Skip to main content

Research Publications

CyLab's research is often published in the form of technical reports, peer-reviewed journals, and conference proceedings. Browse this list of publications by CyLab faculty and researchers.

Alessandro Acquisti

"A field trial of privacy nudges for facebook". Y. Wang, P. G. Leon, A. Acquisti, L. Cranor, A. Forget, and N. Sadeh, in CHI ’14: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, New York, NY, USA: ACM, pp. 2367–2376, 2014.

"Shaping our National Privacy Research Strategy: A Multi-Disciplinary Perspective". Acquisti, Agarwal, Bauer, Blum, Breaux, Cranor, Datta, Fienberg, Fong, Jahanian, Jia, J. Peha, Sadeh, Sandholm, and Sicker, 2014.

"Building the security behavior observatory: an infrastructure for long-term monitoring of client machines". A. Forget, S. Komanduri, A. Acquisti, N. Christin, L. Cranor, and R. Telang,  HotSoS ’14: Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, pp. 1–2, 2014.

"Should Payment Card Issuers Reissue Cards in Response to a Data Breach?". J. Graves, A. Acquisti, and N. Christin, WEIS: Workshop on the Economics of Information Security, 2014.

"Do Data Breach Disclosure Laws Reduce Identity Theft?". Sasha Romanosky, Rahul Telang, and Alessandro Acquisti. Journal of Policy Analysis and Management, 30(2), 256-286, 2011.

"Do Interruptions Pay Off? Effects of Interruptive Ads on Consumers' Willingness to Pay". Alessandro Acquisti and Sarah Spiekermann. Journal of Interactive Marketing, forthcoming 2011.

"Faces of Facebook: Privacy in the Age of Augmented Reality". Alessandro Acquisti, Ralph Gross, and Fred Stutsman. BlackHat USA, 2011.

"Les Comportements De Vie Privée Face Au Commerce Electronique: Une Economie De La Gratification Immédiate". Alessandro Acquisti. Réseaux, Special Issue on “Données Personnelles et Vie Privée Sur les Réseaux, Nouveaux Comportements, Nouvelles Regulations” (Editors: Alain Rallet et Fabrice Rochelandet), forthcoming 2011.

"The Impact of Relative Judgments on Concern about Privacy". Alessandro Acquisti, Leslie John, and George Loewenstein. Journal of Marketing Research, forthcoming 2011.

Jonathan Aldrich

"A Theory of Tagged Objects". Joseph Lee, Jonathan Aldrich, Troy Shaw, and Alex Potanin. Proc. European Conference on Object-Oriented Programming (ECOOP), 2015

"Searching the State Space: A Qualitative Study of API Protocol Usability". Joshua Sunshine, James Herbsleb and Jonathan Aldrich. Proc. International Conference on Program Comprehension (ICPC), 2015.

"Foundations of Typestate-Oriented Programming". Ronald Garcia, Éic Tanter, Roger Wolff, and Jonathan Aldrich. Transactions on Programming Languages and Systems 36(4) article 12, 2014.

"Statically Typed String Sanitation Inside a Python". Nathan Fulton, Cyrus Omar, and Jonathan Aldrich. Proc. Privacy and Security in Programming (PSP), 2014

"Language-Based Architectural Control". Jonathan Aldrich, Cyrus Omar, Alex Potanin, and Du Li. In International Workshop on Aliasing, Capabilities, and Ownership (IWACO '14), 2014

"A Type System for Borrowing Permissions". Karl Naden, Robert Bocchino, Kevin Bierhoff, Jonathan Aldrich. To appear in Proceedings of Principles of Programming Languages (POPL '12), 2012.

"An Empirical Study of Object Protocols in the Wild". Nels E. Beckman, Duri Kim, and Jonathan Aldrich. To appear in Proceedings of the European Conference on Object-Oriented Pro

"First-Class State Change in Plaid". Joshua Sunshine, Karl Naden, Sven Stork, Jonathan Aldrich, and Éric Tanter. To appear in Proceedings of Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA '11), 2011.

"Gradual Typestate". Roger Wolff, Ronald Garcia, Éric Tanter, and Jonathan Aldrich. To appear in Proceedings of the European Conference on Object-Oriented Programming (ECOOP '11), 2011.

