| Amos | Abbott | 2136915 | EAGER: Biometric Authentication using Noncontact Cardiovascular Signals |
| Nael | Abu-Ghazaleh | CNS-1619322, 1617915 | Collaborative Research: SaTC: CORE: Medium: Leakage-free Isolated Execution: Architectures and Security Models |
| Yuvraj | Agarwal | 1801472 | SaTC: Core: End-to-End Support for Privacy in the Internet-of-Things |
| Khair | Al Shamaileh | 2006662 | Jamming Detection and Classification in OFDM-based UAVs via Feature- and Spectrogram-tailored Machine Learning |
| Laura | Albert | 2000986 | SaTC: CORE: Medium: An Optimization Framework for Identifying Dynamic Risk Management Practices |
| Ahmad | Alsharif | 2153464 | CRII: SaTC: RUI: Towards Trustworthy and Accountable IoT Data Marketplaces |
| Mary Jean | Amon | 2053152 | Bottom-up Psychosocial Interventions for Interpersonal Privacy Preservation in Social Media |
| Nazanin | Andalibi | 2020872 | Towards Accounting for the Human in Emotion Recognition Technologies |
| Sebastian | Angel | 2045861 | CAREER: Tools For Building Online Services That Hide Metadata |
| Mohd | Anwar | 2007662 | Tracking User Behavior, Cognitive Burdens, and the Impact of Behavioral Nudging on Security Updates by Young and Older Adults |
| Navid | Asadi | 1821780 | PHIKS - PHysical Inspection and attacKs on electronicS |
| Adam | Aviv | 1845300 | CAREER: Enhancing Mobile Authentication by Measuring the Authentication Life-Cycle |
| Adam | Aviv | 2138654, 2138078 | Collaborative Research: SaTC: EDU: Security and Privacy Implications of Remote Proctoring for School Policies and Practices |
| Erman | Ayday | 2050410 | SaTC: CORE: Small: Robust, Privacy- and Utility-Preserving Fingerprinting Schemes for Correlated Data |
| Anys | Bacha | CNS-1947580 | An Integrated Treatment of Ransomware Through Microarchitecture and Software Solutions |
| Ibrahim | Baggili | 1900210 | Expanding Digital Forensics Education with Artifact Curation and Scalable, Accessible Artifact Exercises |
| Hamid | Bahrami | 1956110 | SaTC: CORE: Small: A Practical Approach to Study Security in Wireless Networks |
| Shi | Bai | 2122229 | Cryptographic Hardness of Module Lattices |
| Shi | Bai | 2044855 | CAREER: Concrete Hardness in Lattice-based Cryptography |
| Kiran | Balagani | 1814846 | Leveraging Movement, Posture, and Anthropometric Contexts to Strengthen the Security of Mobile Biometric |
| Alexandru | Bardas | 1850406 | CRII: SaTC: Creating and Managing Structurally-Morphing IT Systems - Moving Targets |
| Alexandru | Bardas | 1915824, 1915822 | DCL: SaTC: Early-Stage Interdisciplinary Collaboration: A Sociotechnical Metrics Framework for Network and Security Operation Centers |
| Lujo | Bauer | 1801391, 2113345 | SaTC: CORE: Medium: Collaborative: Using Machine Learning to Build More Resilient and Transparent Computer Systems |
| France | Belanger | SES‐2039172 | Information Privacy Tensions and Decisions in Families during COVID‐19 |
| Terry | Benzel | 1925773, 1925616, 1925564, 1925588 | Sharing Expertise and Artifacts for Reuse through Cybersecurity Community Hub (SEARCCH) |
| Julia | Bernd | 2114229, 2114230 | Foregrounding Bystanders as Stakeholders in Smart Home Product Design |
| Raheem | Beyah | 1929580 | ADIDS: An Air-gapped Distributed Intrusion Detection System for the Power Grid |
| Nicola | Bezzo | 11816591 | Online Malicious Intent Inference for Safe CPS Operations under Cyber-attacks |
| Shameek | Bhattacharjee | 2030611 | SaTC CORE: Small: TAURUS: Towards a Unified Robust and Secure Data Driven Approach for Attack Detection in Smart Living |
| Vincent | Bindschaedler | 2055123 | SaTC: CORE: Medium: Countering Surveillanceware Using Deception-Based Generative Models and Systems Mechanisms |
| Gedare | Bloom | 2046705 | CAREER: Foundations for Real-Time System Security |
| Alexandra | Boldyreva | 1946919 | Provable Security Analysis of FIDO2 Protocol for Passwordless Authentication on the Web |
| Borzoo | Bonakdarpour | 2100989 | SaTC:CORE:Small:Techniques for Software Model Checking of Hyperproperties |
| Shaunak D. | Bopardikar | 2134076 | SaTC: CORE: SMALL: Data-driven Attack and Defense Modeling for Cyber-physical Systems (CPS) |
| Travis | Breaux | 2007298 | Privacy Impact and Risk Assessment at Design-Time |
| Zhipeng | Cai | 1912753 | SaTC: EDU: Collaborative: Advancing Cybersecurity Learning Through Inquiry-based Laboratories on a Container-based Virtualization Platform |
| Kelly | Caine | 1940679 | Cryptographic Provenance for Digital Publishing |
| L. Jean | Camp | 1565375 | TWC: Large: Collaborative: Living in the Internet of Things |
| Yinzhi | Cao | 1854000 | TWC: Medium: Collaborative: Efficient Repair of Learning Systems via Machine Unlearning |
| Justin | Cappos | 1801376 | NSF SaTC: TTP: Medium: Collaborative: Securing the Software Supply Chain |
| Bogdan | Carbunar | 2013671 | SaTC: CORE: Small: Deconstructing and Neutralizing Search Rank Fraud |
