Phone: La Jolla, CA Website:

Size: px
Start display at page:

Download "Phone: La Jolla, CA Website:"

Transcription

1 Damon Liwanu McCoy CSE Gillman Dr. Phone: La Jolla, CA Website: Education Ph.D. in Computer Science, University of Colorado, Boulder December 2009 Thesis Topic: Quantifying and Improving Wireless Privacy Co-Advisors: Douglas Sicker and Dirk Grunwald M.S. in Computer Science, University of Colorado, Boulder December 2006 B.S. in Computer Science, University of Colorado, Boulder May 1999 Research Interests network security, low latency anonymous networks, cyber-physical systems security, applied cryptography, e-crime, wireless security and privacy, distributed systems security. Publications Summary: 3 in tier 1 security conferences (2 USENIX Security, 1 IEEE Oakland) 2 in tier 1 systems conferences (2 ACM Mobisys) 4 in other systems/privacy conferences (PETS, Globecom) 1 in tier 1 security workshop (WPES) 1 in tier 1 systems workshop (HotNets) 4 in other systems/security workshops (WIFS, WIDA,...) Journal Publications Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Damon McCoy, Srinivasan Seshan. Wifi-Reports: Improving Wireless Network Selection with Collaboration. In IEEE Transactions On Mobile Computing, Vol Conference Publications Harold Gonzales, Kevin Bauer, Janne Lindqvist, Damon McCoy, Douglas Sicker. Practical Defenses for Evil Twin Attacks in To appear at IEEE Globecom Communications and Information Security Symposium Miami, FL, December [35.8% acceptance rate] Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage. Re: CAPTCHAs Understanding CAPTCHA Solving from an Economic Context. In Proceedings of the USENIX Security Symposium, 2010 Washington, D.C. [16% acceptance rate] Page 1

2 Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage. Experimental Security Analysis of a Modern Automobile. In Proceedings of the IEEE Symposium and Security and Privacy (Oakland), 2010, Oakland, CA. [12% acceptance rate] Kevin Bauer, Damon McCoy, Markus Breitenbach, Greg Grudic, Dirk Grunwald, Douglas Sicker. The Directional Attack on Wireless Localization - or - How to Spoof your Location with a Tin Can. In Proceedings of the IEEE Globecom 2009 Communications and Information Security Symposium (GLOBECOM), 2009, Honolulu, HI. [34.8% acceptance rate] Kevin Bauer, Damon McCoy, Ben Greenstein, Dirk Grunwald, Douglas Sicker. Physical Layer Attacks on Unlinkability in Wireless LANs. In Proceedings of the 9th Privacy Enhancing Technologies Symposium (PETS), 2009, Seattle, WA. [29% acceptance rate] Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Damon McCoy, Srinivasan Seshan. Wifi-Reports: Improving Wireless Network Selection with Collaboration. In ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), 2009, Krakòw, Poland. [20% acceptance rate] Damon McCoy, Kevin Bauer, Dirk Grunwald, Tadayoshi Kohno, and Douglas Sicker. Shining Light in Dark Places: Understanding the Tor Network. In Proceedings of the 8th Privacy Enhancing Technologies Symposium (PETS), 2008, Leuven, Belgium. [26% acceptance rate] Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayoshi Kohno, Srinivasan Seshan, and David Wetherall. Improving Wireless Privacy with an Identifier-Free Link Layer Protocol. In ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), 2008, Breckenridge, CO. Best Paper Award. [18% acceptance rate] Jason Franklin, Damon McCoy, Parisa Tabriz, Vicentiu Neagoe, Jamie Van Randwyk, Douglas Sicker. Passive Data Link Layer Wireless Device Driver Fingerprinting. In Proceedings of the 15th USENIX Security Symposium (Security), 2006 Vancouver, BC, Canada. [13% acceptance rate] Workshop Publications Kevin Bauer, Damon McCoy, Dirk Grunwald, Douglas Sicker. BitStalker: Accurately and Efficiently Monitoring BitTorrent Traffic. In proceedings of the 1st IEEE Workshop on Information Forensics and Security (WIFS), 2009 London, United Kingdom. [30% acceptance rate] Kevin Bauer, Harold Gonzales, and Damon McCoy. Mitigating Evil Twin Attacks in In Proceedings of 1st IEEE International Workshop on Information and Data Assurance (WIDA), 2009, Austin, TX. [32% acceptance rate] Kevin Bauer, Damon McCoy, Douglas Sicker, and Dirk Grunwald BitBlender: Light-Weight Anonymity for BitTorrent. In Proceedings of the Workshop on Applications of Private and Anonymous Communications Istanbul (Alpaca), 2008, Turkey. Jeffrey Pang, Ben Greenstein, Damon McCoy, Srinivasan Seshan, and David Wetherall. Tryst: The Case for Confidential Service Discovery. In ACM SIGCOMM Workshop on Hot Topics in Networks (HotNets), 2007, Atlanta, GA. [18% acceptance rate] Kevin Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, and Douglas Sicker. Low-Resource Routing Attacks Against Tor. In Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES), 2007, Alexandria, VA. [19% acceptance rate for full papers] Damon McCoy, Douglas Sicker, Dirk Grunwald. A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks. In IEEE SECON Workshop on Software Defined Radios (SDR), 2007, San Diego, CA. Selected Talks Page 2

