Posters
Lead PI First NameLead PI Last NameNSF Project Award Number(s)Poster Title
AmosAbbott2136915EAGER: Biometric Authentication using Noncontact Cardiovascular Signals
NaelAbu-GhazalehCNS-1619322 (UCR) & CNS-1617915 (Binghamton)Collaborative Research: SaTC: CORE: Medium: Leakage-free Isolated Execution: Architectures and Security Models
KhairAl Shamaileh2006662Jamming Detection and Classification in OFDM-Based UAVs via Feature- and Spectrogram-tailored Machine Learning
LauraAlbert2000986An Optimization Framework for Identifying Dynamic Risk Management Practices
AishaAli-Gombe1850054CRII: SaTC: Leveraging Userland In-Memory Objects for Cybercrime Investigations and Malware Classification
Mary JeanAmon2053152Bottom-up psychosocial interventions for interpersonal privacy preservation
MohdAnwar2007662SaTC: CORE: Small: Tracking User Behavior, Cognitive Burdens, and the Impact of Behavioral Nudging on Security Updates by Young and Older Adults
ErmanAyday2050410Robust, Privacy- and Utility-Preserving Fingerprinting Schemes for Correlated Data
HamidBahrami1956110SaTC: CORE: Small: A Practical Approach to Study Security in Wireless Networks
KiranBalagani1814846Leveraging Movement, Posture, and Anthropometric Contexts to Strengthen the Security of Mobile Biometrics
AlexandruBardas1850406CRII: SaTC: Creating and Managing Structurally-Morphing IT Systems - Moving Targets
AlexandruBardas1915824A Sociotechnical Metrics Framework for Network and Security Operations Centers
FranceBelangerSES-2039172Information Privacy Tensions and Decisions in Families during COVID‐19
TerryBenzel1925773, 1925616, 1925564, 1925588Sharing Expertise and Artifacts for Reuse through Cybersecurity Community Hub (SEARCCH)
JuliaBernd2114229, 2114230Foregrounding Bystanders as Stakeholders in Smart Home Product Design
VincentBindschaedler2055123SaTC: CORE: Medium: Countering Surveillanceware Using Deception-Based Generative Models and Systems Mechanisms
GedareBloom2046705CAREER: Foundations for Real-Time System Security
AlexandraBoldyreva1946919Provable Security Analysis of FIDO2
BorzooBonakdarpour2100989SaTC: CORE: Small: Techniques for Software Model Checking of Hyperproperties
Shaunak D.Bopardikar2134076SaTC: CORE: SMALL: Data-driven Attack and Defense Modeling for Cyber-physical Systems (CPS)
KellyCaine1940679Cryptographic Provenance for Digital Publishing
BogdanCarbunar2013671SaTC: CORE: Small: Deconstructing and Neutralizing Search Rank Fraud
BogdanCarbunar2114911Collaborative Research: EAGER: SaTC-EDU: Just-in-Time Artificial Intelligence-Driven Cyber Abuse Education in Social Networks
KrishnenduChakrabarty2011561Security of FPGA-as-a-Service for Reconfigurable Systems: Securing FPGA bitstreams and Preventing IP Theft
KrishnenduChakrabarty2049335Secure and Trustworthy Cyberphysical Microfluidic Systems
DavidChan-Tin1919004 and 1918591Personalized Cybersecurity Education and Training
BoChen1938130EAGER: Enabling Secure Data Recovery for Mobile Devices against Malicious Attacks
BoChenCNS-1928331, 1928349SaTC: CORE: Small: Collaborative: Hardware-assisted Plausibly Deniable System for Mobile Devices
HsinchunChen1936370SaTC: CORE: Small: Cybersecurity Big Data Research for Hacker Community: A Topic and Language Modeling Approach
HaoChen1801751SaTC: CORE: Medium: Collaborative: Towards Robust Machine Learning Systems
YuChenCNS-2039342EAGER: SAVED: Secure Audio and Video Data from Deepfake Attacks Leveraging Environmental Fingerprints
