2019 SaTC PI Meeting Posters & Demos

2019 SaTC PI Meeting Poster Session

Undergraduate Research Posters
#PresentersTitleAward #
1Ranuli AbeysingheHash functions: Properties, an Attack, and an Application1652474
2Dennis AfanasevSecure and Scalable Network Packet Processing Using OpenNetVM and mTCP1814234
3Zaina AljalladCo-Designing for Community Oversight: Helping People Make Privacy and Security Decisions Together 
4Trevor Ammons & Trent CallahanSide-Channel Attack Evaluation of Post-Quantum Cryptographic Algorithms and Architectures1801488
5Samantha AzizEye Movement Driven Authentication in Virtual Reality1250718
6William BarnhartCapacity-achieving Schemes for Private Information Retrieval with Multi-user Collusion1704274
7Rachel BleimanThe Susceptibility of Disclosing Private Security Information in College Students1453040
8Elijah Bouma-SimsWho's Calling You? A Study of Robocalls in the Era of Modern Telephone Networks1849994
9Luciano BrignoneHiding Instructions in a Processor 
10Morgan BrockmanPromoting Privacy by Design for Software Capstone Courses1727574, 1821782
11Javier CamposInteractive Visualization based Mobiled Security Education for Next-gen Cyber Aware Workforce1903423
12Baicheng ChenCardiac Biometrics for Continuous and Non-contact Mobile Authentication1718375
13Michael CinkoskeA New Connection Between Node and Edge Depth Robust Graphs 
14Chris CrabtreeUsing Deep Learning to Bridge the Semantic Gap between Natural Language and Code: An Automated Approach to Improve Privacy Policy Misalignment Scalability 
15Jacob CrainIoT Embedded System Implementation 
16Noah CurranTrustZone as a Secure Tensor Processor1718702
17Oliver Curry & Zachary PetersonFakesbook1802701
18Leander DavisProtecting Cyber Physical Systems Using A Game-Theoretic Approach1814064
19Julie DixonBlockchain-Based Framework for Securing Integrated Circuits in the Supply Chain 
20Peter FenteanyNon-malleable Digital Lockers for Efficiently Sampleable Distributions1849904
21Catherine HanThe Price is (not) Right: Comparing The Privacy Behaviors of Free vs. Paid Apps1817248, 1564329
22Brandon KujawaReplay Attack Detection in Multimedia of Things (MoT)1815724
23Christy LaPerriereA Participatory Design Study to Test Community Oversight for Privacy and Security1814068
24Jamie LeeOblivious K-Nearest Neighbors for Secure Map Applications 
25Jun LinExamination and Detection of Falsified News1755536
26Christie Lincoln & Alvin ZhangStatic Information Flow Tracking (SIFT) Analysis for Hardware Design Verification1718586
27Bryan ManziPhysical (PHY) Layer Features for Device Authentication1329686
28Grant McClearn & Sarah MorinA New Statistical Audit for Real Elections1421373
29Jonathan MiaoMore Complete DOM XSS Detection Through Dynamic Event Generation1704542
30John MikulskisSnout - An Extensible IoT Pen-Testing Tool1409053
31Monica MoniotDifferentially Private Confidence Intervals 
32Jeongbin OhUnderstanding the performance of SGX-based computations1815814
33Adam PiekarskiT-SGX 
34Justin RobbinsQuaSim: An Interactive Quantum Cryptography Learning Tool1623380
35EJ SeongBoxing Attackers In: Towards Tangible Defenses against Eavesdropping Attacks 
36Sixiong "Shawn" ShanGotta Catch 'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks1834523
37Kaiyan ShiDifferentially Private Nonparametric Hypothesis Testing1817245
38John SpokesActionPoint: Action-Driven App to Strengthen Parent-Teen Relationships to Understand and Identify Cyberbullying1719722
39Trinity StroudDeveloping a Deterministic Polymorphic Circuit Generator Using Boolean Logic Representation1811578
40Jonathan VillanuevaPhysical Inspection for PCB Assurance 
41Abigail VincentFalse Data Injection Attack Model on AC based Hybrid System1600058
42Haoda WangLEADER (Low-Rate Denial-of-Service Attacks Defense)1815495
43Xingchen WangBASCPS: Behavioral Decision Making in Security Games for Protecting Multi-Defender Cyber Physical Systems1718637
44Ashton WoiwoodCharacterizing and Modeling Threat Feeds for Patch Management1715152
