandemic
CynthiaSturton1816637SaTC STARSS: Tackling the Corner Cases: Finding Security Vulnerabilities in CPU Designs
XiaoyanSun2105801Developing Ready-to-Use Hands-on Labs with Portable Operating Environments for Digital Forensics Education
ShreyasSundaramCNS-1718637The Impacts of Human Decision-Making on Security and Robustness of Interdependent Systems
DanielTakabi2006329SaTC: CORE: Small: An Attribute-based Insider Threat Mitigation Framework
DanielTakabi2054968SaTC: EDU: Secure and Private Artificial Intelligence
RaviTandon1715947SaTC: CORE: Small: Robust Physical Layer Security with Channel Knowledge Uncertainty
YuzheTang1922507SaTC: CORE: Small: External Obliviousness in Trusted Execution Environments
YuzheTang2104532Collaborative Research: SaTC: EDU: Developing Instructional Laboratories for Blockchain Security Applications
UnalTatar1948261CRII: SaTC: Graph-based Probabilistic Cyber Risk Modeling
HimanshuThapliyal1845448CAREER: Utilizing Principles of Energy Recovery Computing for Low-Energy and DPA-Resistant IoT Devices
YuanTian1943100CAREER: Secure Voice-Controlled Platforms
AndrewTolmach2048499Specifying and Verifying Secure Compilation of C Code to Tagged Hardware
StavrosTripakis1801546, 1801342, 1801399SaTC: CORE: Medium: Collaborative: Bridging the Gap Between Protocol Design and Implementation through Automated Mapping
TimothyTsai1948531A Cross-Verification Approach for Identifying Tampered Audio
Michael CarlTschantz2055772, 2055773Narrowing The Gap Between Privacy Expectations and Reality in Mobile Health
Guan-HuaTu1815636Side-channel Attacks Against Mobile Users: Singularity Detection, Behavior Identification, and Automated Rectification
CarleneTurner1956428Excellence in Research - The Impact of Cybersecurity Policies on Employees' Efficiency and Performance Predictability
JonathanUllman2120603, 2120611, 2120667, 2120544Foundations for the Next Generation of Private Learning Systems
BlaseUr2047827CAREER: Usable, Data-Driven Transparency and Access for Consumer Privacy
KrishnaVenkatasubramanian1947022SaTC: CORE: Small: Authentication Solutions for Individuals with Upper Extremity Impairment
ChristelleVincentDMS-1802323Applications to Cryptography of the Construction of Curves from Modular Invariants
JessicaVitak1951688SaTC EDU: Collaborative: Connecting Contexts: Building Foundational Digital Privacy and Security Skills for Elementary School Ch
TingWang1953893Trustworthy Machine Learning from Untrusted Models
BoyangWang1947913CRII: SaTC: Fingerprinting Encrypted Voice Traffic on Smart Speakers
GangWang2055233SaTC: CORE: Small: Towards Label Enrichment and Refinement to Harden Learning-based Security Defenses
GangWang2030521CAREER: Machine Learning Assisted Crowdsourcing for Phishing Defense
YangWang2114991Teach High School Students about Cybersecurity and AI Ethics via Empathy-Driven Hands
YangWang1652497Inclusive Privacy and Security for People with Visual Impairments (PVI)
XiaoFengWang1801432, 1850725, 1801652SaTC: CORE: Medium: Collaborative: Understanding and Discovering Emerging Cybercrimes through Automatic Analysis of Online Text
ShuoWang1812071SaTC: TTP: Medium: Collaborative: RESULTS: Reverse Engineering Solutions on Ubiquitous Logic for Trustworthiness and Security
TaoWei2027069SaTC: CORE: Medium: Introducing DIVOT: A Novel Architecture for Runtime Anti-Probing/Tampering on I/O Buses
ShengWei1912593Security of Heterogeneous CPU-FPGA Systems
JinWei-Kocsis2114974EAGER: SaTC-EDU: Cybersecurity Education in the Age of Artificial Intelligence: A Novel Proactive and Collaborative Learning Paradigm
ElianeWiese2041960EAGER: SaTC-EDU: Teaching Security in Undergraduate AI with Transparency and Contextualization
EricWilliams2037535SaTC: CORE: Small: Managing Privacy and Environment for Used and End-of-Life Electronic Devices
JakeWilliams1850014Moderating Effects of Automation on Information Transmission in Social Forums
LaurieWilliams2055554SaTC: CORE: Small: Risk-based Secure Checked-in Credential Reduction for Software Development
LaurieWilliams1909516SHF: Small: Detecting the 1%: Growing the Science of Vulnerability Detection
ShomirWilson2105736A Large-Scale, Longitudinal Resource to Advance Technical and Legal Understanding of Textual Privacy Information