YingyingChen1820624Exploiting Physical Properties in Wireless Networks for Implicit Authentication
YingyingChen2114220Collaborative Research: SaTC: CORE: Small: Securing IoT and Edge Devices under Audio Adversarial Attacks
QiChen1930041, 1929771SaTC: TTP: Medium: Collaborative: Exposing and Mitigating Security/Safety Concerns of CAVs: A Holistic and Realistic Security Testing Platform for Emerging CAVs
AdamChlipala2130671Scaling Correct-by-Construction Code Generation for Cryptography
ChristianCollberg1145913, 2040206The Tigress Endpoint Protection Tool - Transition to Practice
AlbertoDainotti1705024MapKIT—Mapping Key Internet Terrain
MelissaDark2117073ARC - Assessment Resources for Cybersecurity
Sajal K.Das2030611, 2030624TAURUS: Towards a Unified Robust and Secure Data Driven Approach for Attack Detection in Smart Living
SauvikDas2029519Corporeal Cybersecurity: Improving End-User Security and Privacy with Physicalized Computing Interfaces
SauvikDas2126058Privacy through Design: A Design Methodology to Promote the Creation of Privacy-Conscious Consumer AI
Leigh AnnDeLyser2028426The JROTC Impact Study:Bringing Cybersecurity Skills and Training to JROTC Cadets
SriniDevadas2115587SaTC: CORE: Medium: Provably Secure, Usable, and Performant Enclaves in Multicore Processors
NatashaDevroye1909547Arbiter PUF Faults: Impact, Testing, and Diagnosis
ShiriDori-Hacohen2147305Fairness via AI: Bias Reduction in Medical Information
ChristopherDoss2039612, 2039613, 2039614Safeguarding STEM Education and Scientific Knowledge in the age of Hyper realistic AI-Generated Data
SalimEl Rouayheb1801630Secure Distributed Coded Computations for IoT: An Information Theoretic and Network Approach
MichalisFALOUTSOS2132642SOFIA: Finding and Profiling Malware Source Code in Public Archives at Scale
LiyueFan1949217Differentially Private Obfuscation for Face and Eye Images
FariborzFarahmand2041788Advancing Cybersecurity Education to Human-Level Artificial Intelligence
KassemFawaz1942014CAREER: Presentation and Mitigation of Privacy Risks for Online Users
LisaFazio2122640How False Beliefs Form and How to Correct Them
NickFeamster2041970EAGER: SaTC-EDU: Training Mid-Career Security Professionals in Machine Learning and Data-Driven Cybersecurity
EarlenceFernandes2144376Security and Privacy Foundations of Internet-Scale User-Centered Automation
FerdinandoFioretto2133169Collaborative Research: SaTC: CORE: Small: Privacy and Fairness in Critical Decision Making
AlvisFong2017289CyberTraining: Pilot: Modular Experiential Learning for Secure, Safe, and Reliable AI (MELSSRAI)
ChristinaGarman1816422Bento: Bringing Network Function Virtualization to Tor
Jean-LucGaudiot2026675Securing Information Systems with Flexible Hardware Techniques
SanjayGoel1912874Thwarting the Malicious Insider Evolution Process: The Theory of Strained Betrayal
GuofeiGu1816497Adversarial Learning via Modeling Interpretation
NikhilGuptaDGE-1931724SaTC: EDU: Collaborative: An Educational Initiative on Cybersecurity in Additive Manufacturing
MaanakGupta2025682Collaborative Research: SaTC: EDU: Artificial Intelligence Assisted Malware Analysis
WillieHarrison1910812CIF: Small: Best wiretap codes for real-world information-theoretic security
TingHe1946022SaTC: CORE: Small: Adversarial Network Reconnaissance in Software Defined Networking
YuanHongCNS-2034870, 2034615Collaborative Research: SaTC: CORE: Small: Privately Collecting and Analyzing V2X Data for Urban Traffic Modeling