3 On the Optimal Path Length for Tor. In Hot Privacy Enhancing Technologies Symposium (HotPETS). Berlin, Germany Never Limit Yourself. Cove High School Graduation, Illinois Quantifying and Improving Wireless Privacy. In ACM MobiSys PhD Forum, Krakòw, Poland Performing Traffic Analysis on a Wireless Identified-Free Link Layer. In Tapia Celebration of Diversity in Computing, Portland, OR Using Wireless Physical Layer Information to Construct Implicit Identifiers. In Hot Privacy Enhancing Technologies Symposium (HotPETS). Leuven, Belgium Anonymity for BitTorrent. ToorCon, San Diego, CA Zulu a Command Line Wireless Frame Generator. DefCon, Las Vegas, NV Passive Data Link Layer Wireless Device Driver Fingerprinting. USENIX Security, Vancouver, BC, Canada A Recommendation for the Use of i within Sandia National Laboratories enterprise wireless network. Sandia National Laboratories 2005 Selected Articles and Reports Jamie Van Randwyk, et al.. Intrusion Detection and Monitoring for Wireless Networks. Sandia National Laboratories Technical Report SAND , 2005 Marc Miller, Jamie Van Randwyk, Damon McCoy, Mark Lodato. A Recommendation for the Use of i within Sandia National Laboratories enterprise wireless network. White paper, Sandia National Laboratories, 2005 Thesis Damon McCoy. Quantifying and Improving Wireless Privacy. Ph.D. dissertation, University of Colorado at Boulder, December 2009 Damon McCoy. Anonymity Analysis of Freenet. M.S. thesis, University of Colorado at Boulder, December 2006 Employment History Post-Doc, University of California at San Diego, Jan Present Staff, University of California at San Diego, Sept-Dec 2009 Research Intern, University of Washington/Intel Research, Summer 2007 Graduate Research Assistant, University of Colorado, Boulder, Aug May 2008 Research Intern, Sandia National Labs, Summers 2004 and 2005 Network Security Consultant, IBM, July August 2000 Research Intern, AT&T Research, Summer 1998 Research Intern, Lucent Bell Labs, Summer 1997 Page 3

4 Teaching Assistant, Washington Summer Scholars (high school honors and diversity program), Department of Computer Science and Engineering, University of Washington, (Instructor: Prof. Yoshi Kohno) July 2007 Workshop Leader and Tutor, computer science and math courses, Minority Engineering Program, University of Colorado at Boulder, Fall Spring 2006 Teaching Assistant, Networking (CSCI 4273/5273) Dept. of Computer Science, University of Colorado at Boulder, (Instructor: Prof. Rick Han) Fall 2004 Teaching Assistant, Data Structures (CSCI 2270) Dept. of Computer Science, University of Colorado at Boulder, (Instructor: Dr. Karl Winklmann) Fall 2003 and Spring 2004 Instructor, Introduction to Computer Science, Minority Engineering Program Summer Bridge Program, University of Colorado at Boulder, Summer 1996 Awards Fellowship: CRA/NFS Computing Innovation Fellow 2009,2010 Best Paper Award: MobiSys, 2008 Best Presentation Award: PhD Forum on Mobile Systems, Applications, and Services, 2009 Post Awards: Tapia, 2008 (Third place), MGEMSA, 2007 (First Place) Travel Awards: Privacy Enhancing Technologies Symposium (2007,2008,2009 Sponsored by Microsoft), ACM Richard Tapia Celebration of Diversity in Computing Conference 2009, Coalition to Diversify Computing (CDC) Travel Grant for ACM MobiSys 2009, American Indian Science & Engineering Society (AISES) National Conference 2009 (Sponsored by Google) Professional Activities General Co-Chair ACM MobiSys PhD Forums Workshop (2010) Program Committees Privacy Enhancing Technologies Symposium (PETS 2011) External Reviews Page 4

5 Journals: IEEE Transactions on Parallel and Distributed Systems (2010) Conferences: USENIX Security (2007, 2008), IEEE Security and Privacy (2007, 2008), ACM MobiCom (2008), ACM CCS (2008), ACM Mobisys (2009), NDSS (2010), Privacy Enhancing Technologies Symposium (PETS 2010), IEEE InfoCom (2011) Workshops: ACM Workshop on Wireless Security (2006), Workshop on Mobile Computing Systems and Applications (HotMobile 2008) Member ACM, American Indian Science & Engineering Society (AISES), Cherokee Nation, IEEE, USENIX Page 5

Computer Security and the Internet of Things

Computer Security and the Internet of Things Computer Security and the Internet of Things Tadayoshi Kohno Computer Science & Engineering University of Washington At USENIX Enigma, January 2016 The Internet of Things Door Locks Thermostats Furnaces

More information

Research Staff, International Computer Science Institute

Research Staff, International Computer Science Institute Damon Liwanu McCoy New York University Department of Computer Science and Engineering +1 720-810-3076 mccoy@nyu.edu http:// www. damonmccoy. com/ Research Interests My primary research interests are in

More information

Some example UW security lab projects, related to emerging technologies. Tadayoshi Kohno CSE 484, University of Washington

Some example UW security lab projects, related to emerging technologies. Tadayoshi Kohno CSE 484, University of Washington Some example UW security lab projects, related to emerging technologies Tadayoshi Kohno CSE 484, University of Washington Wireless Implantable Medical Devices Computation and wireless capabilities lead

More information

Experimental Security Analysis of a Modern Automobile

Experimental Security Analysis of a Modern Automobile Experimental Security Analysis of a Modern Automobile Matthias Lange TU Berlin June 29th, 2010 Matthias Lange (TU Berlin) Experimental Security Analysis of a Modern Automobile June 29th, 2010 1 / 16 Paper

More information

Security Analysis of modern Automobile

Security Analysis of modern Automobile Security Analysis of modern Automobile Dixit Verma Department of Electrical & Computer Engineering Missouri University of Science and Technology dv6cb@mst.edu 20 Apr 2017 Outline Introduction Attack Surfaces