"Permission-Based Programming Languages (NIER Track)". Jonathan Aldrich, Ronald Garcia, Mark Hahnenberg, Manuel Mohr, Karl Naden, Darpan Saini, Sven Stork, Joshua Sunshine, Éric Tanter, and Roger Wolff. In Proceedings of the International Conference on Software Engineering (ICSE '11), New Ideas and Emerging Results Track, 2011. gramming (ECOOP '11), 2011.

Dave Andersen

"Cuckoo Filter: Practically Better Than Bloom". Bin Fan and David G. Andersen and Michael Kaminsky and Michael D. Mitzenmacher, In Proc. CoNEXT , Dec 2014/

"Paxos Quorum Leases: Fast Reads Without Sacrificing Writes". Iulian Moraru and David G. Andersen and Michael Kaminsky, In Proc. 5th ACM Symposium on Cloud Computing (SOCC) , Nov 2014/

"Scaling Distributed Machine Learning with the Parameter Server". Mu Li and David G. Andersen and Jun Woo Park and Alexander J. Smola and Amr Ahmed and Vanja Josifovski and James Long and Eugene J. Shekita and Bor-Yiing Su, In Proc. 11th USENIX OSDI , Oct 2014/

"Using RDMA Efficiently for Key-Value Services". Anuj Kalia and Michael Kaminsky and David G. Andersen, In Proc. ACM SIGCOMM , Aug 2014/

"XIA: Architecting a More Trustworthy and Evolvable Internet". David Naylor and Matthew K. Mukerjee and others, In ACM Computer Communications Review , Jul 2014/

"MICA: A Holistic Approach to Fast In-Memory Key-Value Storage". Hyeontaek Lim and Dongsu Han and David G. Andersen and Michael Kaminsky, In Proc. 11th USENIX NSDI , Apr 2014/

"Algorithmic Improvements for Fast Concurrent Cuckoo Hashing". Xiaozhou Li and David G. Andersen and Michael Kaminsky and Michael J. Freedman, In Proc. 9th ACM European Conference on Computer Systems (EuroSys) , Apr 2014/

"XIA: Efficient Support for Evolvable Internetworking". Dongsu Han and Ashok Anand and Fahad Dogar and Boyan Li and Hyeontaek Lim and Michel Machado and Arvind Mukundan and Wenfei Wu and Aditya Akella and David G. Andersen and John W. Byers and Srinivasan Seshan and Peter Steenkiste In Proc. 9th USENIX NSDI , Apr 2012

"Don't settle for Eventual: Scalable Causal Consistency for Wide-Area Storage with COPS". Wyatt Lloyd and Michael J. Freedman and Michael Kaminsky and David G. Andersen In Proc. 23rd ACM Symposium on Operating Systems Principles (SOSP) , Oct 2011

"SILT: A Memory-Efficient, High-Performance Key-Value Store". Hyeontaek Lim and Bin Fan and David G. Andersen and Michael Kaminsky In Proc. 23rd ACM Symposium on Operating Systems Principles (SOSP) , Oct 2011

"Small Cache, Big Effect: Provable Load Balancing for Randomly Partitioned Cluster Services". Bin Fan and Hyeontaek Lim and David G. Andersen and Michael Kaminsky In Proc. 2nd ACM Symposium on Cloud Computing (SOCC) , Oct 2011

"Switching the Optical Divide: Fundamental Challenges for Hybrid Electrical/Optical Datacenter Networks". Hamid Hajabdolali Bazzaz and Malveeka Tewari and Guohui Wang and George Porter and T. S. Eugene Ng and David G. Andersen and Michael Kaminsky and Michael A. Kozuch and Amin Vahdat In Proc. 2nd ACM Symposium on Cloud Computing (SOCC) , Oct 2011

Lujo Bauer

"Analyzing the dangers posed by Chrome extensions". L. Bauer, S. Cai, L. Jia, T. Passaro, and Y. Tian, in Proceedings of the IEEE Conference on Communications and Network Security IEEE, pp. 184-192, 2014.

"Android taint flow analysis for app sets". W. Klieber, L. Flynn, A. Bhosale, L. Jia, and L. Bauer, in Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of the Art in Java Program Analysis (SOAP 2014) ACM, 2014.

"Studying the effectiveness of security images in Internet banking". J. Lee and L. Bauer, in Web 2.0 Security and Privacy (W2SP) Workshop, 2014.