45Charlie WolfeKhaleesi: Breaking The Advertising & Tracking Redirect Chains1715152
46Laura ZharmukhametovaSymbolic Execution for Simple R 
    
SaTC Principal Investigator Posters
#Principal InvestigatorTitleAward #
1Nael Abu-GhazalehPractical Hardware-assisted Always-on Malware Detection1619322, 1617915
2Theodore AllenA Framework For Economical Cyber Security Inspection and Assurance1912166
3Nabil AlshurafaPrivacy Enhancing Framework to Advance Models of Behavior1915847
4Ardalan Amiri SaniSecuring Mobile Devices by Hardening their System Software1846230
5Aydin AysuSecure Instruction Set Extensions for Lattice-Based Post-Quantum Cryptosystems1850373
6Kiran BalaganiLeveraging Movement, Posture, and Anthropometric Contexts to Strengthen the Security of Mobile Biometrics1814846
7Ritwik BanerjeeTracking Semantic Changes in Medical Information1834597
8Alexandru BardasCreating and Managing Structurally-Morphing IT Systems - Moving Targets1850406
9Alexandru BardasEarly-Stage Interdisciplinary Collaboration: A Sociotechnical Metrics Framework for Network and Security Operation Centers1915824
10Terry BenzelSharing Expertise and Artifacts for Reuse through Cybersecurity Community Hub (SEARCCH)1925773
11Jeremiah BlockiData-Independent Memory Hard Functions: New Attacks and Stronger Constructions1755708
12John BoardSTINGAR - Deployment of Highly Automated, Reliable, and Fast Cybersecurity Threat Response Systems1815691
13Borzoo BonakdarpourFormal Specification and Verification of Probabilistic Information-flow Security Policies1813388
14Patrick BrandtData to Knowledge: Modernizing Political Event Data for Big Data Social Science Research1539302
15Laurin BuchananCyberMiSTS: Curriculum to Broaden Participation in Cybersecurity for Middle School Teachers and Students1821757, 1821753
16Kevin ButlerProXray: Protocol Model Learning and Guided Firmware Analysis1815883
17L. Jean CampLiving in the Internet of Things1565375
18Bogdan CarbunarAn Open Mobile App Platform to Support Research on Fraudulent Reviews1840714
19Steven CarrVisualization for Secure Coding in C 1523017, 1522883
20Shantanu ChakrabarttyDynamic Authentication based on Zero-power Quantum-Tunneling Timers1525476
21Bo ChenEnabling Secure Data Recovery for Mobile Devices against Malicious Attacks1938130
22Hao ChenIrregular Traffic Detection for Containerized Microservices RPC in the Real World1801751
23Hsinchun ChenCybersecurity Big Data Research for Hacker Community: A Topic and Language Modeling Approach1936370
24Qi Alfred ChenExposing and Mitigating Security/Safety Concerns of CAVs: A Holistic and Realistic Security Testing Platform for Emerging CAVs1929771
25Yingying ChenExploiting Physical Properties in Wireless Networks for Implicit Authenticatio1820624
26Steven Chongpsilence: An R Library for Differential Privacy1565387
27Mo-Yuen ChowSecure Algorithms for Cyber-Physical Systems: Resilient Collaborative Distributed Energy Management System1505633
28Nicolas ChristinICLab: A Global, Longitudinal Internet Censorship Measurement Platform1814817
29John CriswellShielding Software From Privileged Side-Channel Attacks1652280
30Reza Curtmolain-toto: Securing the Software Supply Chain1801430
31Alberto DainottiMapKIT: Mapping Key Internet Terrain1705024
32Kapil DandekarSoftware Defined Radio Framework for Cybersecurity and Information Assurance Education1723606
33Anupam DattaAccountable Information Use: Privacy and Fairness in Decision-Making Systems: SoK: Differential Privacy as a Causal Property1704985, 1704845
34Edmundo de Souza e SilvaINSaNE: Improving Network Security at the Network Edge1740895
35Jintai DingA Cryptanalysis of LUOV using the Subfield Differential Attack (SDA)1814221
36Wenliang DuExpanding TrustZone in Android OS & Developing SEED Labs1718086
37Sara EftekharnejadAnomaly detection and risk assessment in power grids under data measurement threats1600058
38Salim El RouayhebSecure Distributed Coded Computations for IoT: An Information Theoretic and Network Approach1801630