| Bogdan | Carbunar | 2114911 | Collaborative Research: EAGER: SaTC-EDU: Just-in-Time AI Driven Cyber Abuse Education in Social Networks |
| Krishnendu | Chakrabarty | 2049335 | Secure and Trustworthy Cyberphysical Microfluidic Systems |
| Krishnendu | Chakrabarty | 2011561 | Security of FPGA-as-a-Service Reconfigurable Systems |
| David | Chan-Tin | 1919004, 1918591 | SaTC: EDU: Collaborative: Personalized Cybersecurity Education and Training |
| Bo | Chen | 1938130 | EAGER: Enabling Secure Data Recovery for Mobile Devices against Malicious Attacks |
| Hao | Chen | 1801751 | SaTC: CORE: Medium: Collaborative: Towards Robust Machine Learning Systems |
| Hsinchun | Chen | 1936370 | SaTC: CORE: Small: Cybersecurity Big Data Research for Hacker Communities: A Topic and Language Modeling Approach |
| Hsinchun | Chen | CNS-2041770 | CRII: SaTC: Identifying Emerging Threats in the Online Hacker Community for Proactive Cyber Threat Intelligence |
| Hsinchun | Chen | 2038483 | EAGER: SaTC-EDU: AI-Cybersecurity Research and Education (AI4Cyber) at Scale |
| Qi | Chen | 1930041, 1929771 | Exposing and Mitigating Security/Safety Concerns of CAVs: A Holistic and Realistic Security Testing Platform for Emerging CAVs |
| Yingying | Chen | 1820624 | Exploiting Physical Properties in Wireless Networks for Implicit Authentication |
| Yingying | Chen | 2114220, 2114161 | Securing IoT and Edge Devices under Audio Adversarial Attacks |
| Yu | Chen | CNS-2039342 | EAGER: SAVED: Secure Audio and Video Data from Deepfake Attacks Leveraging Environmental Fingerprints |
| Long | Cheng | 2114920, 2114982, 2114936 | EAGER: SaTC-EDU: Learning Platform and Education Curriculum for Artificial Intelligence-Driven Socially-Relevant Cybersecurity |
| Adam | Chlipala | 2130671 | Scaling Correct-by-Construction Code Generation for Cryptography |
| Christopher | Clifton | CNS-2114123, 2114141 | Broad-Spectrum Facial Image Protection with Provable Privacy Guarantees |
| Christian | Collberg | 2040206 | The Tigress Endpoint Protection Tool - Transition to Practice |
| Henry | Corrigan-Gibbs | CNS-2054869 | Practical Private Information Retrieval |
| Matthew | Costello | 2014065 | RAPID: Exploring the New Wave of Cyber-Harassment Linked to COVID-19 |
| Dana | Dachman-Soled | 1933033 | SaTC: CORE: Small: Meta Coding and Applications in Cryptography |
| Alberto | Dainotti | 1705024 | Investigating the Susceptibility of the Internet Topology to Country-level Connectivity Disruption and Manipulation |
| Melissa | Dark | 2117073 | Assessment Resources for Cybersecurity (ARC) project |
| Anupam | Das | 1849997 | CRII: SaTC: Analyzing Information Leak in Smart Homes |
| Sauvik | Das | 2029519 | Corporeal Cybersecurity |
| Sauvik | Das | 2126058 | Privacy Through Design |
| Azadeh | Davoodi | 1812600 | SaTC: STARSS: Small: Analysis of Security and Countermeasures for Split Manufacturing of Integrated Circuits |
| Saumya | Debray | 1908313 | Reasoning about Dependencies and Information Flow in Dynamic Code |
| Leigh Ann | DeLyser | 2028426 | JROTC-CS Impact Study |
| Srini | Devadas | 2115587 | Provably Secure, Usable, and Performant Enclaves in Multicore Processors |
| Thang | Dinh | 2140477, 2140411 | Collaborative Research: SaTC: EAGER: Trustworthy and Privacy-preserving Federated Learning |
| YEVGENIY | DODIS | 2055578 | Making Crypto Too BIG To Break |
| YEVGENIY | DODIS | 1815546 | On the Power of Preprocessing and Non-Uniformity |
| Shiri | Dori-Hacohen | 2147305 | FAI: BRIMI - Bias Reduction In Medical Information |
| Christopher | Doss | 2039612, 2039613, 2039614 | EAGER: SaTC AI-Cybersecurity: Safeguarding STEM Education and Scientific Knowledge in the age of Hyper realistic AI-Generated Data |
| Ramakrishnan | Durairajan | 2132651, 2132643, 2132639 | ONSET: Optics-enabled Network Defenses for Extreme Terabit DDoS Attacks |
| Manuel | Egele | 1916393, 1916398 | Taming Memory Corruption with Security Monitors |
| Kirsten | Eisentraeger | 2001470 | Classical and Quantum Algorithms For Number-Theoretic Problems Arising in Cryptography |
| Salim | El Rouayheb | 1801630 | Secure Distributed Coded Computations for IoT: An Information Theoretic and Network Approach |
| William | Enck | 2054911, 2055014 | Collaborative Research: SaTC: CORE: Medium: Enabling Practically Secure Cellular Infrastructure |
| William | Enck | 1946273 | SaTC: CORE: Small: Detecting Vulnerabilities and Remediations in Software Dependencies |
| Michalis | Faloutsos | 2132642 | SOFIA: Finding and Profiling Malware Source-Code in Public Archives at Scale |
| Liyue | Fan | 1949217 | Image Publication with Differential Privacy |
| Liyue | Fan | CNS-1951430 | Privacy-Preserving Mobile Data Collection for Social and Behavioral Research |
| Fariborz | Farahmand | 2041788 | Advancing Cybersecurity Education to Human-Level Artificial Intelligence |
| Lisa | Fazio | 2122640 | SaTC: CORE: Small: How False Beliefs Form and How to Correct Them |
