Computer Security Faculty

3y ago
26 Views
2 Downloads
355.94 KB
6 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Julius Prosser
Transcription

Computer Security FacultyDavid AndersenLujo BauerKarl CraryGiulia FantiLimin JiaRuben MartinsFrank PfenningNorman SadehNicolas ChristinMatt FredriksonRoy MaxionVyas SekarLorrie CranorVipul GoyalBryan ParnoElaine ShiDimitrios Skarlatos

Computer Security FacultyDavid Andersen, Professor (CS)dga@cs.cmu.eduhttp://www.cs.cmu.edu/ -andersenNetworks, distributed systems, overlay networks, peer-to-peer, availabilty, Internetmeasurement, wireless & ad-hoc networks.I study the "systems" side of networks: How to improve the availability, performance, and usability of Internetbased and wireless and mobile systems. My research emphasizes building real systems and conducting realworld measurements to provide a better understanding of these networks.Lujo Bauer, Professor (ECE & ISR)lbauer@cmu.eduhttp://www.ece.cmu.edu/ lbauer/Software and systems security, usable security and privacy, machine learning and securityMy research interests span many areas of computer security and privacy. I like building systems that betterprotect users' security and privacy, particularly when we can empirically show that these systems actuallyhelp users and formally show that the protections are robust. My recent work focuses on understanding therisks of relying on machine learning algorithms, as well as on using machine learning to find software bugsand help users make better security decisions.Nicolas Christin, Associate Professor (ISR & du/user/nicolascSecurity measurements, human factorsMy research interest is in computer and information systems security. Most of my work is at the boundaryof systems, networking and policy research. While a good portion of my research activities could be qualifiedas applied research, I try as much as possible to rely on strong theoretical foundations in my work. Inaddition, Most of my recent work is informed by empirical data measurements (of users, networks, economictransactions.) so that the term “security analytics” is an appropriate short qualifier.Lorrie Cranor, Professor (CS & EPP)Director, CyLab Security and Privacy InstituteCo-director, MSIT-Privacy Engineering masters sable privacy and security, technology and public policyMy current projects involve privacy decision making, user-controllable security and privacy, usablecyber trust indicators, and usable and secure passwords.

Computer Security FacultyKarl Crary, Associate Professor (CS)crary@cs.cmu.eduhttp://www.cs.cmu.edu/ l-craryProgramming languages and securityMy research interests are in applying programming language technology to improve the development,maintenance, and performance of software systems. I am particularly interested in the application oftype theory to systems programming, in mechanization of the metatheory of programming languages,in type-oriented compilation strategies, in type-based certification of machine code, and in thedesign of practical, high- or low-level programming languages.Giulia Fanti, Assistant Professor (ECE & culty/giulia-fantiPrivacy, Cryptocurrencies, Machine Learning, NetworksI am broadly interested in networked, distributed systems. My research typically involves some combinationof designing algorithms, proving theoretical properties about them, and/or testing them in real systems.Some of my recent projects have focused on improving the scalability and privacy of cryptocurrencies at thenetworking layer, increasing the diversity and robustness of generative adversarial networks, anddesigning countermeasures for cyberbullying in anonymous online forums.Matt Fredrikson, Assistant Professor (CS & ISR)mfredrik@cs.cmu.eduhttp://www.cs.cmu.edu/ matthew-fredriksonSecurity and privacyMy research focuses on security and privacy issues that lead to failures in real systems. Some of the keyoutstanding challenges in this area lie in figuring out why promising theoretical approaches oftentimesdo not translate into effective defenses. Much of my work is concerned with developing formal analysistechniques that provide insight into the problems that might exist in a system, building countermeasuresthat give provable guarantees, and measuring the effectiveness of these solutions in real settings.

Computer Security FacultyVipul Goyal, Associate Professor (CS)vipul@cmu.eduhttp://www.cs.cmu.edu/ goyal/CryptographyI am interested in both theoretical and applied cryptography (and in theoretical computer science ingeneral). I have worked on topics such as blockchains, crypto currencies, zero-knowledge proofs, andattribute-based encryption.Limin Jia, Associate Research Professor r/liminjiaMobility, Privacy Protection, Trustworthy Computing Platforms and DevicesMy research interests are in formal aspects of software security, in particular applying formal logic andlanguage-based approaches to constructing software systems with known security guarantees.Ruben Martins, Systems Scientist (CS)rubenm@cs.cmu.eduhttp://www.cs.cmu.edu/ rubenmhttps://sat-group.github.io/ruben/Constraint Programming, Boolean Satisfiability and Optimization, Software Verification,Program SynthesisThe goal of my research is to improve constraint solvers and broaden their applicability in programanalysis, synthesis, and security. I have developed several award winning MaxSAT solvers that are widelyused in software package upgradeability, computational biology, and course timetabling. My most recentwork focuses on program synthesis for data-science-related tasks. Specifically, I am interested inautomating a variety of cumbersome data preparation tasks and making the life of data scientists simpler.Roy Maxion, Research Professor (CS)maxion@cs.cmu.eduhttp://www.cs.cmu.edu/ aculty/roy-maxionKeystroke forensicsMy research is on keystroke dynamics/forensics, fault/masquerader/insider/intrusion detection,attacker/defender testbed, measurement and experimental methodology, reliable software/user interfaces.