39Dmitry EvtyushkinSecure Branch Predictors for High Performance1850365
40Liyue FanImage Obfuscation with Quantifiable Privacy1755884
41Fariborz FarahmandNeurobiological Basis of Decision Making in Online Environments1358651
42Nick FeamsterPractical Privacy for DNS, From ODNS to DoH1602399
43Yunsi FeiProtecting Confidentiality and Integrity of Deep Neural Networks against Side-channel and Fault Attacks1929300
44Christopher FletcherData Oblivious ISA Extensions for Side Channel-Resistant and High-Performance Computing1816226
45Domenic ForteiPROBE - An Internal Shielding Approach for Protecting against Frontside and Backside Probing Attacks1717392
46Ryan GerdesSecure and Resilient Vehicular Platooning1410000
47Ryan GerdesEnforcement of Geofencing Policies for Commercial Unmanned Aircraft Systems1801611
48Jessica FridrichSteganography with Two JPEGS of the Same Scene1561446
49Ujjwal GuinRobust Design-for-Security (DFS) Architecture for Enabling Trust in Integrated Circuits (IC) Manufacturing and Test1755733
50Sanjay GoelTHE NEW SECURITY CALCULUS: Incentivizing Good User Security Behavior1618212
51Sanjay GoelThwarting the Malicious Insider Evolution Process: The Theory of Strained Betrayal1912874
52Nikhil GuptaSecure and Trustworthy Computer Aided Designs for Additive Manufacturing1931724
53Deniz GurkanNetwork Design for Security using Protocol Trust Boundary Observations1907537
54Yuan HongPrivacy Preserving Cooperation among Microgrids for Efficient Load Management on the Grid1745894
55Amir HoumansadrMassBrowser: Fighting Internet Censorship in a Mass1553301
56Stratis Ioannidis, Miriam LeeserMaSSIF: Massively Scalable Secure Computation Infrastructure Using FPGAs1717213
57Cynthia IrvineLabtainers - Create a Cyber Range on a Laptop1438893, 1932950
58Rashmi JhaOpportunities and Challenges for Resistive Random Access Memory Devices in Hardware Security and Trust1556301
59Ranjit JhalaData-Dependent Instruction Timing Channels1514435
60Limin JiaPractical and Trustworthy Dependency Management1717022
61Zhanpeng JinBrain Hacking: Assessing Psychological and Computational Vulnerabilities in Brain-Based Biometrics1840790
62Criswell JohnIskiOS: Lightweight Defense Against Kernel-Level Code-Reuse Attacks1618213
63Patrick JuolaIs "Fake" a Writing Style?  Detecting Stylistic Alteration1814602
64David KaeliSide-Channel Analysis and Resiliency Targeting Accelerators1618379
65Zbigniew KalbarczykData-Driven Study of Attacks on Cyber-Physical Infrastructure Supporting Large Computing Systems1816673
66Chris KanichEnabling Long-Term Security and Privacy through Retrospective Data Management1801644, 1801663
67Karen KaravanicSystem Infrastructure for SMM-based Runtime Integrity Measurement1528185
68Murat KantarciogluA Data Firewall based Approach for Securing Big Data1111529, 1758628
69Mahmut KarakayaImproving Performance of Standoff Iris Recognition Systems Using Deep Learning Frameworks1909276
70Latifur KhanMitigating Cyber Attacks Using Domain Adaptation1516425
71Joerg KliewerSecure and Private Distributed Coded Computation for Learning and Storage Applications1526547
72Selcuk KoseThe Strength of Combined Distinguishers and Combined Side-channel Attacks1929774
73Yonghwi KwonSecure and Comprehensive Forensic Audit Infrastructure for Transparent Heterogeneous Computing1850392
74Aron LaszkaTowards Efficient and Scalable Crowdsourced Vulnerability-Discovery using Bug-Bounty Programs1850510
75Loukas LazosSecure Cloud Storage Verification Methods1813401
76Jun LiOnline Social Network Fraud and Attack Research and Identification1564348, 1564250, 1564039
77Qinghua LiTowards Automated Security Vulnerability and Patch Management for Power Grid Operations1751255
78Heather LipfordLeveraging community oversight to enhance collective efficacy for privacy and security1814110, 1814068, 1814439
79Hongbo LiuSecurity Assurance in Short Range Communication with Wireless Channel Obfuscation1815908
80Vinod LohaniDevelopment and Analysis of a Spiral Theory-based Cybersecurity Curriculum1623047