| Earlence | Fernandes | 2144376 | Security and Privacy Foundations of Internet-Scale User-Centered Automation |
| Renato | Figueiredo | 1814557 | FIRMA: Personalized Cross-Layer Continuous Authentication |
| Renato | Figueiredo | 2028734 | Lumen: A Machine Learning Framework to Expose Influence Cues in Texts |
| Ferdinando | Fioretto | 2133169 | Collaborative Research: SaTC: CORE: Small: Privacy and Fairness in Critical Decision Making |
| Alvis | Fong | 2017289 | CyberTraining: Pilot: Modular Experiential Learning for Secure, Safe, and Reliable AI (MELSSRAI) |
| Domenic | Forte | 1717392 | iPROBE - An Internal Shielding Approach for Protecting against Frontside and Backside Probing Attacks |
| Xing | Gao | 2054657 | CRII: SaTC: Securing Containers in Multi-Tenant Environment via Augmenting Linux Control Groups |
| Lixin | Gao | 1918187 | Privacy-Preserving Policy Verification of Interdomain Routing |
| Christina | Garman | 2047991 | Removing the Human Element: Securing Deployed Cryptographic Systems through the use of Cryptographic Automation |
| Jean-Luc | Gaudiot | 2026675 | Securing Information Systems with Flexible Hardware Techniques |
| Daniel | Genkin | CNS-1954712 | CORE: Medium: Collaborative: Hardening Off-the-Shelf Software Against Side Channel Attacks |
| Sandra | Gonzalez-Bailon | 2017655 | Behavioral Effects of Exposure to Extremist Content in Social Media |
| Guofei | Gu | 1816497 | Adversarial Learning via Modeling Interpretation |
| Danna | Gurari | 2126314 | Novel Algorithms and Tools for Empowering People Who Are Blind to Safeguard Private Visual Content |
| Nikhil | Gupta | DGE-1931724 | SaTC-EDU: Collaborative: Cybersecurity Education for Additive Manufacturing |
| Maanak | Gupta | 2025682 | Collaborative Research: SaTC: EDU: Artificial Intelligence Assisted Malware Analysis |
| Shuang | Hao | 2146448 | CAREER: Empowering White-box Driven Analytics to Detect AI-synthesized Deceptive Content |
| Ian | Harris | 1813858 | Detecting Social Engineering Attacks Using Semantic Language Analysis |
| John | Harris | 1801599 | REVELARE: A Hardware-Supported Dynamic Information Flow Tracking Framework for IoT Security and Forensics |
| Willie | Harrison | 1910812 | CIF: Small: Best Wiretap Codes for Real-world Physical-layer Security |
| Ting | He | 1946022 | SaTC: CORE: Small: Adversarial Network Reconnaissance in Software Defined Networking |
| Nadia | Heninger | 1913167, 1913210 | Short Vectors in Lattices |
| Nadia | Heninger | 2048563 | CAREER: Cryptographic Security at Internet Scale |
| Matthew | Hicks | 2046589 | CAREER: Designing and Defending Novel Ultra-stealthy andControllable Design-time Analog-domain Hardware Trojans |
| Viet Tung | Hoang | 1755539 | Towards Stronger and Verified Security for Real-World Cryptography |
| Viet Tung | Hoang | 2046540 | New Analytic Frontiers for Symmetric Cryptography |
| Yuan | Hong | CNS-2034870, 2034615 | Collaborative Research: SaTC: CORE: Small: Privately Collecting and Analyzing V2X Data for Urban Traffic Modeling |
| Nicholas | Hopper | 1815757 | Models and Measurements for Website Fingerprinting |
| Nicholas | Hopper | 1814753 | Consistent and Private Group Communication |
| Khaza Anuarul | Hoque | 2114035 | Modeling and Defense of Cyber Attacks for Improving Social Virtual Reality Resilience |
| Tamzidul | Hoque | 2114157, 2114165, 2114200 | Hardware Security Education for All Through Seamless Extension of Existing Curricula |
| Amir | Houmansadr | 1553301 | CAREER: Sustainable Censorship Resistance Systems for the Next Decade |
| Justin | Hsu | 2152831 | CORE: Medium: SPIPS: Security and Privacy in Programmable Switches |
| Fei | Hu | DGE#1723250 | Captivology-Stimuli-based Learning (CAPITAL) of Big Data Security (BigSec): Towards a Science/Engineering, Career-Oriented Train |
| Hongxin | Hu | 2129164 | CAREER: Towards Elastic Security with Safe and Efficient Network Security Function Virtualization |
| Jeff | Huang | 1901482 | New Defenses for Data-Only Attacks |
| Cahrles | Hughes | 2114808 | Improving Cybersecurity Education for Adolescents with Autism Through Automated Augmented Self-Monitoring Applications |
| Stratis | Ioannidis | 1717213 | MaSSIF: Massively Scalable Secure Computation Infrastructure using FPGAs |
| Trent | Jaeger | 1801534 | DataGuard System - "The Taming of the Stack" - NDSS 2022 |
| Shweta | Jain | CNS-2131182 | CISE: MSI: Cultivating and Developing Research Talent to Support Research in Cyber-Security |
| Ahmad | Javaid | 1903419, 1903423 | INteractive Animated VIsualization and PracTice basEd Cybersecurity Curriculum and Training (InviteCyber) Framework |
| Sampath | Jayarathna | 2149607 | REU Site: Research Experiences for Undergraduates in Disinformation Detection and Analytics |
| Limin | Jia | 1704542 | Towards a Usable, Practical, and Provably Secure Browser Infrastructure |
| Limin | Jia | CNS-2114148, 2114074 | Toward Safe, Private, and Secure Home Automation: From Formal Modeling to User Evaluation |