More information

User Fingerprinting

User Fingerprinting A Report on 802.11 User Fingerprinting - Authors - Jeffrey Pang, Carnegie Mellon Univ Ben Greenstein, Intel Corp (Seattle) Ramakrishna Gummadi, Univ of So Cal Srinivasan Seshan, Carnegie Mellon Univ David

More information

Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego

Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego Steve Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage (UCSD) Karl Koscher,

More information

Dr. Ahmed K. Sadek 2. Experience

Dr. Ahmed K. Sadek 2. Experience Dr. Ahmed K. Sadek Education University of Maryland, College Park Ph.D. in Electrical and Computer Engineering, GPA = 4.0/4.0, May 2007 Thesis title: Cross-Layer Design for Cooperative Communications and

More information

Wireless Communications, Information Theory, Physical Layer Security, Cyber Security for Smart Grid, Cryptography, Network Coding.

Wireless Communications, Information Theory, Physical Layer Security, Cyber Security for Smart Grid, Cryptography, Network Coding. Mustafa El-Halabi Contact Information Fleifel Building Cell Phone: + (979) 422 4585 Mathaf E-mail: mhalabi@aust.edu.lb Beirut, Lebanon Webpage: https://mustafa-halabi.appspot.com/ Research Interests Education

More information

Ranveer Chandra. Computer Networks, Mobile Computing, Distributed Systems, Sensor Networks, Pervasive Computing

Ranveer Chandra. Computer Networks, Mobile Computing, Distributed Systems, Sensor Networks, Pervasive Computing 4110 Upson Hall Department of Computer Science http://www.cs.cornell.edu/people/ranveer Ranveer Chandra Phone: (607) 592-2274 (cell) (607) 255-9196 (office) Fax : (607) 255-4428 E-mail: ranveer@cs.cornell.edu

More information

Brian F. Cooper. Distributed systems, digital libraries, and database systems

Brian F. Cooper. Distributed systems, digital libraries, and database systems Brian F. Cooper Home Office Internet 2240 Homestead Ct. #206 Stanford University cooperb@stanford.edu Los Altos, CA 94024 Gates 424 http://www.stanford.edu/~cooperb/app/ (408) 730-5543 Stanford, CA 94305

More information

CE Advanced Network Security Anonymity II

CE Advanced Network Security Anonymity II CE 817 - Advanced Network Security Anonymity II Lecture 19 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained

More information

Automotive Intrusion Detection Based on Constant CAN Message Frequencies Across Vehicle Driving Modes

Automotive Intrusion Detection Based on Constant CAN Message Frequencies Across Vehicle Driving Modes Automotive Intrusion Detection Based on Constant CAN Message Frequencies Across Vehicle Driving Modes Clinton Young Iowa State University Department of Electrical and Computer Engineering cwyoung@iastate.edu

More information

John Clements Department of Computer Science Cal Poly State University 1 Grand Street San Luis Obispo, CA (805)

John Clements Department of Computer Science Cal Poly State University 1 Grand Street San Luis Obispo, CA (805) Curriculum Vitae Contact Information Education John Clements Department of Computer Science Cal Poly State University 1 Grand Street San Luis Obispo, CA 93407 (805)756-6528 clements@brinckerhoff.org 2005

More information

Imani Palmer ipalmer2.web.engr.illinois.edu

Imani Palmer ipalmer2.web.engr.illinois.edu Imani Palmer ipalmer2@illinois.edu ipalmer2.web.engr.illinois.edu 240.676.7741 Research Interest Education Cyber Security, System Security, Real-Time Streaming Engines, Data Analysis University of Illinois

More information

Jun Li, Ph.D. School of Computing and Information Sciences Phone:

Jun Li, Ph.D. School of Computing and Information Sciences Phone: Jun Li, Ph.D. School of Computing and Information Sciences Phone: + 1-305-348-4964 Florida International University Email: junli @ cs. fiu. edu 11200 SW 8th St, ECS 380, Miami, FL 33199 Web: http://users.cs.fiu.edu/

More information

PhD coursework at Fox College of Business, Temple University, Philadelphia, PA Concentration: Information Systems (GPA: 3.9/4.

PhD coursework at Fox College of Business, Temple University, Philadelphia, PA Concentration: Information Systems (GPA: 3.9/4. Rui Z. Sundrup Doctoral Candidate Department of Operations, Business Analytics and Information Systems Carl H. Lindner College of Business University of Cincinnati, Cincinnati, OH 45221 2925 Campus Green

More information

TEXAS STATE VITA. A. Name: David L. Gibbs Title: Assistant Professor

TEXAS STATE VITA. A. Name: David L. Gibbs Title: Assistant Professor TEXAS STATE VITA I. Academic/Professional Background A. Name: David L. Gibbs Title: Assistant Professor B. Educational Background Degree Year University Major Thesis/Dissertation PhD 2015 Texas State University

More information

West Bengal University of Technology Bachelor of Computer Science and Engineering

West Bengal University of Technology Bachelor of Computer Science and Engineering Susmit Shannigrahi Colorado State University Computer Science Department 1100 Center Avenue Mall, Fort Collins, CO, 80521 Phone: (+1) 740.346.9028 susmit@colostate.edu https://susm.it Education Colorado

More information

Matthew Patrick Sopha Clinical Assistant Professor Department of Information Systems, W. P. Carey School of Business, Arizona State University