81Wenjing LouToward Enforceable Data Usage Control in Cloud-based IoT Systems1916902, 1916926
82Long LuOAT: Attesting Operation Integrity of Embedded Devices1748334
83Bo LuoPrivacy Protection in Social Networks: Bridging the Gap Between User Perception and Privacy Enforcement1422206
84William MahoneyEvaluating Performance and Security of Executable  Steganography for Surreptitious Programs1811560, 1811578
85Khalid MalikForensicExaminer: Testbed for Benchmarking Digital Audio Forensic Algorithms1815724, 1816019
86Florence MartinEstablishing Digital Citizenship by Implementing Cyber Safety Curriculum with Middle School Students1723746
87Donatello MaterassiWireless Hardware Analog Encryption for Secure, Ultra-Low Power Transmission of Data1816703
88Nasir MemonDeepMasterPrints: Generating MasterPrints For Dictionary Attacks via Latent Variable Evolution1618750
89Hoda MehrpouyanFormal Specification and Verification of User-centric Privacy Policies for Ubiquitous Systems1657774
90Hoda MehrpouyanFALCON: Framework for Anomaly Detection in IndustrialControl Systems1846493
91Ana MilanovaSecureMCMR: Privacy-Preserving Computation Outsourcing for MapReduce Applications1814898
92Stephen MillerNumber theory and side-channel attacks from normalized running time distributions1815562
93Tanushree MitraDesigning Trustworthy and Transparent Information Platforms (News Platforms)1915755
94Ida NgambekiAn Assessment Driven Approach to Self-Directed Learning in Secure Programming (SecTutor)1934279, 1934269, 1934285
95Daniela OliveiraAPI Blindspots: Why Experienced Developers Write Vulnerable Code1513572
96Alina OpreaIntrusion Resilience in Game Theoretical APT Models1717634
97Xinming OuEthnographic Study of Secure Software Development Processes in a Real Company​1801633
98Xinming OuA Systematic Study of Comparing Traditional Machine Learning and Deep Learning for Security Vetting of Android Apps1717862, 1717871, 1718214
99Laura OsburnImproving O&M and IT Collaboration to Keep our Buildings Smart and Secure1932769
100Charalampos PapanmanthouEdrax: A Cryptocurrency with Stateless Transaction Validation 
101Charalampos PapanmanthouZero-Knowledge Proofs Through Composition 
102Charalampos PapanmanthouSEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage 
103Abhishek ParakhQuaSim: An Interactive Quantum Cryptography Learning Tool1623380
104Sameer PatilIncorporating Sociotechnical Cybersecurity Learning Within Undergraduate Capstone Courses1821782
105Peter PetersonEnabling a New Generation of Experts by Finding and Fixing Students' Persistent Misconceptions1821788
106Jim PlusquellicSide-channel Power Resistance for Encryption Algorithms using Dynamic Partial Reconfiguration1813945
107Jules PolonetskyRCN: Applied Privacy Research Coordination Network: An Industry-Academic Network to Transition Promising Privacy Research to Practice1837413
108Dmitry PonomarevSide-Channels through Lower-Level Caches: Attacks, Defenses and Security Metrics1422401
109Aravind PrakashRecovering High Level Constructs from C++ Binaries1566532
110Yanjun QiBlack-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers1619098
111Yanjun QiFeature Squeezing- Detecting Adversarial Examples in Deep Neural Networks1619098
112Raghav RaoUnauthorized Access Attempts on Information Systems: The Role of Opportunity Contexts1724725
113Alexander RasinEnd-to-End Database Storage Analysis1656268
114Indrakshi RayMachine Learning for Anomaly Detection in Heavy Vehicles1715458
115Aunshul RegeUnderstanding Adaptive Adversarial Behavior and Decision-Making Processes in Cyberattacks1453040
116Daniel RocheOblivious k-Nearest Neighbors for Secure Map Applications1618269
117Jennie RogersVaultDB: Efficient Query Processing for Private Data Federations1846447
118Norman SadehPersonalized Privacy Assistants1513957
119Norman SadehThe Usable Privacy Policy Project1330596
120Norman SadehAnswering People's Privacy Questions: Weaving Together User-Centered Design, Natural Language Processing and Legal Considerations1914486