| Naima | Kaabouch | 2006674 | GPS Spoofing Attacks on UAS: Detection Techniques Based on Machine and Deep Learning |
| Chris | Kanich | CNS-1801663 | Enabling Long-Term Security and Privacy through Retrospective Data Management |
| Apu | Kapadia | 1814476 | Socio-Technical Strategies for Enhancing Privacy in Photo Sharing |
| Apu | Kapadia | 1814513, 1814866 | Tangible Privacy: User-Centric Sensor Designs for Assured Privacy |
| Nathan | Kaplan | DMS 1802281 | Counting Problems in Number Theory: Elliptic and Plane Quartic Curves over Finite Fields |
| Robert | Karam | DGE-1954259 | SaTC: EDU: Improving Student Learning through Competitive Embedded System Security Challenges |
| Nima | Karimian | 2104520 | Physical Side Channel Attacks in Biometric System |
| Omer | Khan | 1929261 | SaTC: CORE: Small: A Secure Processor that Exploits Multicore Parallelism while Protecting Against Microarchitecture State Attacks |
| Mohammad | Khan | 1750908 | CAREER: The Role of Emotion and Social Motives in Communicating Risk: Implications for User Behavior in the Cyber Security Context |
| Latifur | Khan | 1931800 | Curriculum Development for Secure Blockchain Technologies |
| Latifur | Khan | 2039542 | Secure and Privacy-Preserving Adaptive Artificial Intelligence Curriculum Development for Cyber Security |
| Anurag | Khandelwal | 2054957 | Mixed Distribution Models for Encrypted Data Stores |
| Farshad | Khorrami | 2039615 | NSF SATC: TTP: Small: Tracking Run-time Anomalies in Code Execution (TRACE) |
| Aleksandra | Korolova | 1943584 | CAREER: Towards Privacy and Fairness in Multi-Sided Platforms |
| David | Kotz | CNS-1955805, 1955172, 1955228, 1955231 | SPLICE: Security and Privacy in the Lifecycle of IoT for Consumer Environments |
| Brent | Lagesse | 2113954, 2113955 | EAGER: SaTC: EDU: AI-enhanced Cybersecurity: Workforce Needs and Barriers to Learning |
| Yingjie | Lao | 2047384 | CAREER: Protecting Deep Learning Systems against Hardware-Oriented Vulnerabilities |
| Loukas | Lazos | 1813401 | SaTC: CORE: Small: Secure Cloud Storage Verification Methods |
| Kisung | Lee | 2032745 | RAPID: Investigating Public Health and Social Information Disparities During the COVID-19 Pandemic |
| Jaewoo | Lee | 1943046 | CAREER: Robust Adaptive Optimization Algorithms for Differentially Private Learning |
| Kyumin | Lee | 1755536 | Tracking, Revealing and Detecting Crowdsourced Manipulation |
| Adam | Lee | 1704139, 1703853 | Scalable Dynamic Access Control for Untrusted Cloud Environments |
| Ada | Lerner | CNS-1948344 | Understanding and Addressing the Security and Privacy Needs of At-Risk Populations |
| Jun | Li | 1564348, 1564250, 1564039 | Collaborative: Online Social Network Fraud and Attack Research and Identification |
| Zhou | Li | 2039634 | Multi-Level Attack and Defense Simulation Environment for Artificial Intelligence Education and Research |
| Frank | Li | 2055549 | SaTC: CORE: Small: Understanding, Analyzing, and Improving Password Authentication Practices across the Web |
| Qinghua | Li | 1751255 | Towards Automated Security Vulnerability and Patch Management for Power Grid Operations |
| Dan | Lin | 2027398, 2027114 | Self-Learning and Self-Evolving Detection of Altered, Deceptive Images and Videos |
| Hui | Lin | 2144513 | PARP: Mislead Physical-Disruption Attacks by Preemptive Anti-Reconnaissance for Power Grids' Cyber-Physical Infrastructures |
| Heather | Lipford | 1814110, 1814068, 1814439 | Leveraging Community Oversight to Enhance Collective Efficacy for Privacy and Security |
| Ling | Liu | 2038029 | Privacy Enhancing Techniques and Innovations for AI-Cybersecurity Cross Training |
| Yao | Liu | 2024300 | Creating Content Verification Tools to Protect Document Integrity |
| Wenjing | Lou | 1916902, 1916926 | Toward Enforceable Data Usage Control in Cloud-based IoT Systems |
| Lannan | Luo | CNS-1953073 | SaTC: CORE: Small: Semantics-Oriented Binary Code Analysis Learning from Recent Advances in Deep Learning |
| Siwei | Lyu | 2153112 | SaTC: CORE: Small:
Combating AI Synthesized Fake Media Beyond Detection |
| Hemanta | Maji | 2055605 | SaTC: CORE: Small: Optimal Coin-flipping Protocols |
| Hafiz | Malik | 1815724, 1816019 | Forensic Examiner: Testbed for Benchmarking Digital Audio Forensic Algorithms |
| Hafiz | Malik | 2035770 | Linking2Source: Security of In-Vehicle Networks via Source Identification |
| Athina | Markopoulou | 1956393, 1955227, 2103439, 1956435 | ProperData: Protecting Personal Data Flow on the Internet |
| Florence | Martin | 2015554 | Digital Safety Immersion for Elementary School Students |
| Amirreza | Masoumzadeh | 2047623 | CAREER: Black-Box Learning of Web Application Authorization Policies |
| Aaron | Massey | 1938121 | Enabling Regulatory Compliance for Software Engineering |
| Michelle | Mazurek | 1801545, 1801633 | Understanding Security in the Software Development Lifecycle: A Holistic, Mixed-Methods Approach |