Matthew Patrick Sopha Clinical Assistant Professor Department of Information Systems, W. P. Carey School of Business, Arizona State University Matthew Patrick Sopha Clinical Assistant Professor Department of Information Systems, W. P. Carey School of Business, Office: BA 320A E-mail (Work): msopha@asu.edu W. P. Carey School of Business Phone

More information

Joe Michael Kniss December 2005

Joe Michael Kniss December 2005 Joe Michael Kniss December 2005 Research Interests 50 S. Central Campus Dr. MEB 3490 Salt Lake City, UT, 84112 jmk@sci.utah.edu Phone: 801-898-7977 http://www.cs.utah.edu/ jmk I am currently conducting

More information

J. Haadi Jafarian CV June J. Haadi Jafarian

J. Haadi Jafarian CV June J. Haadi Jafarian J. Haadi Jafarian Assistant Professor Dept. of Computer Science and Engineering University of Colorado Denver 704-408-3264 haadi.jafarian@ucdenver.edu EDUCATION Ph.D. 2017 University of North Carolina

More information

Tor Experimentation Tools

Tor Experimentation Tools Tor Experimentation Tools Fatemeh Shirazi TU Darmstadt / KU Leuven Darmstadt, Germany fshirazi@cdc.informatik.tu-darmstadt.de Matthias Göhring TU Darmstadt Darmstadt, Germany de.m.goehring@ieee.org Claudia

More information

Toward Improving Path Selection in Tor

Toward Improving Path Selection in Tor Toward Improving Path Selection in Tor Fallon Chen Department of Computer Science and Engineering University of California, San Diego La Jolla, CA 203-00 Email: ftchen@cs.ucsd.edu Joseph Pasquale Department

More information

Collaborative Next Generation Networking

Collaborative Next Generation Networking CALL-FOR-PAPERS ACM/Springer Mobile Networks & Applications (MONET) http://link.springer.com/journal/11036 SPECIAL ISSUE ON Collaborative Next Generation Networking Overview: To catch up with the ever-increasing

More information

North Dakota State University Fargo, ND Ph.D. in Software Engineering Emphasis area: Security Requirements Engineering

North Dakota State University Fargo, ND Ph.D. in Software Engineering Emphasis area: Security Requirements Engineering Josh Pauli, Ph.D. EDUCATION North Dakota State University Fargo, ND Ph.D. in Software Engineering 2003-2006 Emphasis area: Security Requirements Engineering Dakota State University Madison, SD M.S. in

More information

Dr. Spencer Sevilla Postdoctoral Researcher, University of Washington

Dr. Spencer Sevilla Postdoctoral Researcher, University of Washington Dr. Spencer Sevilla Postdoctoral Researcher, University of Washington email: sevilla@cs.washington.edu Research Interests Computer networks, Host mobility, Web technology, Content caching Education University

More information

2 Approaches to worldwide web information retrieval

2 Approaches to worldwide web information retrieval The WEBFIND tool for finding scientific papers over the worldwide web. Alvaro E. Monge and Charles P. Elkan Department of Computer Science and Engineering University of California, San Diego La Jolla,

More information

Authors. Passive Data Link Layer Wireless Device Driver Fingerprinting. Agenda OVERVIEW. Problems. Device Drivers

Authors. Passive Data Link Layer Wireless Device Driver Fingerprinting. Agenda OVERVIEW. Problems. Device Drivers Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting Presenter: Tyler Sidell April 2, 2008 Authors Jason Franklin, Carnegie Mellon Damon McCoy, University of Colorado Paria Tabriz, University

More information

EDUCATION RESEARCH EXPERIENCE

EDUCATION RESEARCH EXPERIENCE PERSONAL Name: Mais Nijim Gender: Female Address: 901 walkway, apartment A1 Socorro, NM 87801 Email: mais@cs.nmt.edu Phone: (505)517-0150 (505)650-0400 RESEARCH INTEREST Computer Architecture Storage Systems

More information

SANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community.

SANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community. SANS Vendor Events SANS offers a variety of events which bring you in touch with the highly qualified SANS community. SANS National Events over 1200 profession IT Security attendees and over 45 SANS classes

More information

Ph.D. with Distinction in Computer Science Advisor: Prof. Micha Sharir Dissertation: Geometric Arrangements: Substructures and Algorithms

Ph.D. with Distinction in Computer Science Advisor: Prof. Micha Sharir Dissertation: Geometric Arrangements: Substructures and Algorithms April 29, 2009 Esther Ezra phone (919) 660-6578 Levine Science Research Center D340 fax (919) 660-6502 Department of Computer Science, Duke University http://www.math.tau.ac.il/~estere Durham NC 27708

More information

Amir Aminzadeh Gohari

Amir Aminzadeh Gohari Amir Aminzadeh Gohari Contact Information Computer Eng. Phone: (707) 953-2647 E-mail: amirazg@ece.ucsb.edu Santa Barbara, CA 93106 USA Web: http://ece.ucsb.edu/ amirazg Education Sept. 2007 June 2011 Ph.D.,

More information

Sameer Agarwal. Indian Institute of Technology M.Sc. in Mathematics and Scientific Computing.

Sameer Agarwal. Indian Institute of Technology M.Sc. in Mathematics and Scientific Computing. Sameer Agarwal 4759 NE 178 th Street Lake Forest Park, WA 98155 (858) 204-7585 sandwichmaker@gmail.com Education University of California, San Diego 2000 2006 Ph.D. in Computer Science and Engineering.