121Sagar SamtaniIdentifying Emerging Threats in the Online Hacker Community for Proactive Cyber Threat Intelligence: A Diachronic Graph Convolutional Autoencoder Framework1850362
122Fareena SaqibA Key Update Scheme for Side-Channel Attack Mitigation1814420
123Anand SarwatePERMIT: Privacy-Enabled Resource Management for IoT Networks1617849
124Visvesh SatheComputationally Enabled Robust, Low-Power True Random Number Generation1714496
125Ioannis SavidisParameter Obfuscation: A Novel Methodology for the Protection of Analog Intellectual Property1751032
126Lori ScarlatosCyberMiSTS: Curriculum to Broaden Participation in Cybersecurity for Middle School Teachers and Students1821753
127Patrick SchaumontEnergy-harvested Security for the Internet of Things1704176
128Patrick SchaumontFinding and Mitigating Side-channel Leakage in Embedded Architectures1931639
129Kent SeamonsUsable Key Management and Forward Secrecy for Secure Email1816929
130Vyas SekarHandling a Trillion Unfixable Flaws on Billions of Internet-of-Things1564009
131Edoardo SerraCapacity Building: Integrating Data Science into Cybersecurity Curriculum1820685
132Akbar Siami NaminUser-Centric Design of a Sonification System for  Automatically Alarming Security Threats and Impact1564293
133Akbar Siami NaminImproving Student Learning and Engagement in Digital Forensics through Collaborative Investigation of Cyber Security Incidents and Simulated Capture-the-Flaag Exercises1821560
134Yasin SilvaBullyBlocker - Identifying Cyberbullying in Social Networking Sites1719722
135Stephanie SingerData Science for Election Verification1936809
136Christian SkalkaPCNC: Proof-Carrying Network Code1718036
137Geoffrey SmithQuantifying Information Leakage in Searchable Encryption1749014
138Scott StollerAccess Control Policy Mining and Management1421893
139Cynthia SturtonTransys: Leveraging Common Security Properties Across Hardware Designs1816637
140Berk SunarSuper-Human Cryptanalysis for Scalable Side-Channel Analysis1814406
141Ravi TandonRobust Physical Layer Security with Limited Channel Knowledge1715947
142Yuzhe TangScalable Secure Computations on Intel SGX via Lazy Program Partitioning1815814
143Yuzhe TangBlockchain-based Fork Prevention in Securing Cloud Storage Services 
144Himanshu ThapliyalUtilizing Principles of Energy Recovery Computing for Low-Energy and DPA-Resistant IoT Devices1845448
145Michael ThomasA Cybersecurity Collectable Card Game for Children1623267
146Nikos TriandopoulosTowards Scalable Private Collaborative Learning 
147A. Selcuk UluagacSecuring Sensory Side-Channels in Cyber-Physical Systems1453647
148A. Selcuk UluagacPrivacy-Aware Wearable-Assisted Continuous Authentication Framework1718116
149Ashish VenkatContext-Sensitive Fencing: Securing Speculative Execution via Microcode Customization1850436
150Jessica VitakMapping Privacy and Surveillance Dynamics in Emerging Mobile Ecosystems: Practices and Contexts in the Netherlands and US1640640
151Roopa VishwanathanAutomated Proof Construction and Verification for Attribute-based Cryptography1800088
152Roopa VishwanathanBlockchain-enabled Payment Networks1800088
153Gang WangRe-examining Email Spoofing in the Context of Spear Phishing1750101, 1717028
154Kuang-Ching WangTowards a Traffic Analysis Resistant Internet Architecture1643020
155Weichao WangDeveloping Security Education Materials for Future Advanced Manufacturing Engineering Workforce1523096
156XiaoFeng WangUnderstanding and Discovering Emerging Cybercrimes through Automatic Analysis of Online Text Traces1801432
157Xiaoyin WangGUILeak: Tracing Privacy Policy Claims on User Input Data for Android Applications1748109
158Nicholas WeaverUnderstanding and Illuminating Non-Public Data Flows: Evaluating Anti-Fingerprinting Privacy Enhancing Technologies1514509
159Sheng WeiHISA: Hardware Isolation-based Secure Architecturefor CPU-FPGA Heterogenous Systems1912593
160Wujie WenInvisible Shield: Can Compression Harden Deep Neural Networks Universally Against Adversarial Attacks?1840813