Computer Security FacultyBryan Parno, Associate Professor (CS & -parnoSecurity, Systems, Verification, Applied CryptographyMy research is primarily focused on investigating long-term, fundamental improvements in how to designand build secure systems. My work combines theory and practice to provide formal, rigorous securityguarantees about concrete systems, with an emphasis on creating solid foundations for practicalsolutions. I have worked on topics such as network and system security, applied cryptography, usablesecurity, and data privacy.Frank Pfenning, Professor (CS)fp@cs.cmu.eduhttp://www.cs.cmu.edu/ pfenningProgramming languages, Logic & Type theoryAt the heart of my research lies the desire to understand the principles of programming languages.Programming languages are the key to the programming process and therefore of fundamentalimportance to computer science. Well-designed programming languages allow fast programdevelopment, ease software maintenance, and increase confidence in the correctness ofimplementations.Norman Sadeh, Professor (ISR, CS & HCII)sadeh@cs.cmu.eduwww.normsadeh.orgUsable Security and Privacy, Machine Learning, User Modeling, Natural LanguageProcessing, Crowdsourcing, Intelligent AssistantsMy research interests lie at the intersection of security, privacy, human computer interaction and artificialintelligence. I am currently leading two of the largest national research projects in privacy, namely“the Usable Privacy Policy Project” and the “Personalized Privacy Assistant Project”. These projects focuson helping computers understand the text of privacy policies, discover available privacy settings and learnpeople's privacy preferences to help them configure available settings. In general, I am always looking forthe next research problem to work on. I like problems that are both intellectually challenging and have apractical societal significance.

Computer Security FacultyVyas Sakar, Professor (ECE & CS)vyass@cs.cmu.eduhttp://www.cs.cmu.edu/ s-sekarNetworking & SecurityMy research spans networking, security, and systems. This includes work on: design and management ofnetwork appliances or “middleboxes”, various aspects of network and systems security, content/videodelivery systems, and network monitoring and measurement.Elaine Shi Associate Professor (CS & cs.cmu.edu/people/faculty/elaine-shiCryptography, algorithms, distributed systemsI am broadly interested in cryptography, algorithms, and distributed systems. I've also worked oncreating a mathematical foundation for decentralized blockchains, and using programming languagetechniques to make it easier to program cryptographic systems.Dimitrios Skarlatos, Assisstant Professor (CS & ECE)dskarlat@cs.cmu.eduhttp://www.cs.cmu.edu/ dskarlat/Computer Architecture, Operating Systems, SecurityMy research bridges computer architecture and operating systems focusing on performance and security. My workfollows two central themes: (a) uncovering security vulnerabilities and building defenses at the boundary betweenhardware and OS, and (b) re-designing abstractions and interfaces between the two layers to improveperformance and scalability.

Computer Architecture, Operating Systems, Security My research bridges computer architecture and operating systems focusing on performance and security. My work follows two central themes: (a) uncovering security vulnerabilities and building defenses at the boundary between

Related Documents:

August 1, 2019 TO: All Faculty and Staff FROM: Danny Weathers, Faculty Senate President Mary E. Kurz, Faculty Manual Consultant SUBJECT: Clemson University Faculty Manual, August 1, 2019 (v1) The Faculty Manual for the term August 1, 2019 - July 31, 2020 version 1 is being distributed via the web. For the most recent and updated version of the Faculty Manual, please visit the Faculty Senate .

203 FACULTY CODE OF CONDUCT 14 204 RECRUITING & SELECTING NEW FACULTY 15 204.1 Recruiting and Selecting Full-Time Faculty 15 204.2 Recruiting and Selecting Part-Time Faculty 17 205 FACULTY RECORDS 17 206 EVALUATION, TENURE, PROMOTION AND MERIT – NORTH CAMPUS FACULTY 17 206.1 F

3 FACULTY DIRECTORY The Faculty Directory provides information such as the office number and email address of faculty. 1. Under Campus Info, click Faculty Directory in the left-hand menu. 2. Use the alphabetical index to search for faculty members by their last name or use the Faculty Search box at the right of the p

3 CONTENTS Notation 10 Preface 12 About the Author 18 PART ONE: BACKGROUND 19 Chapter 1 Computer and Network Security Concepts 19 1.1 Computer Security Concepts 21 1.2 The OSI Security Architecture 26 1.3 Security Attacks 27 1.4 Security Services 29 1.5 Security Mechanisms 32 1.6 Fundamental Security Design Principles 34 1.7 Attack Surfaces and Attack Trees 37

CSI/FBI 2000 Computer Crime and Security Survey Source: Computer Security Institute Source: CBI/FBI 1999 Computer Crime and Security Survey For 273 companies reporting 1997 100,119,555 1998 123,779,000 1999 265,589,000 National total in 2000 may exceed 10,000,000,000 The Cost of Computer Crime Continues to Grow

2 Understanding Computer Network Security 43 2.1 Introduction 43 2.1.1 Computer Security 44 2.1.2 Network Security 45 2.1.3 Information Security 45 2.2 Securing the Computer Network 45 2.2.1 Hardware 46 2.2.2 Software 46 2.3 Forms of Protection 46 2.3.1 Access Control 46 2.3.2 Authentication 48 2.3.3 Confidentiality 48 2.3.4 Integrity 49

3 CONTENTS Notation 10 Preface 12 About the Author 18 PART ONE: BACKGROUND 19 Chapter 1 Computer and Network Security Concepts 19 1.1 Computer Security Concepts 21 1.2 The OSI Security Architecture 26 1.3 Security Attacks 27 1.4 Security Services 29 1.5 Security Mechanisms 32 1.6 Fundamental Security Des

FRANCIS MARION UNIVERSITY FACULTY HANDBOOK . TABLE OF CONTENTS . ADMINISTRATIVE ORGANIZATION 1 . President’s Senior Staff 1 Selection, Evaluation, and Retention of Academic Administrators 1 . FACULTY ORGANIZATION 2 . Academic Divisions 2 . Faculty Administrative Staff 2 . Membership of the Faculty 2 . Voting Faculty Members 3 . Graduate .