More information

RESUME WEI LI EDUCATION EMPLOYMENT RESEARCH INTERESTS HONORS AND AWARDS

RESUME WEI LI EDUCATION EMPLOYMENT RESEARCH INTERESTS HONORS AND AWARDS RESUME WEI LI Graduate School of Computer and Information Sciences Nova Southeastern University 3301 College Avenue, Fort Lauderdale-Davie, FL 33314 Office: (954) 262-2068 Fax: (954) 262-3915 Email: lwei@nova.edu

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

No Plan Survives Contact

No Plan Survives Contact No Plan Survives Contact Experience with Cybercrime Measurement Chris Kanich Neha Chachra Damon McCoy Chris Grier David Wang Marti Motoyama Kirill Levchenko Stefan Savage Geoffrey M. Voelker UC San Diego

More information

CAN Bus Risk Analysis Revisit

CAN Bus Risk Analysis Revisit CAN Bus Risk Analysis Revisit Hafizah Mansor, Konstantinos Markantonakis, Keith Mayes To cite this version: Hafizah Mansor, Konstantinos Markantonakis, Keith Mayes. CAN Bus Risk Analysis Revisit. David

More information

HAI ZHOU. Evanston, IL Glenview, IL (847) (o) (847) (h)

HAI ZHOU. Evanston, IL Glenview, IL (847) (o) (847) (h) HAI ZHOU Electrical and Computer Engineering Northwestern University 2535 Happy Hollow Rd. Evanston, IL 60208-3118 Glenview, IL 60025 haizhou@ece.nwu.edu www.ece.nwu.edu/~haizhou (847) 491-4155 (o) (847)

More information

COMPUTER FUNDAMENTAL COMPUTER FUNDAMENTAL. page 1 / 5

COMPUTER FUNDAMENTAL   COMPUTER FUNDAMENTAL. page 1 / 5 page 1 / 5 page 2 / 5 computer fundamental pdf In computer vision, the fundamental matrix is a 3 3 matrix which relates corresponding points in stereo images.in epipolar geometry, with homogeneous image

More information

On the Origins of a Thesis

On the Origins of a Thesis STM 2008 On the Origins of a Thesis Steven J. Murdoch 1 University of Cambridge Computer Laboratory Cambridge, United Kingdom Abstract A PhD thesis typically reads as an idealised narrative: how would

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

Robert A. Robertson Ph.D., CISSP, GCFE, GCFA, GCIA

Robert A. Robertson Ph.D., CISSP, GCFE, GCFA, GCIA Summary Rob began his technical career with Automatic Data Processing (ADP), in their Dealer Service Division. His position at ADP laid the foundation for his passion for finding solutions to business

More information

2007 Doctor of Philosophy(Ph.D.) in Computer Science University of California, San Diego (UCSD)

2007 Doctor of Philosophy(Ph.D.) in Computer Science University of California, San Diego (UCSD) ALPER T. MIZRAK VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94304 Phone: 1 (650) 427-2492 amizrak@vmware.com http://cseweb.ucsd.edu/ amizrak www.linkedin.com/in/alpermizrak Cell: 1 (858) 337-3791 alpermizrak@gmail.com

More information

JOYCE JIYOUNG WHANG EDUCATION

JOYCE JIYOUNG WHANG EDUCATION JOYCE JIYOUNG WHANG Assistant Professor Department of Computer Science and Engineering Sungkyunkwan University (SKKU) Office: Engineering Building 2, #27326 Lab: Engineering Building 2, #26315B (Big Data

More information

INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES

INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES Scientific Journal Impact Factor (SJIF): 1.711 e-issn: 2349-9745 p-issn: 2393-8161 International Journal of Modern Trends in Engineering and Research www.ijmter.com INNOVATIVE AUTOMOBILE SECURITY SYSTEM

More information

CURRICULUM VITAE. June, 2013

CURRICULUM VITAE. June, 2013 CURRICULUM VITAE ד"ר אבי סופר Dr. Avi Soffer June, 2013 ORT Braude College, Department of Software Engineering, P.O. Box 78, Karmiel 2161002, Israel Telephone: +972-4-990-1720 Email: asoffer@braude.ac.il

More information

Amy Babay April 2018

Amy Babay April 2018 Amy Babay www.dsn.jhu.edu/~babay 814-528-4205 babay@cs.jhu.edu Education PhD in Computer Science April 2018 PhD Research: Structured overlay networks for a new generation of Internet services, dependable

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

3715 McClintock Ave, GER 240, Los Angeles, CA 90089

3715 McClintock Ave, GER 240, Los Angeles, CA 90089 Meisam Razaviyayn Contact Information razaviya@usc.edu 3715 McClintock Ave, GER 240, Los Angeles, CA 90089 Homepage Google scholar profile Research Interests Appointments Design and study of efficient

More information

Michael Paul Neff Curriculum Vitae

Michael Paul Neff Curriculum Vitae Michael Paul Neff Curriculum Vitae ACADEMIC HISTORY... Assistant Professor (tenure track), University of California, Davis, 2006-. Cross-appointed to the Department of Computer Science and the Program

More information

Practical Defenses for Evil Twin Attacks in

Practical Defenses for Evil Twin Attacks in Practical Defenses for Evil Twin Attacks in 82. Harold Gonzales,KevinBauer, Janne Lindqvist,DamonMcCoy, Douglas Sicker University of Colorado Carnegie Mellon University University of California San Diego

More information

University of Tartu. Research Seminar in Cryptography. Car Security. Supervisor: Dominique Unruh. Author: Tiina Turban

University of Tartu. Research Seminar in Cryptography. Car Security. Supervisor: Dominique Unruh. Author: Tiina Turban University of Tartu Research Seminar in Cryptography Car Security Author: Tiina Turban Supervisor: Dominique Unruh December 16, 2013 1 Introduction Cars these days are becoming more and more computerized.