161Andrew WhinstonInformation Disclosure and Security Policy Design: A Large-Scale Randomization Experiment in Pan-Asia1718600
162Pamela WisniewskiA Participatory Design Study to Test Community Oversight for Privacy and Security1814068
163Matthew WrightWebsite Fingerprinting in Tor: An Adversarial ML Approach1816851, 1722743
164Dinghao WuDynamic and Static Program Analysis for Side Channel Vulnerability Detection and Mitigation1652790
165Li XiongPriSTE: Protecting Spatiotemporal Event Privacy in Continuous LBS1618932
166Qiben YanURadio: Towards Secure Smart Home IoT Communication Using Hybrid Ultrasonic-RF Radio1950171
167Zheng YanWhere are the Weakest Links in Cybersecurity Judgment of Elementary School Students, Middle School Students, High School Students, and School Teachers1649872
168Danfeng YaoDeployment-quality and Accessible Solutions  for Cryptography Code Development1929701
169Attila A YavuzCAREER: Lightweight and Fast Authentication for Internet of Things1652389
170Qiaoyan YuManaging Hardware Security in Three Dimensional Integrated Circuits1717130
171Yanfang (Fanny) YeIntelligent Malware Detection Utilizing Novel File Relation-Based Features and Resilient Techniques for Adversarial Attacks1946327
172Yanfang (Fanny) YeSecuring Cyberspace: Gaining Deep Insights into the Online Underground Ecosystem1940859
173Philip S. YuLearning Dynamic and Robust Defenses Against Co-Adaptive Spammers1931042
174Zizhan ZhengTowards Robust Moving Target Defense: A Game Theoretic and Learning Approach1816495
175Huiyang ZhouTowards Smart and Secure Non Volatile Memory1717550
176Lina ZhouImplicit One-handed Mobile User Authentication by Induced Thumb Biometrics on Touch-screen Handheld Devices1704800, 1917537
    
    

2019 SaTC PI Meeting Demonstrations

Principal InvestigatorCo-Presenter Name(s)AffiliationProject TitleProject Award Number
Saurabh BagchiShreyas SundaramPurdue UniversityControl Improvisation for Cyber-Physical Systems1718637
Justin CapposSantiago Torres-AriasNew York UniversittySecuring the Software Supply Chain1801430
Polo Chau Georgia TechUnderstanding and Fortifying Machine Learning Based Security Analytics1704701
Jeremy DailyUrban JonsonColorado State UniversityGOALI: Detecting and Reconstructing Network Anomalies and Intrusions in Heavy Duty Vehicles1715409
Wu-chang Feng Portland State UniversityCurricula and CTF Exercises for Teaching Smart Fuzzing and Symbolic Execution1821841
Ryan Gerdes Virginia TechEnforcement of Geofencing Policies for Commercial Unmanned Aircraft Systems1801611
Yier JinTravis MeadeUniversity of FloridaRESULTS: Reverse Engineering Solutions on Ubiquitous Logic for Trustworthiness and Security1812071
Hui Lin University of Nevada at RenoPreempting Physical Damage from Control-Related Attacks on Smart Grids’ Cyber-Physical Infrastructure1850377
Hafiz MalikKhalid Mahmood MalikUniversity of Michigan - DearbornForensicExaminer: Testbed for Benchmarking Digital Audio Forensic Algorithms1816019
Chrystalla MouzaChien-Chung ShenUniversity of DelewareCybersecurity Education Using Interactive Storytelling with Social Robots1821794
Hai Phan New Jersey Institute of TechnologyPrivateNet - Preserving Differential Privacy in Deep Learning under Model Attacks1850094
Zhiyun Qian University of California, RiversideThe Web Ad Technology Arms Race: Measurement, Analysis, and Countermeasures1719147
Ramasubramanian Sekar Stony Brook UniversityRADAR: Real-time Advanced Detection and Attack Reconstruction1918667
Stavros TripakisEunsuk KangNortheastern UniversityBridging the Gap between Protocol Design and Implementation through Automated Mapping1801546
Xinyu Xing Penn State UniversityTowards Locating Memory Corruption Vulnerability with Core Dump1718459
Shanchieh Jay Yang Rochester Institute of TechnologyAutomating Attack Strategy Recognition to Enhance Cyber Threat Prediction1526383, 1742789
Louise Yarnall SRI EducationMicrolessons to Build Readiness in the Cybersecurity Workforce1821666
SaTC Community Forum Help Desk