TamzidulHoque2114157, 2114165, 2114200Hardware Security Education for All Through Seamless Extension of Existing Curricula
Mitra BokaeiHosseini2055772, 2055773Collaborative Research: SaTC: CORE: Medium: Narrowing The Gap Between Privacy Expectations and Reality in Mobile Health
FeiHuNSF DGE-1723250Captivology-Stimuli-based Learning (CAPITAL) of Big Data Security (BigSec): Towards a Science/Engineering, Career-Oriented Training
CharlesHughes2114808Improving Cybersecurity Education for Adolescents with Autism Through Automated Augmented Self-Monitoring Applications
StratisIoannidis1717213MaSSIF: Massively Scalable Secure Computation Infrastructure using FPGAs
MurtuzaJadliwala1943351CAREER: A Holistic Context-based Approach for Security and Privacy in the Era of Ubiquitous Sensing and Computing
ShwetaJainCNS-2131182Cultivating and Developing Research Talent to Support Research in Cyber-Security
AhmadJavaid1903419, 1903423INteractive Animated VIsualization and PracTice basEd Cybersecurity Curriculum and Training (InviteCyber) Framework for Developing Next-gen Cyber-Aware Workforce
LiminJia1704542Towards a Usable, Practical, and Provably Secure Browser Infrastructure
LiminJia2114148Toward Safe, Private, and Secure Home Automation: From Formal Modeling to User Evaluation
NaimaKaabouch2006674GPS Spoofing/Mimicking Attacks on UAS: Detection Techniques Based on Machine and Deep Learning
ApuKapadia1814476Socio-Technical Strategies for Enhancing Privacy in Photo Sharing
AvinashKaranthCCF-1936794Dynamic GARUDA: Securing Programs with Hardware Monitors Using Higher Language Abstractions
LatifurKhan2039542EAGER: SaTC AI-Cybersecurity: Secure and Privacy-Preserving Adaptive Artificial Intelligence Curriculum Development for Cyber Security
LatifurKhan1931800SATC: EDU: Curriculum Development for Secure Blockchain Technologies
FarshadKhorrami2039615NSF SATC: TTP: Small: Tracking Run-time Anomalies in Code Execution (TRACE)
TaesooKim1563848PRIWDEN: Universally Hardening SGX Programs via Load-Time Synthesis
DavidKotzCNS-1955805, 1955172, 1955228, 1955231SPLICE: Security and Privacy in the Lifecycle of IoT for Consumer Environments
YingjieLao2047384CAREER: Protecting Deep Learning Systems against Hardware-Oriented Vulnerabilities
LoukasLazos1813401SaTC: CORE: Small: Secure Cloud Storage Verification Methods
JaewooLee1943046CAREER: Robust Adaptive Optimization Algorithms for Differentially Private Learning
QinghuaLi1751255Towards Automated Asset-Vulnerability Mapping for Vulnerability Management
ZhouLi2039634Multi-Level Attack and Defense Simulation Environment for Artificial Intelligence Education and Research
HuiLin2144513PARP: Mislead Physical-Disruption Attacks by Preemptive Anti-Reconnaissance for Power Grids' Cyber-Physical Infrastructures
HeatherLipford1814110, 1814068, 1814439Leveraging community oversight to enhance collective efficacy for privacy and security
WenjingLou1916902, 1916926Toward Enforceable Data Usage Control in Cloud-based IoT Systems
AidongLu1564039Collaborative: Online Social Network Fraud and Attack Research and Identification
SiweiLyu2153112SaTC: CORE: Small: Combating AI Synthesized Fake Media Beyond Detection
KhalidMalik1815724, 1816019Forensic Examiner: Testbed for Benchmarking Digital Audio Forensic Algorithms
HafizMalik2035770Linking2Source: Security of In-Vehicle Networks via Source Identification
MadhavMarathe2041952Pandemic Research for Preparedness and Resilience (PREPARE): Building a Research Community for the Next Pandemic