| Patrick | McDaniel | 1805310 | The Center for Trustworthy Machine Learning |
| Muhammad Taqi Raza | Mehdi | CNS-2051621 | Automatic Exploits Detection and Mitigation for Industrial Control System Protocols |
| Hoda | Mehrpouyan | 1846493 | CAREER: Formal TOols foR SafEty aNd Security of Industrial Control Systems (FORENSICS) |
| Peihan | Miao | 2055358 | SaTC: CORE: Small: Expanding the Realm of Oblivious Transfer: New Tools for Cryptography |
| Stephen | Miller | CNS-2124692 | Lattices, number theory, and distribution questions in cryptography |
| Andrew | Miller | 2112726, 2112751 | Hybridizing Trusted Execution Environments and Secure Multiparty Computation |
| Jiang | Ming | 2128703 | SaTC: CORE: Small: A Transparent and Customizable Android Container-Based Virtualization Architecture for Dynamic Malware Analysis |
| Jelena | Mirkovic | 1815495 | SaTC: CORE: Small: Hardening Systems Against Low-Rate DDoS Attacks |
| Prabhat | Mishra | 1936040 | SaTC: CORE: Small: Trustworthy System-on-Chip Design using Secure On-Chip Communication Architecture |
| Tyler | Moore | 1652610 | CAREER: Developing Robust Longitudinal Indicators and Early Warnings of Cybercrime |
| Chrystalla | Mouza | 1821794 | Cybersecurity Education Using Interactive Storytelling with Social Robots |
| Frank | Mueller | 1813004 | T-Sys & T-Pack: Intrusion Detection for CPS |
| Manohar | Murthi | 2123635, 2123618 | Multi-Disciplinary Analyses of the Nature and Spread of Unverified Information Online |
| Adwait | Nadkarni | 1815336 | SaTC: CORE: Small: Enabling Systematic Evaluation of the Soundness of Android Security Analysis Techniques |
| Hoda | Naghibijouybari | 2130978 | SaTC: CORE: Small: Microarchitectural side channel attacks and defenses in integrated CPU-GPU systems |
| Tempestt | Neal | 2039373, 2039379 | Toward Age-Aware Continuous Authentication on Personal Computing Devices |
| Ida | Ngambeki | 1934269, 1934279, 1934285 | An Assessment Driven Approach to Self-Directed Learning in Secure Programming (SecTutor) |
| Nick | Nikiforakis | 1941617 | CAREER: Tools and Techniques for Preserving Integrity on the Web |
| Nick | Nikiforakis | 1813974 | SaTC: CORE: Small: Understanding, Measuring, and Defending against Malicious Web Crawlers |
| Rui | Ning | 2153358 | CRII: SaTC: Backdoor Detection, Mitigation, and Prevention in Deep Neural Networks |
| Chandra | Orrill | 2114981 | Opening Doors for Cybersecurity & AI: An Interdisciplinary Approach to Engaging Middle School Students |
| Laura | Osburn | 1932769 | Medium: Knowledge Work and Coordination to Improve O&M and IT Collaboration to Keep Our Buildings Smart AND Secure |
| Balaji | Palanisamy | 2020071 | Blockchain-based Mechanisms for Timed Data Release and Timed Transactions |
| Anand | Panangadan | 2125654 | SCC-IRG Track 2: Designing and Testing Remote Services to Support Formerly Homeless Persons in Permanent Housing |
| Omkant | Pandey | 2028920 | SaTC: CORE: Small: Nested Black-Box Constructions in Cryptography |
| Charalampos | Papamanthou | 1652259 | Efficient and Secure Distributed Consensus |
| Bryan | Parno | 1801369, 1801321 | Automated Support for Writing High-Assurance Smart Contracts |
| Yilang | Peng | 2150723 | Collaborative Research: SaTC: CORE: Small: Understanding How Visual Features of Misinformation Influence Credibility Perceptions |
| Roberto | Perdisci | 2126641 | Defending Against Social Engineering Attacks with In-Browser AI |
| Alfredo | Perez | 1950416 | An REU Site in Security and Privacy for Mobile Sensing and the IoT |
| Hai | Phan | CNS-1935928, 1935923 | When Adversarial Learning Meets Differential Privacy: Theoretical Foundation and Applications |
| James | Pierce | 1910218, 2142795 | Multidisciplinary Design Approaches to IoT Privacy and Security |
| Michalis | Polychronakis | 2104148 | SaTC: CORE: Small: Selective Data Protection against Data-oriented and Transient Execution Attacks |
| Atul | Prakash | 2039445 | Identifying Educational Conceptions and Challenges in Cybersecurity and Artificial Intelligence |
| Viktor | Prasanna | 2104264 | Accelerating Privacy Preserving Deep Learning for Real-time Secure Applications |
| Calton | Pu | 2039653 | Live Reality: Sustainable and Up-to-Date Information Quality in Live Social Media through Continuous Evidence-Based Knowledge |
| Yanjun | Qi | CNS-124538 | Generalizing Adversarial Examples in Natural Language: White-box Testing of NLP models with Mask Neuron Coverage |
| Mizanur | Rahman | 2104999 | CRII: SaTC: Cyber Resilient Localization and Navigation for Autonomous Vehicles |
| Akond | Rahman | 2026869 | eSLIC: Enhanced Security Static Analysis of Configuration Scripts |
| Ajita | Rattani | 2129173 | Probing Fairness of Ocular Biometrics Methods Across Demographic Variations |
| Indrakshi | Ray | CNS-1715458 | Detecting and Reconstructing Network Anomalies and Intrusions in Heavy Duty Vehicles |
| Julia | Rayz | 2039605 | EAGER: SaTC-EDU: AI-based Humor-Integrated Social Engineering (SE) Training |