"Can Long Passwords Be Secure and Usable?". R. Shay, S. Komanduri, A. Durity, P. Huh, M. Mazurek, S. Segreti, B. Ur, L. Bauer, N. Christin, and L. Cranor, CHI: Conference Proceedings, Conference on Human Factors in Computing Systems, 2014.

"Toward strong, usable access control for shared distributed data". M. L. Mazurek, Y. Liang, W. Melicher, M. Sleeper, L. Bauer, G. Ganger, N. Gupta, and M. K. Reiter,  FAST: USENIX Conference on File and Storage Technologies, 2014.

"A comparison of users' perceptions and willingness to use Google, Facebook, and Google+ single-sign-on functionality". Bauer, L., Bravo-Lillo, C., Fragkaki, E., & Melicher, W. (2013). Proceedings of the ACM Digital Identity Management Workshop. ACM.

"Measuring password guessability for an entire university". Mazurek, M. L., Komanduri, S., Vidas, T., Bauer, L., Christin, N., Cranor, L. F., Kelley, P. G., Shay, R., & Ur, B. (2013). ACM Conference on Computer and Communications Security Proceedings, 173-186.

"Run-time enforcement of information-flow properties on Android". Jia, L., Aljuraidan, J., Fragkaki, E., Bauer, L., Stroucken, M., Fukushima, K., Kiyomoto, S., & Miyake, Y. (2013). European Symposium on Research in Computer Security (ESORICS).

"The post anachronism: The temporal dimension of Facebook privacy". Bauer, L., Cranor, L., Komanduri, S., Mazurek, M. L., Reiter, M. K., Sleeper, M., & Ur, B. (2013). Proceedings of the 12th Annual Workshop on Privacy in the Electronic Society. ACM.

"What matters to users? Factors that affect users' willingness to share information with online advertisers". Leon, P. G., Ur, B., Wang, Y., Sleeper, M., Balebako, R., Shay, R., Bauer, L., & Christodorescu, M. (2013). SOUPS: Symposium On Usable Privacy and Security.

Vijayakumar Bhagavatula

"Tentpoles Scheme: a data-aided channel estimation mechanism for achieving reliable vehicle-to-vehicle communications". Zheng Li, Fan Bai, Joseph Fernandez and V. Bhagavatula, IEEE Trans. Wireless Communications, 2015

"Zero-aliasing correlation filters for object recognition". Joseph A. Fernandez, V.N. Boddeti, A. Rodriguez and B.V.K. Vijaya Kumar, IEEE Trans. Pattern Analysis and Machine Intelligence, 2015.

"A Framework for Binding and Retrieving Class-Specific Information to and from Image Patterns using Correlation Filters". Boddeti, V. N., & Bhagavatula, V. (2013). IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 35, 2064-2077.

"Bi-directional Pattern-dependent noise prediction with LDPC codes for HAMR". Ng, Y., Cai, K., Bhagavatula, V., Qin, Z., & Chong, T. C. (2013). IEEE Transactions on Magnetics, 49, 2661-2664.

"Coding for Memory with Stuck-at Defects". Kim, Y., & Bhagavatula, V. (2013). ICC: International Communications Conference.

"Modulation Coding for Flash Memories". Kim, Y., Cho, K. L., Son, H., Kim, J., Kong, J. J., J. L., & Bhagavatula, V. (2013). International Conference on Computing, Networking and Communications.

"Redundancy Allocation of Partitioned Linear Block Codes". Kim, Y., & Bhagavatula, V. (2013). IEEE International Symposium on Information Theory.

Avrim Blum

"Privacy-Preserving Public Information for Sequential Games". Avrim Blum, Jamie Morgenstern, Ankit Sharma, Adam Smith, ITCS 2015.

"Learning Valuation Distributions from Partial Observation". Avrim BlumYishay MansourJamie Morgenstern. AAAI 2015.

"Active Learning and Best-Response Dynamics". Nina Balcan, Chris Berlind, Emma Cohen, Kaushik Patnaik, and Le Song. Proc. 27th Annual Conference on Neural Information Processing Systems (NIPS) 2014.

"Learning Mixtures of Ranking Models". Pranjal Awasthi, Or Sheffet, and Aravindan Vijayaraghavan. Proc. 27th Annual Conference on Neural Information Processing Systems (NIPS) 2014.

"Learning Optimal Commitment to Overcome Insecurity". Nika Haghtalab and Ariel Procaccia. Proc. 27th Annual Conference on Neural Information Processing Systems (NIPS) 2014. 