AthinaMarkopoulou1956393, 1955227, 2103439, 1956435ProperData: Protecting Personal Data Flow on the Internet
FlorenceMartin2015554Digital Safety Immersion for Elementary School Students
FlorenceMartin2122416Advancing Cybersecurity and Privacy of Educational Technologies used in K12 Schools by Supporting School Administrators, Technology Support Staff, and Teachers
AaronMassey1938121Enabling Regulatory Compliance for Software Engineering
PatrickMcDaniel1805310The Center for Trustworthy Machine Learning
Muhammad Taqi RazaMehdiCNS-2051621Automatic Exploits Detection and Mitigation for Industrial Control System Protocols
HodaMehrpouyan1846493Formal TOols foR SafEty aNd Security of Industrial ControlSystems (FORENSICS)
JiangMing2128703SaTC: CORE: Small: A Transparent and Customizable Android Container-Based Virtualization Architecture for Dynamic Malware Analysis
JelenaMirkovic1815495Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Servers
PrabhatMishra1936040SaTC : CORE: Small: Trustworthy System on Chip Design using Secure On Chip Communication Architecture
AlanMisloveCNS-1955227, 1956435, 1916020, 1916153Ad Delivery Algorithms: ​The Hidden Arbiters of Political Messaging
ChrystallaMouza1821794Cybersecurity Education Using Interactive Storytelling with Social Robots
MehranMozaffari Kermani1801488Countermeasures Against Side-Channel Attacks Targeting Hardware and Embedded System Implementations of Post-Quantum Cryptographic Algorithms
FrankMueller1813004Timing Based Security in Real-Time Systems: T-SYS & T_Pack
ManoharMurthi2123635, 2123618Multi-Disciplinary Analyses of the Nature and Spread of Unsubstantiated Information Online
AdwaitNadkarni1815336SaTC: CORE: Small: Enabling Systematic Evaluation of the Soundness of Android Security Analysis Techniques
TempesttNeal2039373, 2039379Toward Age-Aware Continuous Authentication on Personal Computing Devices
NickNikiforakis1941617CAREER: Tools and Techniques for Preserving Integrity on the Web
ChandraOrrill2114981Opening Doors for Cybersecurity & AI: An Interdisciplinary Approach to Engaging Middle School Students
BalajiPalanisamy2020071Blockchain-based Mechanisms for Timed Data Release and Timed Transactions
CharalamposPapamanthou1652259Efficient and Secure Distributed Consensus
YilangPeng2150716Collaborative: SaTC: Core: Small: Understanding how visual features of misinformation influence credibility perceptions
RobertoPerdisci2126641Defending Against Social Engineering Attacks with In-Browser AI
AlfredoPerez1950416, 1560214REU@CSU: An REU Site in Security for Mobile Sensing and the IoT
HaiPhanCNS-1935928, 1935923SaTC: CORE: When Adversarial Learning Meets Differential Privacy: Theoretical Foundation and Applications
CaltonPu2039653Live Reality: Up-to-Date Information Quality
ZhiyunQian1953932, 1953933SaTC: CORE: Small: Collaborative: Deep and Efficient Dynamic Analysis of Operating System Kernels
AkondRahman2026869eSLIC: Enhanced Security Static Analysis of Configuration Scripts
MizanurRahman2104999Cyber Resilient Localization and Navigation for Autonomous Vehicles
AjitaRattani2129173Probing Fairness of Ocular Biometrics Methods Across Demographic Variations
IndrakshiRayCNS-1715458Detecting and Reconstructing Network Anomalies and Intrusions in Heavy Duty Vehicles
AunshulRege2032292SaTC: EDU: Educating STEM Students and Teachers about the Relevance of Social Engineering in Cyberattacks and Cybersecurity