| Bradley | Reaves | CNS-1849994 | CRII: SaTC: Techniques for Measuring and Characterizing Robocalls |
| Aunshul | Rege | 2032292 | SaTC: EDU: Educating STEM Students and Teachers about the Relevance of Social Engineering in Cyberattacks and Cybersecurity |
| Matthew | Reimherr | SES-1853209 | Formal Privacy for Complex Data Objects |
| Ling | Ren | 2143058 | CAREER: Algorithms Foundations of Blockchains |
| Yi | Ren | 2101052 | SaTC: Core: Small: Decentralized Attribution and Secure Training of Generative Models |
| Franziska | Roesner | 2041894 | Studying Problematic Content in the Web Advertising Ecosystem |
| Franziska | Roesner | 1651230 | CAREER: Towards Secure Augmented Reality Platforms |
| Jennie | Rogers | 2016240, 2016393 | Quicksilver: A Write-Oriented Private, Outsourced Database Management System |
| Jerzy | Rozenblit | CNS-1615890 | SAFES: A Software-based Architecture for Ensuring Security and Resilience in Medical Device Design |
| Alexander | Russell | 1801487 | Theory and Practice of Cryptosystems Secure Against Subversion |
| Goel | Sanjay | 1912874 | Thwarting the Malicious Insider Evolution Process: The Theory of Strained Betrayal |
| Armin | Sarabi | 20122001 | A Deep Learning Framework for Intelligent Active and Passive Measurements in the Age of Internet of Things |
| Ioannis | Savidis | CNS-1751032 | Parameter Obfuscation: A Novel Methodology for the Protection of Analog Intellectual Property |
| Jarecki | Saxena | 2030575 | Intrusion-Tolerant Outsourced Storage for Cyber-Infrastructure (TTP: Medium) |
| Alessandra | Scafuro | 1717067, 1764025 | A Broad Treatment of Privacy in Blockchains |
| Patrick | Schaumont | 1931639 | SaTC: CORE: Small: Finding and Mitigating Side-channel Leakage in Embedded Architectures |
| David | Schuster | 1553018 | CAREER: Understanding the Cognitive Processes of Computer Network Defense |
| Alexander | Schwarzmann | 2131538 | A Robust Framework with Rigorous Semantics and Security Guarantees for Election-Day Voter Check-in |
| Kent | Seamons | 1816929 | Usable Key Management and Forward Secrecy for Secure Email |
| Vyas | Sekar | 1564009 | Handling a Trillion Unfixable Flaws on Billions of Internet-of-Things |
| R | Sekar | 1918667 | RADAR: Real-time Advanced Detection and Attack Reconstruction |
| Hossain | Shahriar | 2100115 | Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware |
| Micah | Sherr | CNS-1925497 | Expanding Research Frontiers with a Next-Generation Anonymous Communication Experimentation (ACE) Framework |
| Weisong | Shi | CNS-1928331, 1928349 | SaTC: CORE: Small: Collaborative: Hardware-assisted Plausibly Deniable System for Mobile Devices |
| Katie | Shilton | 2131508 | Community-Centered Design of Automated Content Moderation |
| Vitaly | Shmatikov | 1916717 | Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures |
| Tao | Shu | 2006998 | Enabling Privacy-Preserving Routing-on-Context in IoT |
| Craig | Shue | 1814402 | Fine-Grained Protection for Scalable Single-use Services |
| Akbar | Siami Namin | 1564293 | SBE: Medium: User-Centric Design of a Sonification System for Automatically Alarming Security Threats and Impact |
| Akbar | Siami Namin | 1821560 | SaTC: EDU: Improving Student Learning and Engagement in Digital Forensics through Collaborative Investigation of Cyber Security Incidents and Simulated Capture-The-Flag Exercises |
| Yasin | Silva | 2036127 | BullyBlocker - Interdisciplinary Models to Identify and Understand Cyberbullying |
| Alice | Silverberg | 1703321, 1701567, 1701785 | An Algebraic Approach to Secure Multilinear Maps for Cryptography |
| Radu | Sion | 2052951 | SATC: CORE: Small: Efficient Plausible Deniability Systems |
| Rebecca | Slayton | 1553069 | Enacting Cybersecurity Expertise |
| Linhai | Song | CNS-1955965 | Understanding and Detecting Memory Bugs in Rust |
| WenZhan | Song | 2019311 | Cyber-threat Detection and Diagnosis in Multistage Manufacturing Systems through Cyber and Physical Data Analytics |
| Houbing | Song | 1956193 | SaTC: EDU: Collaborative: Bolstering UAV Cybersecurity Education through Curriculum Development with Hands-on Laboratory Framework |
| Drew | Springall | 2115025 | EAGER: Transformative Educational Approaches to Meld Artificial Intelligence and Cybersecurity Mindsets |
| Anna | Squicciarini | CNS-2029976, 2029881 | Collaborative research: SaTC: Core: Small: Privacy protection of Vehicles Location in Spatial Crowdsourcing Under Realistic Adversarial Models |
| Meera | Sridhar | 1947295 | Enhancing Security Education in Hybrid Mobile and Internet of Things Firmware Through Inclusive, Engaging, Learning Modules (E-SHIIELD) |
| Sudarshan | Srinivasan | 2117190 | SaTC: CORE: Small: Formal Verification Techniques For Microprocessor Security Vulnerabilities and Trojans |
| Katherine | Stange | CNS-1652238 | CAREER: Research and Education: Number Theory, Geometry and Cryptography |