"Lazy Defenders Are Almost Optimal Against Diligent Attackers". Nika Haghtalab and Ariel Procaccia. Proc. 28th AAAI Conference on Artificial Intelligence (AAAI), 2014.

"Estimating Accuracy from Unlabeled Data". Anthony Platanios (lead author) and Tom Mitchell. UAI 2014.

"Differentially Private Data Analysis of Social Networks via Restricted Sensitivity". Blocki, J., Blum, A., Datta, A., & Sheffet, O. (2013). 4th Innocations in Theoretical Computer Science Conference.

"Center-based Clustering under Perturbation Stability". Pranjal Awasthi and Or Sheffet. Information Processing Letters, 112(1-2):49-54, Jan 2012.

"Welfare and Profit Maximization with Production Costs". Anupam Gupta, Yishay Mansour, and Ankit Sharma. FOCS, 2011.

"A Discriminative Model for Semi-Supervised Learning". Nina Balcan. JACM Vol 57, Issue 3, 2010.

"Trading off Mistakes and Don't-Know Predictions". Amin Sayedi and Morteza Zadimoghaddam. NIPS 2010.

Manuel Blum

"Human Computable Passwords". J. Blocki, M. Blum, A. Datta, and S. Vempala, 2014.

"GOTCHA Passwork Hackers!". Datta, A., Blocki, J., & Blum, M. (2013). ACM: Proceedings of the Annual Conference.

"Naturally Rehearsing Passwords". Datta, A., Blocki, J., & Blum, M. (2013). ASIACCS: Proceedings of the ACM Symposium on Information, Computer and Communication Security.

David Brumley

"Automatic Exploit Generation". Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumley. Communications of the ACM, 57(2):74–84, 2014. 

"Enhancing Symbolic Execution with Veritesting". Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, and David Brumley.  In Proceedings of the International Conference on Software Engineering, pages 1083–1094, New York, New York, USA, 2014. ACM Press. 

"ByteWeight: Learning to Recognize Functions in Binary Code". Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, and David Brumley. In Proceedings of the 23rd USENIX Security Symposium, pages 845–860. USENIX, 2014. 

"Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components". Manuel Egele, Maverick Woo, Peter Chapman, and David Brumley. In Proceedings of the 23rd USENIX Security Symposium, pages 303–317. USENIX, 2014.

"Optimizing Seed Selection for Fuzzing". Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley. In Proceedings of the 23rd USENIX Security Symposium, pages 861–875. USENIX, 2014. 

"An Empirical Study of the Cryptographic Misuse in Android Applications". Egele, M., Brumley, D. J., Fratantonio, Y., & Kruegel, C. (2013). ACM Conference on Computer and Communications Security Proceedings.

"Native x86 Decompilation using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring". Brumley, D. J., Lee, J., Schwartz, E. J., & Woo, M. (2013). USENIX Security Symposium.

"Scheduling Black-box Mutational Fuzzing". Woo, M., Cha, S. K., Gottlieb, S., & Brumley, D. J. (2013). ACM Conference on Computer and Communications Security Proceedings.

"Towards Automatic Software Lineage Inference". Jang, J., Woo, M., & Brumley, D. J. (2013). USENIX Security Symposium.

"Unleashing Mayhem on Binary Code". S. K. Cha, T. Avgerinos, A. Rebert, and D. J. Brumley. IEEE Security and Privacy, 2012.

Yang Cai

"A Game-Engine-Based Visualization Platform for Exploring Satellite and In-Situ Data"Y. Cai, NYC: AGU, 2014.

"Ambient Diagnostics". Y. Cai, Boca Raton, FL: CRC Press /Taylor Francis, 2014.

"Evolutionary Classification of Tongue Image Features". Y. Cai, IEEE Transactions on Medical Imaging.

"Adaptive feature annotation for large video sensor networks". Cai, Y. (2013). Journal of Electronic Imaging, 22(4).

"Error Analysis and Retention-Aware Error Management for NAND Flash Memory". Cai, Y., Yalcin, G., Mutlu, O., Haratsch, E., Cristal, A., Unsal, O., & Mai, K. W. (2013). Intel Technology Journal, 17(1), 140-164.

"Program Interference in MLC NAND Flash Memory: Characterization, Modelling and Mitigation". Cai, Y., Mutlu, O., Haratsch, E., & Mai, K. W. (2013).  ICCD: International Conference on Computer Design, 123-130.