YiRen2101052SaTC: Core: Small: Decentralized Attribution and Secure Training of Generative Models
ArminSarabi20122001A Deep Learning Framework for Intelligent Active and Passive Measurements in the Age of Internet of Things
PatrickSchaumont1931639An End-to-End Analysis of EMFI Attacks on Bit-sliced Post-Quantum Implementations
AlexanderSchwarzmann2131538A Robust Framework with Rigorous Semantics and Security Guarantees for Election-Day Voter Check-in
KentSeamons1816929Usable Key Management and Forward Secrecy for Secure Email
RSekar1918667RADAR: Real-time Advanced Detection and Attack Reconstruction
HossainShahriar2100115, 2100134Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware
MicahSherrCNS-1925497Expanding Research Frontiers with a Next-Generation Anonymous Communication Experimentation (ACE) Framework
TaoShu2006998CNS Core: Small: Enabling Privacy-Preserving Routing-on-Context in IoT
AkbarSiami Namin1821560SaTC: EDU: Improving Student Learning and Engagement in Digital Forensics through Collaborative Investigation of Cyber Security Incidents and Simulated Capture-the-Flag Exercises
AkbarSiami Namin1564293SBE: Medium: User-Centric Design of a Sonification System for Automatically Alarming Security Threats and Impact
YasinSilva2036127BullyBlocker - Interdisciplinary Models to Identify and Understand Cyberbullying
LinhaiSongCNS-1955965Rethinking Toolchain Design for Rust
WenZhanSong2019311Cyber-threat Detection and Diagnosis in Multistage Manufacturing Systems through Cyber and Physical Data Analytics
HoubingSong1956193SaTC: EDU: Collaborative: Bolstering UAV Cybersecurity Education through Curriculum Development with Hands-on Laboratory Framework
AnnaSquicciariniCNS2029976, 2029881Collaborative research: SaTC: Core: Small: Privacy protection of Vehicles location in Spatial Crowdsourcing under realistic adversarial models
MeeraSridhar1947295SaTC: EDU: Enhancing Security Education in Hybrid Mobile and Internet of Things Firmware through Inclusive, Engaging, Learning Modules (E-SHIIELD)
TripakisStavros1801546, 1801342, 1801399Bridging the Gap Between Protocol Design and Implementation through Automated Mapping
KevinSteinmetz1916284SaTC: Core: Small: Collaborative: Understanding Law-Enforcement Cyber Investigations
ShreyasSundaramCNS-1718637TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems
RaviTandon1715947Privacy Preserving Wireless Federated Learning
YuzheTang2104532Collaborative Research: SaTC: EDU: Developing Instructional Laboratories for Blockchain Security Applications
UnalTatar1948261CRII: SaTC: Graph-based Probabilistic Cyber Risk Modeling
YuanTian1943100Secure Voice-Controlled Platforms
AndrewTolmach2048499Specifying and Verifying Secure Compilation of C Code to Tagged Hardware
CarleneTurner1956428Excellence in Research - The Impact of Cybersecurity Policies on Employees' Efficiency and Performance Predictability
BlaseUr2047827CAREER: Usable, Data-Driven Transparency and Access for Consumer Privacy
KrishnaVenkatasubramanian1947022SaTC: CORE: Small: Authentication Solutions for Individuals with Upper Extremity Impairment
BoyangWang1947913Fingerprinting Encrypted Voice Traffic on Smart Speakers
GANGWANG2055233Combating Concept Drift in Security Applications with Self-Supervised Learning
YangWang1652497Inclusive Privacy and Security for People with Visual Impairments (PVI)
YangWang2114991Teaching High School Students about Cybersecurity and Artificial Intelligence Ethics