DamonWoodard2131480SaTC: I-C-U: AI-Enabled Recovery and Assurance of Semiconductor IP from SEM Images
DavidWu2151131SaTC: CORE: Small: Expanding the Frontiers of Lattice-Based Cryptography
XushengXiao2028748Scalable Cyber Attack Investigation using Declarative Queries and Interrogative Analysis
JiafengXie2020625SaTC: CORE: Small: Fast Algorithm Originated Fault Detection Scheme for Ring-LWE based Cryptographic Hardware
LiXiong2124104PREMED: Privacy-Preserving and Robust Computational Phenotyping using Multisite EHR Data
WeifengXu2039289Exploring Visualized and Explainable AI to Improve Students' Learning Experience in Digital Forensics Education
DianxiangXu1954327TWC: Small: Benchmarking Testing Methods for Access Control Policies
ShouhuaiXu2122631A Framework for Enhancing the Resilience of Cyber Attack Classification Mechanisms
JunXu2213727Collaborative Research: SaTC: CORE: Medium: Rethinking Fuzzing for Security
DongpengXu1948489Simplification of Mixed Boolean-Arithmetic Obfuscated Expression
QibenYan1950171Interactive Attack on Smartphone Voice Systems
MengjiaYan2046359A Quantitative Framework for Analyzing and Mitigating Microarchitectural Side Channels
BaijianYang1820573, 1820608CHEESE: Cyber Human Ecosystem of Engaged Security Education
DanfengYao1929701SaTC: TTP: Medium: Collaborative: Deployment-quality and Accessible Solutions for Cryptography Code Development
FanYao2019536, 2019548SaTC: Small: Understanding and Taming Deterministic Model Bit Flip Attacks in Deep Neural Networks
Attila AYavuz1917627CAREER: Lightweight and Fast Authentication for Internet of Things
TubaYavuzCNS-1942235CAREER: Towards a Secure and Reliable Internet of Things through Automated Model Extraction and Analysis
ArkadyYerukhimovich1955620, 1955264, 1955319New Approaches for Large Scale Secure Computation
HengYin1719175Towards Robust and Scalable Search of Binary Code and Data
Man-KiYoon1945541SaTC: CORE: Small: Partition-Oblivious Real-Time Hierarchical Scheduling
JeffreyYost2022484EAGER: Mining a Useable Past: Perspectives, Paradoxes, & Possibilities in Security and Privacy
ChansuYu2028397SaTC: EDU: Transdisciplinary Cybersecurity Education for Law and Engineering Students
PhilipYu1930941Learning Dynamic and Robust Defenses Against Co-Adaptive Spammers
QiaoyanYu1652474CAREER: Proactive Defense Methods for Chip Integrity and Security
QiaoyanYu2022279SaTC:CORE:Small: Towards Securing the Hardware and Software for Approximate Computing Systems
ShuchengYu1817438Toward Usable and Ubiquitous Trust Initialization and Secure Networking in Wireless Ad Hoc Networks
ShuhanYuan2103829SaTC: CORE: Small: Deep Learning for Insider Threat Detection
QiangZengCNS-1856380SaTC: CORE: Small: Collaborative: Enabling Precise and Automated Insecurity Analysis of Middleware on Mobile Platforms
ZhenkaiZhangCNS-2147217SaTC: CORE: Small: Leveraging Physical Side-Channel Information to Build Detection-Based Rowhammer Defenses
DanfengZhang1956032Automatic Software Patching against Microarchitectual Attacks
ZimingZhao2037798Securing Internet of Things Against Cache-based Attacks
YanbinZhao1949650SaTC: CORE: Medium: Hidden Rules in Neural Networks as Attacks and Adversarial Defenses
ZizhanZhengCNS-1816495SaTC: CORE: Small: Towards Robust Moving Target Defense: A Game Theoretic and Learning Approach
QianZhiyun1953932, 1953933SaTC: CORE: Small: Collaborative: Deep and Efficient Dynamic Analysis of Operating System Kernels
HaiZhou2113704Efficient Logic Encryptions for Hardware IP Protection
LinaZhou1917537Implicit One-handed Mobile User Authentication by Induced Thumb Biometrics on Touch-screen Handheld Devices
SebastianZimmeck2055196Improving Internet Privacy with Global Privacy Control (GPC)
RaeZimmerman2122060Understanding Human Misperception of Cyber Risks and Integrative Design of Human-Centered Intervention Mechanisms: Component
CliffZou1915780SaTC: EDU: Collaborative: Building a Low-cost and State-of-the-art IoT Security Hands-on Laboratory
XukaiZouDGE-2011117, 2011175Building an Electronic Voting Technology Inspired Interactive Teaching and Learning Framework for Cybersecurity Education