"Speaker Verification for Multi-Task Interactions". Cai, Y. (2013). Journal of Interacting with Computers,, 10(1093). Oct 18, 2013, 1093(10).

"Threshold Voltage Distribution in MLC NAND Flash Memory: Characterization, Analysis, and Modeling". Cai, Y., Haratsch, E., Mutlu, O., & Mai, K. W. (2013). DATE: Design Automation and Test in Europe, 1285-1290.

Nicolas Christin

"Building the security behavior observatory: an infrastructure for long-term monitoring of client machines". A. Forget, S. Komanduri, A. Acquisti, N. Christin, L. Cranor, and R. Telang, HotSoS ’14: Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, pp. 1–2, 2014.

"A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning". N. Leontiadis, T. Moore, and N. Christin, ACM Conference on Computer and Communications Security Proceedings, pp. 930–941, 2014.

"A5: Automated Analysis of Adversarial Android Applications". T. Vidas, J. Tan, J. Nahata, C.-L. Tan, N. Christin, and P. D. Tague, Proceedings of the 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2014), 2014.

"Empirically Measuring WHOIS Misuse". N. Leontiadis and N. Christin, European Symposium on Research in Computer Security (ESORICS), pp. 19–36, 2014.

"Automatically detecting vulnerable websites before they turn malicious". K. Soska and N. Christin, USENIX Security Symposium, pp. 625–640, 2014.

"Evading Android Runtime Analysis via Sandbox Detection". T. Vidas and N. Christin, ASIACCS: Proceedings of the ACM Symposium on Information, Computer and Communication Security, 2014.

"Should Payment Card Issuers Reissue Cards in Response to a Data Breach?". J. Graves, A. Acquisti, and N. Christin, WEIS: Workshop on the Economics of Information Security, 2014.

"Can Long Passwords Be Secure and Usable?". R. Shay, S. Komanduri, A. Durity, P. Huh, M. Mazurek, S. Segreti, B. Ur, L. Bauer, N. Christin, and L. Cranor, CHI: Conference Proceedings, Conference on Human Factors in Computing Systems, 2014.

"Commentary on Barratt et al. (2014): Steps towards characterizing online anonymous drug marketplace customers". N. Christin, Addiction, vol. 109, no. 5, pp. 784–785, 2014.

"Android Lemon Markets: Application Repackaging and Malware in Application Marketplaces".

Vidas, T., & Christin, N. (2013).  Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy.

"Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk". Moore, T., & Christin, N. (2013). Financial Cryptography and Data Security International Conference.

"Measuring password guessability for an entire university". Mazurek, M. L., Komanduri, S., Vidas, T., Bauer, L., Christin, N., Cranor, L., Kelley, P., Shay, R., & Ur, B. (2013). ACM Conference on Computer and Communications Security Proceedings, 173-186.

"Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Markeplace". Christin, N. (2013). WWW: International World Wide Web Conference, 213-224.

Lorrie Cranor

"Tracking and Surveillance". L. Cranor, M. Sleeper, and B. Ur, in Introduction to IT Privacy: A Handbook for Technologists IAPP, 2014.

"A field trial of privacy nudges for facebook". Y. Wang, P. G. Leon, A. Acquisti, L. Cranor, A. Forget, and N. Sadeh, in CHI ’14: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, New York, NY, USA: ACM, pp. 2367–2376, 2014.

"Electronic privacy and surveillance". J. P. Hourcade, A. Cavoukian, R. Deibert, L. Cranor, and I. Goldberg, in CHI EA ’14: CHI ’14 Extended Abstracts on Human Factors in Computing Systems, New York, NY, USA: ACM, pp. 1075–1080, 2014.

"Telepathwords: preventing weak passwords by reading users’ minds". S. Komanduri, R. Shay, L. Cranor, C. Herley, and S. Schechter, in SEC’14: Proceedings of the 23rd USENIX conference on Security Symposium, Berkeley, CA, USA: USENIX Association, pp. 591–606, 2014.

"Building the security behavior observatory: an infrastructure for long-term monitoring of client machines".  A. Forget, S. Komanduri, A. Acquisti, N. Christin, L. Cranor, and R. Telang, HotSoS ’14: Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, pp. 1–2, 2014.