More information

NEC Labs America, Princeton, NJ

NEC Labs America, Princeton, NJ Jie XIONG School of Information Systems Singapore Management University Jie XIONG jxiong@smuedusg Office Phone: 6828 9094 Date of CV revision: Citizenship: Singaporean Education 2010-2015 PhD in Computer

More information

TRINABH GUPTA. Thesis advisor: Prof. Anirban Mahanti

TRINABH GUPTA. Thesis advisor: Prof. Anirban Mahanti TRINABH GUPTA g.trinabh@gmail.com http://cs.utexas.edu/users/trinabh 14820 NE 36th Street, Building 99, Redmond, WA 98052 RESEARCH INTERESTS Computer systems, security, and privacy EDUCATION 8/2011 8/2017

More information

This document/guide contains dated material; always check the ASMC website for the most recent information, policies, and other information.

This document/guide contains dated material; always check the ASMC website for the most recent information, policies, and other information. December 2010 CDFM OVERVIEW The American Society of Military Comptrollers offers the Certified Defense Financial Manager (CDFM) program to those persons desiring to demonstrate proficiency in the core

More information

Collaboration on Cybersecurity program between California University and Shippensburg University

Collaboration on Cybersecurity program between California University and Shippensburg University Collaboration on Cybersecurity program between California University and Shippensburg University Weifeng Chen Dept. of Math, Computer Science and Information Systems California University, California,

More information

J I N G H A I R A O. Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213

J I N G H A I R A O. Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213 J I N G H A I R A O Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213 Office: +1 412 268 1357 Fax: +1 412 268 7287 Mobile: +1 412

More information

Extension theorems in vector spaces over finite fields Dr. Alex Iosevich. Journal reviewer for International Mathematics Research Notices.

Extension theorems in vector spaces over finite fields Dr. Alex Iosevich. Journal reviewer for International Mathematics Research Notices. Doowon Koh T (517) 353-6882 B koh@math.msu.edu Education Aug.2003 Dec.2008 Dissertation Dissertation Supervisor Mar.1998 Feb.2000 Thesis Advisor Mar.1991 Feb.1998 Feb.1993 Apr.1995 Ph.D in Mathematics,

More information

Monthly Meeting September 28, 2016

Monthly Meeting September 28, 2016 Monthly Meeting September 28, 2016 Agenda / Announcements Welcome to Parsons, 7110 Samuel Morse Drive, Suite 200 Columbia, Maryland 21046 Non-U.S. Citizen Requirements Any guests or new members in attendance?

More information

Web Security Vulnerabilities: Challenges and Solutions

Web Security Vulnerabilities: Challenges and Solutions Web Security Vulnerabilities: Challenges and Solutions A Tutorial Proposal for ACM SAC 2018 by Dr. Hossain Shahriar Department of Information Technology Kennesaw State University Kennesaw, GA 30144, USA

More information

University of Texas Administration Building Room Guadalupe Street Austin, TX Phone: (479)

University of Texas Administration Building Room Guadalupe Street Austin, TX Phone: (479) Islam Akef Ebeid University of Texas Administration Building Room 5.556 http://www.i3akef.com School of Information https://www.linkedin.com/in/i3akef University of Texas at Austin islam.akef@gmail.com

More information

SANS Vendor Offerings Detail

SANS Vendor Offerings Detail SANS Vendor Offerings Detail After working with SANS for a few years now, the audience at SANS events and webinars continues to represent some of the most forward thinking IT security practitioners looking

More information

Embedded Automotive Systems Security:

Embedded Automotive Systems Security: The 3 rd International Workshop on Safety and Security of Intelligent Vehicles (SSIV) June 26, 2017 Embedded Automotive Systems Security: A language-based Intrusion Detection Approach Mohamed Kaâniche

More information

IEEE Communications Society TECHNICAL COMMITTEE ON Communications Quality & Reliability

IEEE Communications Society TECHNICAL COMMITTEE ON Communications Quality & Reliability IEEE Communications Society TECHNICAL COMMITTEE ON Communications Quality & Reliability http://committees.comsoc.org/cqr/ Committee Meeting Hiromi Ueda, CQR Chair Tuesday, May 10, 2011 CQR 2011, Naples,

More information

Call for Papers for Communication QoS, Reliability and Modeling Symposium

Call for Papers for Communication QoS, Reliability and Modeling Symposium Call for Papers for Communication QoS, Reliability and Modeling Symposium Scope and Motivation: In modern communication networks, different technologies need to cooperate with each other for end-to-end

More information

IEEE Data Storage Technical Committee Update. Bane Vasić Chair, IEEE Data Storage Technical Committee

IEEE Data Storage Technical Committee Update. Bane Vasić Chair, IEEE Data Storage Technical Committee 1 IEEE Data Storage Technical Committee Update Bane Vasić Chair, IEEE Data Storage Technical Committee Agenda! Committee Mission! Updates on conference support from DSTC: Globecom 2014, Austin, Texas -

More information

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR FACULTY PROFILE Name Designation Email ID : NISHA SOMS : ASSISTANT PROFESSOR (SENIOR GRADE) : nishasoms.cse@srit.org Area of Specialization : Wireless Ad Hoc Networks, Mobile Computing Cryptography and

More information

CALIFORNIA CYBERSECURITY TASK FORCE

CALIFORNIA CYBERSECURITY TASK FORCE CALIFORNIA CYBERSECURITY TASK FORCE Advancing California s cybersecurity priorities through public, private, corporate, and academic sector collaboration. Agenda Task Force Overview California Cybersecurity