| Kate | Starbird | 2120496 | Rapid-Response Frameworks for Mitigating Online Disinformation |
| Kevin | Steinmetz | 1916284 | SaTC: Core: Small: Collaborative: Understanding Law-Enforcement Cyber Investigations |
| Alley | Stoughton | 1801564 | Towards Mechanized Proofs of Composable Security Properties |
| Gianluca | Stringhini | 2114407 | Detecting Accounts Involved in Influence Campaigns on Social Media |
| Megan | Stubbs-Richardson | 2031246 | RAPID: Analyses of Emotions Expressed in Social Media and Forums During the COVID-19 Pandemic |
| Cynthia | Sturton | 1816637 | SaTC STARSS: Tackling the Corner Cases: Finding Security Vulnerabilities in CPU Designs |
| Xiaoyan | Sun | 2105801 | Developing Ready-to-Use Hands-on Labs with Portable Operating Environments for Digital Forensics Education |
| Shreyas | Sundaram | CNS-1718637 | The Impacts of Human Decision-Making on Security and Robustness of Interdependent Systems |
| Daniel | Takabi | 2006329 | SaTC: CORE: Small: An Attribute-based Insider Threat Mitigation Framework |
| Daniel | Takabi | 2054968 | SaTC: EDU: Secure and Private Artificial Intelligence |
| Ravi | Tandon | 1715947 | SaTC: CORE: Small: Robust Physical Layer Security with Channel Knowledge Uncertainty |
| Yuzhe | Tang | 1922507 | SaTC: CORE: Small: External Obliviousness in Trusted Execution Environments |
| Yuzhe | Tang | 2104532 | Collaborative Research: SaTC: EDU: Developing Instructional Laboratories for Blockchain Security Applications |
| Unal | Tatar | 1948261 | CRII: SaTC: Graph-based Probabilistic Cyber Risk Modeling |
| Himanshu | Thapliyal | 1845448 | CAREER: Utilizing Principles of Energy Recovery Computing for Low-Energy and DPA-Resistant IoT Devices |
| Yuan | Tian | 1943100 | CAREER: Secure Voice-Controlled Platforms |
| Andrew | Tolmach | 2048499 | Specifying and Verifying Secure Compilation of C Code to Tagged Hardware |
| Stavros | Tripakis | 1801546, 1801342, 1801399 | SaTC: CORE: Medium: Collaborative: Bridging the Gap Between Protocol Design and Implementation through Automated Mapping |
| Timothy | Tsai | 1948531 | A Cross-Verification Approach for Identifying Tampered Audio |
| Michael Carl | Tschantz | 2055772, 2055773 | Narrowing The Gap Between Privacy Expectations and Reality in Mobile Health |
| Guan-Hua | Tu | 1815636 | Side-channel Attacks Against Mobile Users: Singularity Detection, Behavior Identification, and Automated Rectification |
| Carlene | Turner | 1956428 | Excellence in Research - The Impact of Cybersecurity Policies on Employees' Efficiency and Performance Predictability |
| Jonathan | Ullman | 2120603, 2120611, 2120667, 2120544 | Foundations for the Next Generation of Private Learning Systems |
| Blase | Ur | 2047827 | CAREER: Usable, Data-Driven Transparency and Access for Consumer Privacy |
| Krishna | Venkatasubramanian | 1947022 | SaTC: CORE: Small: Authentication Solutions for Individuals with Upper Extremity Impairment |
| Christelle | Vincent | DMS-1802323 | Applications to Cryptography of the Construction of Curves from Modular Invariants |
| Jessica | Vitak | 1951688 | SaTC EDU: Collaborative: Connecting Contexts: Building Foundational Digital Privacy and Security Skills for Elementary School Ch |
| Ting | Wang | 1953893 | Trustworthy Machine Learning from Untrusted Models |
| Boyang | Wang | 1947913 | CRII: SaTC: Fingerprinting Encrypted Voice Traffic on Smart Speakers |
| Gang | Wang | 2055233 | SaTC: CORE: Small: Towards Label Enrichment and Refinement to Harden Learning-based Security Defenses |
| Gang | Wang | 2030521 | CAREER: Machine Learning Assisted Crowdsourcing for Phishing Defense |
| Yang | Wang | 2114991 | Teach High School Students about Cybersecurity and AI Ethics via Empathy-Driven Hands |
| Yang | Wang | 1652497 | Inclusive Privacy and Security for People with Visual Impairments (PVI) |
| XiaoFeng | Wang | 1801432, 1850725, 1801652 | SaTC: CORE: Medium: Collaborative: Understanding and Discovering Emerging Cybercrimes through Automatic Analysis of Online Text |
| Shuo | Wang | 1812071 | SaTC: TTP: Medium: Collaborative: RESULTS: Reverse Engineering Solutions on Ubiquitous Logic for Trustworthiness and Security |
| Tao | Wei | 2027069 | SaTC: CORE: Medium: Introducing DIVOT: A Novel Architecture for Runtime Anti-Probing/Tampering on I/O Buses |
| Sheng | Wei | 1912593 | Security of Heterogeneous CPU-FPGA Systems |
| Jin | Wei-Kocsis | 2114974 | EAGER: SaTC-EDU: Cybersecurity Education in the Age of Artificial Intelligence: A Novel Proactive and Collaborative Learning Paradigm |
| Eliane | Wiese | 2041960 | EAGER: SaTC-EDU: Teaching Security in Undergraduate AI with Transparency and Contextualization |
| Eric | Williams | 2037535 | SaTC: CORE: Small: Managing Privacy and Environment for Used and End-of-Life Electronic Devices |
| Jake | Williams | 1850014 | Moderating Effects of Automation on Information Transmission in Social Forums |
| Laurie | Williams | 2055554 | SaTC: CORE: Small: Risk-based Secure Checked-in Credential Reduction for Software Development |