"Can Long Passwords Be Secure and Usable?". R. Shay, S. Komanduri, A. Durity, P. Huh, M. Mazurek, S. Segreti, B. Ur, L. Bauer, N. Christin, and L. Cranor, CHI: Conference Proceedings, Conference on Human Factors in Computing Systems, 2014.

"Measuring password guessability for an entire university". Mazurek, M. L., Komanduri, S., Vidas, T., Bauer, L., Christin, N., Cranor, L. F., Kelley, P. G., Shay, R., & Ur, B. (2013). ACM Conference on Computer and Communications Security Proceedings, 173-186.

"Structuring PLFS for Extensibility". Cranor, C., Polte, M., & Gibson, G. (2013).  PDSW '13 Proceedings of the 8th Parallel Data Storage Workshop, 20-26.

"The post anachronism: The temporal dimension of Facebook privacy". Bauer, L., Cranor, L., Komanduri, S., Mazurek, M. L., Reiter, M. K., Sleeper, M., & Ur, B. (2013). Proceedings of the 12th Annual Workshop on Privacy in the Electronic Society. ACM.

"The impact of length and mathematical operators on the usability and security of system-assigned one-time PINs". Kelley, P. G., Komanduri, S., Mazurek, M. L., Shay, R., Vidas, T., Bauer, L., Christin, N., & Cranor, L. (2013). 2013 Workshop on Usable Security (USEC), volume 7862 of Lecture Notes in Computer Science (vol. 7862, pp. 34-51). Springer.

Karl Crary

"Higher-order Representation of Substructural Logics". Karl Crary. 2010 International Conference on Functional Programming, to appear.

"A Simple Proof of Call-by-Value Standardization". Karl Crary. CMU Technical Report CMU-CS-09-137, 2009.

"A Syntactic Account of Singleton Types via Hereditary Substitution". Karl Crary. 2009 Workshop on Logical Frameworks and Meta-Languages: Theory and Practice.

"Mechanized Definition of Standard ML (alpha release)". Karl Crary and Robert Harper. 2009.

"Explicit Contexts in LF". Karl Crary. 2008 Workshop on Logical Frameworks and Meta-Languages: Theory and Practice.

Anupam Datta

 "Privacy-preserving audit for broker-based health information exchange". S. E. Oh, J. Y. Chun, L. Jia, D. Garg, C. A. Gunter, and A. Datta, in Fourth ACM Conference on Data and Application Security and Privacy, CODASPY’14, San Antonio, TX, USA - March 03 - 05, 2014, pp. 313–320, 2014.

"Temporal Mode-Checking for Runtime Monitoring of Privacy Policies". O. Chowdhury, L. Jia, D. Garg, and A. Datta, in Proceedings of the 16th International Conference on Computer Aided Verification - Volume 8559, New York, NY, USA: Springer-Verlag New York, Inc., pp. 131–149, 2014.

"Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming". B. DeBruhl, C. Kroer, A. Datta, T. Sandholm, and P. Tague, Proceedings of 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014.

"Privacy through Accountability: A Computer Science Perspective". A. Datta, Proceedings of 10th International Conference on Distributed Computing and Internet Technology, 2014.

"Bootstrapping Privacy Compliance in Big Data Systems". S. Sen, S. Guha, A. Datta, S. Rajamani, J. Tsai, and J. M. Wing, Proceedings of 35th IEEE Symposium on Security and Privacy, 2014.

"A Methodology for Information Flow Experiments". M. C. Tschantz, A. Datta, A. Datta, and J. M. Wing,  2014.

"Human Computable Passwords". J. Blocki, M. Blum, A. Datta, and S. Vempala,  2014.

"Adaptive Regret Minimization in Bounded-Memory Games". Datta, A., Blocki, J., Sinha, A., & Christin, N. (2013). Conference on Decision and Game Theory for Security (GameSec).

"Differentially Private Data Analysis of Social Networks via Restricted Sensitivity". Blocki, J., Blum, A., Datta, A., & Sheffet, O. (2013). 4th Innocations in Theoretical Computer Science Conference

"GOTCHA Passwork Hackers! ". Datta, A., Blocki, J., & Blum, M. (2013). ACM: Proceedings of the Annual Conference.