More information

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Please consult the Department of Engineering about the Computer Engineering Emphasis. COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals

More information

Shining Light in Dark Places: Understanding the Tor Network

Shining Light in Dark Places: Understanding the Tor Network Shining Light in Dark Places: Understanding the Tor Network Damon McCoy 1,KevinBauer 1,DirkGrunwald 1, Tadayoshi Kohno 2, and Douglas Sicker 1 1 Department of Computer Science, University of Colorado,

More information

BITSTALKER: ACCURATELY AND EFFICIENTLY MONITORING BITTORRENT TRAFFIC

BITSTALKER: ACCURATELY AND EFFICIENTLY MONITORING BITTORRENT TRAFFIC BITSTALKER: ACCURATELY AND EFFICIENTLY MONITORING BITTORRENT TRAFFIC Kevin Bauer, Damon McCoy, Dirk Grunwald, and Douglas Sicker University of Colorado, Boulder, CO, USA {bauerk, mccoyd, grunwald, sicker}@colorado.edu

More information

2016 CMU First Destination Outcomes

2016 CMU First Destination Outcomes 06 CMU First Destination Outcomes College of Engineering: Information Networking Master of Science Information Security Employed 3 5 Total Graduates Salaries* Average = $ 07,570 Median = $,500 Range =

More information

Computer Science and Engineering Ira A. Fulton Schools of Engineering

Computer Science and Engineering Ira A. Fulton Schools of Engineering DEJUN YANG Computer Science and Engineering Ira A. Fulton Schools of Engineering 480-252-4741 Arizona State University dejun.yang@asu.edu Tempe, Arizona 85281 http://www.public.asu.edu/~dyang16/ EDUCATION

More information

Adversary Models. CPEN 442 Introduction to Computer Security. Konstantin Beznosov

Adversary Models. CPEN 442 Introduction to Computer Security. Konstantin Beznosov Adversary Models CPEN 442 Introduction to Computer Security Konstantin Beznosov why we need adversary models? attacks and countermeasures are meaningless without 2 elements of an adversary model objectives

More information

IEEE Data Storage Technical Committee Update. Haitao (Tony) Xia Chair, IEEE Data Storage Technical Committee

IEEE Data Storage Technical Committee Update. Haitao (Tony) Xia Chair, IEEE Data Storage Technical Committee 1 IEEE Data Storage Technical Committee Update Haitao (Tony) Xia Chair, IEEE Data Storage Technical Committee Agenda! Introduction / Tony Xia! Mailing List Migration / Brian Kurkoski! Conference Reports

More information

Industrial Control Systems November 18, 2015

Industrial Control Systems November 18, 2015 Industrial Control Systems November 18, 2015 ABOUT SANS - TRAINING SANS provides intensive, hands-on, immersion training Highest quality 70+ courses covering basic security skills to cutting edge topics

More information

The NIH Big Data to Knowledge Initiative: Raising the Prominence of Data

The NIH Big Data to Knowledge Initiative: Raising the Prominence of Data The NIH Big Data to Knowledge Initiative: Raising the Prominence of Data Michael F. Huerta, Ph.D. Associate Director, National Library of Medicine Director, Office of Health Information Programs Development

More information

Anat Levin : Postdoctoral Associate, MIT CSAIL. Advisor: Prof William T. Freeman.

Anat Levin : Postdoctoral Associate, MIT CSAIL. Advisor: Prof William T. Freeman. Anat Levin MIT CSAIL The Stata Center 32-D466 32 Vassar Street, Cambridge MA 02139 Email: alevin@csail.mit.edu URL: http://people.csail.mit.edu/alevin Phone: 617-253-7245 Education: 2007-2008: Postdoctoral

More information

Cornell University, Ithaca, NY Master of Engineering in Electrical Engineering 1987

Cornell University, Ithaca, NY Master of Engineering in Electrical Engineering 1987 Charles Ivan Cook Contact information available upon request. OBJECTIVE Colorado University, Boulder, CO Adjunct Faculty Teaching Position Teach graduate level introductory class in telecom systems consisting

More information

Curriculum Vitae. April 5, 2018

Curriculum Vitae. April 5, 2018 Curriculum Vitae April 5, 2018 Michael A. Sevilla mikesevilla3@gmail.com website: users.soe.ucsc.edu/~msevilla 127 Storey St., Santa Cruz, CA 95060 code: github.com/michaelsevilla mobile: (858) 449-3086

More information

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity INFORMATION SESSION MS Software Engineering, specialization in Cybersecurity Presenter Afifa Hamad Program Specialist Graduate & Extended Studies Charles W. Davidson College of Engineering San Jose State

More information

Education. Professional Experience. Awards and Honors

Education. Professional Experience. Awards and Honors Education Wade Trappe Department of Electrical and Computer Engineering, and Wireless Information Network Laboratory (WINLAB) Rutgers, The State University of New Jersey 73 Brett Road, Piscataway, NJ 08854

More information

Chris Vegter University of Northern Colorado Monfort College of Business (970)

Chris Vegter University of Northern Colorado Monfort College of Business (970) Chris Vegter University of Northern Colorado Monfort College of Business (970) 351-1244 Email: chris.vegter@unco.edu Education MBA, Colorado State University, 2006. Area of Study: Business Administration

More information

Dr. Zheng Chang. Personal. Education and Qualifications. Professional Experience

Dr. Zheng Chang. Personal. Education and Qualifications. Professional Experience Dr. Zheng Chang Assistant Professor (Tutkijatohtori, Docent) Faculty of Information Technology University of Jyväkylä P.O.Box 35(Agora), 40014 Jyväkylä, Finland Phone: +358 408054143 Email: zheng.chang@jyu.fi