| Laurie | Williams | 1909516 | SHF: Small: Detecting the 1%: Growing the Science of Vulnerability Detection |
| Shomir | Wilson | 2105736 | A Large-Scale, Longitudinal Resource to Advance Technical and Legal Understanding of Textual Privacy Information |
| Damon | Woodard | 2131480 | SaTC: I-C-U: AI-Enabled Recovery and Assurance of Semiconductor IP from SEM Images |
| David | Wu | 2151131 | SaTC: CORE: Small: Expanding the Frontiers of Lattice-Based Cryptography |
| Xusheng | Xiao | 2028748 | Scalable Cyber Attack Investigation using Declarative Queries and Interrogative Analysis |
| Jiafeng | Xie | 2020625 | SaTC: CORE: Small: Fast Algorithm Originated Fault Detection Scheme for Ring-LWE based Cryptographic Hardware |
| Li | Xiong | 2124104 | PREMED: Privacy-Preserving and Robust Computational Phenotyping using Multisite EHR Data |
| Weifeng | Xu | 2039289 | Exploring Visualized and Explainable AI to Improve Students' Learning Experience in Digital Forensics Education |
| Dianxiang | Xu | 1954327 | TWC: Small: Benchmarking Testing Methods for Access Control Policies |
| Shouhuai | Xu | 2122631 | A Framework for Enhancing the Resilience of Cyber Attack Classification Mechanisms |
| Jun | Xu | 2213727 | Collaborative Research: SaTC: CORE: Medium: Rethinking Fuzzing for Security |
| Dongpeng | Xu | 1948489 | Simplification of Mixed Boolean-Arithmetic Obfuscated Expression |
| Qiben | Yan | 1950171 | Interactive Attack on Smartphone Voice Systems |
| Mengjia | Yan | 2046359 | A Quantitative Framework for Analyzing and Mitigating Microarchitectural Side Channels |
| Baijian | Yang | 1820573, 1820608 | CHEESE: Cyber Human Ecosystem of Engaged Security Education |
| Danfeng | Yao | 1929701 | SaTC: TTP: Medium: Collaborative: Deployment-quality and Accessible Solutions for Cryptography Code Development |
| Fan | Yao | 2019536, 2019548 | SaTC: Small: Understanding and Taming Deterministic Model Bit Flip Attacks in Deep Neural Networks |
| Attila A | Yavuz | 1917627 | CAREER: Lightweight and Fast Authentication for Internet of Things |
| Tuba | Yavuz | CNS-1942235 | CAREER: Towards a Secure and Reliable Internet of Things through Automated Model Extraction and Analysis |
| Arkady | Yerukhimovich | 1955620, 1955264, 1955319 | New Approaches for Large Scale Secure Computation |
| Heng | Yin | 1719175 | Towards Robust and Scalable Search of Binary Code and Data |
| Man-Ki | Yoon | 1945541 | SaTC: CORE: Small: Partition-Oblivious Real-Time Hierarchical Scheduling |
| Jeffrey | Yost | 2022484 | EAGER: Mining a Useable Past: Perspectives, Paradoxes, & Possibilities in Security and Privacy |
| Chansu | Yu | 2028397 | SaTC: EDU: Transdisciplinary Cybersecurity Education for Law and Engineering Students |
| Philip | Yu | 1930941 | Learning Dynamic and Robust Defenses Against Co-Adaptive Spammers |
| Qiaoyan | Yu | 1652474 | CAREER: Proactive Defense Methods for Chip Integrity and Security |
| Qiaoyan | Yu | 2022279 | SaTC:CORE:Small: Towards Securing the Hardware and Software for Approximate Computing Systems |
| Shucheng | Yu | 1817438 | Toward Usable and Ubiquitous Trust Initialization and Secure Networking in Wireless Ad Hoc Networks |
| Shuhan | Yuan | 2103829 | SaTC: CORE: Small: Deep Learning for Insider Threat Detection |
| Qiang | Zeng | CNS-1856380 | SaTC: CORE: Small: Collaborative: Enabling Precise and Automated Insecurity Analysis of Middleware on Mobile Platforms |
| Zhenkai | Zhang | CNS-2147217 | SaTC: CORE: Small: Leveraging Physical Side-Channel Information to Build Detection-Based Rowhammer Defenses |
| Danfeng | Zhang | 1956032 | Automatic Software Patching against Microarchitectual Attacks |
| Ziming | Zhao | 2037798 | Securing Internet of Things Against Cache-based Attacks |
| Yanbin | Zhao | 1949650 | SaTC: CORE: Medium: Hidden Rules in Neural Networks as Attacks and Adversarial Defenses |
| Zizhan | Zheng | CNS-1816495 | SaTC: CORE: Small: Towards Robust Moving Target Defense: A Game Theoretic and Learning Approach |
| Qian | Zhiyun | 1953932, 1953933 | SaTC: CORE: Small: Collaborative: Deep and Efficient Dynamic Analysis of Operating System Kernels |
| Hai | Zhou | 2113704 | Efficient Logic Encryptions for Hardware IP Protection |
| Lina | Zhou | 1917537 | Implicit One-handed Mobile User Authentication by Induced Thumb Biometrics on Touch-screen Handheld Devices |
| Sebastian | Zimmeck | 2055196 | Improving Internet Privacy with Global Privacy Control (GPC) |
| Rae | Zimmerman | 2122060 | Understanding Human Misperception of Cyber Risks and Integrative Design of Human-Centered Intervention Mechanisms: Component |
| Cliff | Zou | 1915780 | SaTC: EDU: Collaborative: Building a Low-cost and State-of-the-art IoT Security Hands-on Laboratory |
| Xukai | Zou | DGE-2011117, 2011175 | Building an Electronic Voting Technology Inspired Interactive Teaching and Learning Framework for Cybersecurity Education |