YangWang2126314Novel Algorithms and Tools for Empowering People Who Are Blind to Safeguard Private Visual Content
XiaoFengWang1801432, 1850725, 1801652SaTC: CORE: Medium: Collaborative: Understanding and Discovering Emerging Cybercrimes through Automatic Analysis of Online Text Traces
TingWang1953893Trustworthy Machine Learning from Untrusted Models
TaoWei2027069SaTC:CORE: Medium: Introducing DIVOT: A Novel Architecture for Runtime Anti-Probing/Tampering on I/O Buses
ShengWei1912593Security of Heterogeneous CPU-FPGA Systems
JinWei-Kocsis2114974EAGER: SaTC-EDU: Cybersecurity Education in the Age of Artificial Intelligence: A Novel Proactive and Collaborative Learning Paradigm
JakeWilliams1850014Moderating Effects of Automation on Information Transmission in Social Forums
ShomirWilson2105736, 2105734, 2105745PrivaSeer: A Large-Scale, Longitudinal Resource to Advance Technical and Legal Understanding of Textual Privacy Information
ShomirWilson1914444Answering People’s Privacy Questions: Weaving Together User-centered Design, Natural Language Processing and Legal Considerations
XushengXiao2028748DEPIMPACT: Back-Propagating System Dependency Impact for Attack Investigation
JiafengXie2020625SaTC: CORE: Small: Fast Algorithm Originated Fault Detection Scheme for Ring-LWE based Cryptographic Hardware
AipingXiong1915801Associative Inference: Another Cognitive Driver of Misinformation Susceptibility
DongyanXuCNS-1801534KSplit: Automating Device Driver Isolation
ShouhuaiXu2122631A Framework for Enhancing the Resilience of Cyber Attack Classification Mechanisms
JunXu2213727Collaborative Research: SaTC: CORE: Medium: Rethinking Fuzzing for Security
DongpengXu1948489CRII: SaTC: Simplification of Mixed Boolean-Arithmetic Obfuscated Expression
QibenYan1950171Interactive Attack on Smartphone Voice System Through Power Line
MengjiaYan2046359A Quantitative Framework for Analyzing and Mitigating Microarchitectural Side Channels
BaijianYang1820573, 1820608Cyber Human Ecosystem of Engaged Security Education (CHEESE)
FanYao2019536, 2019548SaTC: Small: Understanding and Taming Deterministic Model Bit Flip Attacks in Deep Neural Networks
Danfeng (Daphne)Yao1929701SaTC: TTP: Medium: Collaborative: Deployment-quality and Accessible Solutions for Cryptography Code Development
TubaYavuzCNS-1942235CAREER: Towards a Secure and Reliable Internet of Things through
 Automated Model Extraction and Analysis
ArkadyYerukhimovich1955620, 1955264, 1955319New Approaches for Large Scale Secure Computation​
HengYin1719175Towards Robust and Scalable Search of Binary Code and Data
ChansuYu2028397SaTC: EDU: Transdisciplinary Cybersecurity Education for Law and Engineering Students
QiaoyanYu1652474CAREER: Proactive Defense Methods for Chip Integrity and Security
QiaoyanYu2022279SaTC: CORE: Small: Towards Securing the Hardware and Software for Approximate Computing Systems
ShuhanYuan2103829Deep Learning for Insider Threat Detection
XuYuan1948374CRII: SaTC: Empowering Elastic-honeypot as Real-time Malicious Content Sniffers for Social Networks
YanbinZhao1949650SaTC: CORE: Medium: Hidden Rules in Neural Networks as Attacks and Adversarial Defenses
LinaZhou1917537Implicit One‐handed Mobile User Authentication by Induced Thumb Biometrics on Touch‐screen Handheld Devices
SebastianZimmeck2055196Improving Internet Privacy with Global Privacy Control (GPC)
CliffZou1915780SaTC: EDU: Collaborative: Building a Low-cost and State-of-the-art IoT Security Hands-on Laboratory