More information

IJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby

IJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby Dr. P.P.Joby Contact Address Professor & Dean, Department of Computer Science & Engineering, MBC College of Engineering and Technology, Kuttikanam, Peermade, Idukki Dt, Kerala-685531. Permanent Address

More information

DOWNLOAD OR READ : US CELLULAR ANSWER WIRELESS PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : US CELLULAR ANSWER WIRELESS PDF EBOOK EPUB MOBI DOWNLOAD OR READ : US CELLULAR ANSWER WIRELESS PDF EBOOK EPUB MOBI Page 1 Page 2 us cellular answer wireless us cellular answer wireless pdf us cellular answer wireless BIOS Security. In 2011 the National

More information

Anh Le. URL:

Anh Le.   URL: Anh Le Contact Information Interests Education Email: anh.le@uci.edu URL: http://odysseas.calit2.uci.edu/anh My interests are in the areas of networking and security. I am particularly interested in mobile

More information

Tuncay Tekle Curriculum Vitæ

Tuncay Tekle Curriculum Vitæ Tuncay Tekle Curriculum Vitæ tuncay@cs.stonybrook.edu http://www.cs.stonybrook.edu/~tuncay/ Interests High-level programming languages and efficient implementations. Algorithm design and generation of

More information

Abhishek Chakraborty

Abhishek Chakraborty Abhishek Chakraborty Institute Post Doctoral Fellow Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036, India Phone: +91-859-286-2863/+91-943-498-6672 Email:

More information

Helping States Advance Energy Efficiency in Public Buildings: Lead-by-Example Workshop

Helping States Advance Energy Efficiency in Public Buildings: Lead-by-Example Workshop Helping States Advance Energy Efficiency in Public Buildings: Lead-by-Example Workshop March 19-20, 2018 Sue Gander National Governors Association Center for Best Practices About the National Governors

More information

Internet Privacy. Markus Klein, Joshua Juen University of Illinois Fall 2011

Internet Privacy. Markus Klein, Joshua Juen University of Illinois Fall 2011 Internet Privacy Markus Klein, Joshua Juen University of Illinois Fall 2011 I have nothing to hide!...they accept the premise that privacy is about hiding a wrong. It's not." Rather, privacy is most ohen

More information

AYAN MONDAL ayan.mondal/

AYAN MONDAL ayan.mondal/ AYAN MONDAL +91-7872773669 mondalayan12@gmail.com, ayanmondal@iitkgp.ac.in http://cse.iitkgp.ac.in/ ayan.mondal/ Present Address Kharagpur - 721302 India Permanent Address Ashrampara (Teachers Colony)

More information

Thesis: An Extensible, Self-Tuning, Overlay-Based Infrastructure for Large-Scale Stream Processing and Dissemination Advisor: Ugur Cetintemel

Thesis: An Extensible, Self-Tuning, Overlay-Based Infrastructure for Large-Scale Stream Processing and Dissemination Advisor: Ugur Cetintemel Olga Papaemmanouil Phone: +1 (401) 588-0230 Department of Computer Science Fax: +1 (401) 863-7657 Box 1910, 115 Waterman St, Floor 4 Email: olga@cs.brown.edu Providence, RI, 02912, USA Web: http://www.cs.brown.edu/

More information

New Project Proposal Status Report Final Report

New Project Proposal Status Report Final Report Title: Models and Software Tools for Managing Network Complexity Date: May 16, 2018 Researcher Name(s): Xin Sun University: Ball State University Long Term Goal(s) New Project Proposal Status Report Final

More information

RF Cloak: Securing RFID Cards Without Modifying them

RF Cloak: Securing RFID Cards Without Modifying them RF Cloak: Securing RFID Cards Without Modifying them Haitham Hassanieh Jue Wang, Dina Katabi, Tadayoshi Kohno RFIDs Are Used in Sensitive Applications Access Control Credit Cards Passports Pharmaceutical

More information

Stavros Nikolaou. 413 Gates Hall URL: Ithaca, NY, 14853, USA Date of Birth: December, 1987

Stavros Nikolaou. 413 Gates Hall URL:  Ithaca, NY, 14853, USA Date of Birth: December, 1987 413 Gates Hall +1 6073795409 Department of Computer Science Cornell University email: snikolaou@cs.cornell.edu URL: www.cs.cornell.edu/~snikolaou Ithaca, NY, 14853, USA Date of Birth: December, 1987 Education

More information

Mohamed Ibrahim Ahmed

Mohamed Ibrahim Ahmed Mohamed Ibrahim Ahmed Contact Information Education 194 Davidson Road, Nichols Apartments 52 Nationality: Egyptian Piscataway, NJ, USA Mobile: +18486663004 E-mail: mibrahim@winlab.rutgers.edu Webpage:

More information

Greg T. Harber Faculty Vita (September 1, August 31, 2013)

Greg T. Harber Faculty Vita (September 1, August 31, 2013) Greg T. Harber Faculty Vita (September 1, 2008 - August 31, 2013) Department: Computer Science Rank: Instructor Qualification Status: Other Tenure Status: Non-Tenure Track EDUCATION MS, 1994. Institution:

More information

IU Alumni Association Membership Statistics

IU Alumni Association Membership Statistics IU Alumni Association Membership Statistics Paid Members Membership Type Jun-2017 Jun-2018 Annual 11,213 8,754 Auto-Renewal 733 1,614 Life 44,597 45,355 June 30 - Fiscal Year 2018 Year To Date vs. Fiscal

More information