Selected Publications

Recent Publications

Recent Posts

Mentoring

I have mentored students via internships, fellowship programs, and as Ph.D.-committee member.

  • 2017: Abhinav Agarwal (UNM)
    summer intern at Visa Research

  • 2017: Man-Ki Yoon (UIUC)
    Ph.D. committee
    Topic: Secure and Dependable Cyber-physical System Architectures

  • 2016–2017: Utsav Banerjee, Chiraag Juvekar (MIT)
    Qualcomm Innovation Fellowship 2016 winners
    Topic: Hardware Acceleration for Mobile Computing on Encrypted Data

  • 2016: Drew Davidson (University of Wisconsin – Madison)
    Ph.D. committee
    Topic: Enhancing Mobile Security and Privacy through App Splitting

  • 2016: Ahmet Buyyukayhan (NEU)
    summer intern at Qualcomm Research Silicon Valley

  • 2015: Rui Han (UMiami)
    Ph.D. committee

  • 2015: Mikhail Kazdagli (UT Austin)
    summer intern at Qualcomm Research Silicon Valley

  • 2014: Man-Ki Yoon (UIUC)
    summer intern at Qualcomm Research Silicon Valley

  • 2013–2014: Fardin Abdi, Man-Ki Yoon (UIUC)
    Qualcomm Innovation Fellowship 2013 winners
    Topic: Behavior Pattern Inspection: A New Approach for Securing Real-Time Embedded Systems

  • 2013: David J. Fiala (NCSU)
    summer intern at Qualcomm Research Silicon Valley

  • 2012: Gianluca Stringhini (UCSB)
    visiting researcher at IBM T.J. Watson Research

  • 2012: Andrew White (UNC)
    summer intern at IBM T.J. Watson Research

  • 2011: Dmytro Korzhyk (Duke)
    summer intern at IBM T.J. Watson Research

  • 2010: Drew Davidson (University of Wisconsin – Madison)
    summer intern at IBM T.J. Watson Research

  • 2009: Richard Chang (UT Austin)
    summer intern at IBM T.J. Watson Research

  • 2008: Najwa Aaraj (Princeton)
    summer intern at IBM T.J. Watson Research

  • 2008: Matt Fredrikson (University of Wisconsin – Madison)
    summer intern at IBM T.J. Watson Research

Service

Organizer

  • International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS): 2014, 2015.
  • IBM Student Workshop for Frontiers of Cloud Computing (F2C2), 2011, Hawthorne, NY, USA.
  • IBM Student Workshop for Frontiers of Cloud Computing (F2C2), 2010, Hawthorne, NY, USA.
  • IBM Research–Princeton University Security & Privacy Day, 2007, Princeton, NJ, USA. Program Committee Member

Conference Program Committee Member

  • ACM Cloud Computing Security Workshop (CCSW): 2010, 2011, 2012, 2016. ACM Conference on Computer and Communications Security (CCS): 2008, 2009, 2010, 2012.
  • ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM): 2014, 2016.
  • ACM CCS Workshop on Recurring Malcode (WORM): 2007.
  • ACM International Workshop on IoT Privacy, Trust, and Security (IoTPTS): 2015, 2016, 2017.
  • ACM Symposium on Information, Computer and Communications Security (ASIACCS): 2012, 2016.
  • Annual Computer Security Applications Conference (ACSAC): 2012, 2017.
  • Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS): 2011, 2012.
  • Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA): 2012.
  • Conference on Principles of Security and Trust (POST): 2013.
  • European Workshop on System Security (EuroSec): 2010, 2011, 2012.
  • International Conference on Information Systems Security (ICISS): 2010, 2011.
  • IEEE International Conference on Communications’ Communications and Information System Security Symposium (IEEE ICC CISS): 2009, 2011.
  • IEEE International Conference on Communications’ Information and Network Security (IEEE ICC INS): 2008.
  • IFIP International Information Security Conference (IFIP SEC): 2010.
  • Innovations in Mobile Privacy and Security workshop (IMPS): 2016, 2017.
  • International Conference on Malicious and Unwanted Software (Malware): 2008, 2011.
  • International Conference on Security and Privacy in Communication Networks (SECURECOMM): 2011, 2012.
  • International Symposium on Recent Advances in Intrusion Detection (RAID): 2009, 2010, 2012, 2017.
  • International Workshop on Secure Internet of Things (SIoT): 2015.
  • International Workshop on Software Engineering for Secure Systems (SESS): 2008, 2009, 2010, 2011, 2012.
  • Mobile Security Technologies Workshop (MoST): 2015, 2016, 2017.
  • Network & Distributed System Security Symposium (NDSS): 2009, 2010, 2011, 2014.
  • International Conference on Security and Privacy in Communication Networks (SECURECOMM): 2015.
  • USENIX Annual Technical Conference (USENIX ATC): 2017.
  • USENIX Security Symposium (USENIX Sec): 2012.
  • USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET): 2012.
  • Web 2.0 Security & Privacy Workshop (W2SP): 2013.
  • Workshop on Program Protection and Reverse Engineering (PPREW): 2012, 2014, 2015.

External Reviewer

Journals

  • ACM Computing Surveys: 2015, 2016.
  • ACM SIGOPS Operating Systems Review (OSR): 2008.
  • ACM Transactions on Information and System Security (TISSEC): 2007, 2010.
  • ACM Transactions on Internet Technology (TOIT): 2004.
  • Communications of the ACM (CACM): 2005 (issue on spyware), 2011.
  • Computer Journal: 2011.
  • Engineering Applications of Artificial Intelligence: 2014.
  • IEEE Micro: 2014.
  • IEEE Transactions of Cloud Computing (TCC): 2014.
  • IEEE Transactions on Information Forensics and Security (TIFS): 2009, 2011, 2015.
  • IEEE Transactions on Dependable and Secure Computing (TDSC): 2010, 2013.
  • IEEE Transactions on Knowledge and Data Engineering (TKDE): 2009.
  • IEEE/ACM Transactions on Networking (ToN): 2009.
  • Journal of Computer Security (JCS): 2006, 2009.

Conferences

  • ACM Conference on Computer and Communication Security (CCS): 2005, 2006, 2014.
  • ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices
  • (SPSM): 2013.
  • Annual Computer Security Applications Conference (ACSAC): 2006, 2008.
  • Computer Security Foundations Workshop/Symposium (CSF): 2008.
  • European Symposium on Research in Computer Security (ESORICS): 2009.
  • Foundations of Computer Security Workshop (FCS): 2001.
  • IEEE/IFIP International Conference on Dependable Systems and Networks (DSN): 2011.
  • IEEE/IFIP Network Operations and Management Symposium (NOMS): 2012.
  • IEEE International Conference on Communications’ Information and Network Security
  • (IEEE ICC INS): 2008.
  • IEEE Security & Privacy Symposium (“Oakland”): 2009, 2012.
  • International World Wide Web Conference (WWW): 2005.
  • International Conference on Computer Aided Verification (CAV): 2005.
  • LCI International Conference on Clusters: 2006.
  • Mobile Security Technologies Workshop (MoST): 2014.
  • Network and Distributed System Security Symposium (NDSS): 2005, 2007.
  • Recent Advances in Intrusion Detection (RAID): 2005, 2009.
  • Software Engineering for Secure Systems (SESS): 2005.
  • Symposium on Requirements Engineering for Information Security (SREIS): 2002.
  • USENIX Annual Technical Conference: 2004.
  • USENIX Security Symposium: 2005, 2006, 2008, 2009, 2010.
  • Workshop on Rapid Malcode (WORM): 2005.

Contact