"Naturally Rehearsing Passwords". Datta, A., Blocki, J., & Blum, M. (2013). ASIACCS: Proceedings of the ACM Symposium on Information, Computer and Communication Security

Anind Dey

"The Usability Impact of Prefetching and Caching on Cloud-sourced Applications". B. Taylor, A. Yoshihisa, M. Satyanarayanan, A. Dey, D. Siewiorek, and A. Smailagic, SigMobile, 2014.

"Using Physiological Sensors to Detect Levels of User Frustration Induced by System Delays". B. Taylor, A. Dey, A. Smailagic, and D. Siewiorek, CHI: Conference Proceedings, Conference on Human Factors in Computing Systems.

"Democratization of healthcare through self-monitoring technologies". Pavel, D., Callaghan, V. and Dey, A.K. Proceedings of Pervasive Health 2010. (pdf)

"Looking back in wonder: How self-monitoring technologies can help us better understand ourselves". Pavel, D., Callaghan, V. and Dey, A.K. Proceedings of Intelligent Envrionments 2010. (pdf)

"Maximum Causal Entropy Correlated Equilibria for Markov Games". Ziebart, B., Bagnell, J.A., and Dey, A.K. To appear in the Proceedings of the Workshop on Interactive Decision Theory and Game Theory, at AAAI 2010.(pdf)

"Modeling interaction via the principle of maximum causal entropy". Ziebart, B., Bagnell, J.A., and Dey, A.K. To appear in the Proceedings of International Conference on Machine Learning (ICML 2010). (pdf)

"Towards maximizing the accuracy of human-labeled sensor data". Rosenthal, S. and Dey, A.K. To appear in the Proceedings of Intelligent User Interfaces (IUI 2010). (pdf)

Franz Franchetti

"Generating Optimized Fourier Interpolation Routines for Density Functional Theory Using SPIRAL". T. Popovici, F. Russel, K. Wilkinson, C.-K. Skylaris, P.H. J. Kelly, and F. Franchetti, CPC: Workshop on Compilers for Parallel Computing, 2015.

"Spectral Full-Field Deformation Modeling of Polycrystalline Materials"T. Ozturk, C. Stein, R. Pokharel, T. Popovici, R. Suter, F. Franchetti, and A. D. Rollett,  Neutron and X-Ray Studies of Advanced Materials VIII: Diffraction Limit and Beyond. 2015 TMS Annual Meeting & Exhibition.

"Automatic Generation of 3-D FFTs". B. Duff, J. Larkin, F. Franusich, and F. Franchetti, 2014 Rice Oil & Gas HPC Workshop, 2014.

"Algorithm/Hardware Co-optimized SAR Image Reconstruction with 3D-stacked Logic in Memory". F. Sadi, B. Akin, T. Popovici, J. Hoe, L. Pileggi, and F. Franchetti, HPEC: High Performance Embedded Computing Annual Workshop, 2014.

"3D-Stacked Memory-Side Acceleration: Accelerator and System Design". Q. Guo, N. Alachiotis, B. Akin, F. Sadi, G. Xu, T.M. Low, L. Pileggi, J. Hoe, and F. Franchetti,  WoNDP: 2nd Int'l Workshop on Near-Data Processing, 2014.

"Algorithm/Hardware Co-optimized SAR Image Reconstruction with 3D-stacked Logic in Memory". F. Sadi, B. Akin, T. Popovici, J. Hoe, L. Pileggi, and F. Franchetti, HPEC: High Performance Embedded Computing Annual Workshop, 2014.

"Barometric and GPS Altitude Sensor Fusion". V. Zaliva and F. Franchetti, ICASSP: International Conference on Acoustics, Speech and Signal Processing, 2014.

"Fast Fourier Transform Based Mechanical Behavior Formulation: Optimized Implementation and Sensitivity Analysis of the Method". T. Ozturk, T. Popovici, C. Stein, R. Pokharel, F. Franchetti, and A. D. Rollett, Materials Science and Technology Symposium, 2014.

"A 3D-Stacked Logic-in-Memory Accelerator for Application-Specific Data Intensive Computing". Q. Zhu, B. Akin, H. E. Sumbul, F. Sadi, J. Hoe, L. Pileggi, F. Franchetti. Proceedings of IEEE International 3D Systems Integration Conference (3DIC) 2013, to appear.

" Accelerating Sparse Matrix-Matrix Multiplication with 3D-Stacked Logic-in-Memory Hardware". Zhu, Q., Graf, T., Sumbul, H. Ekin, Pileggi, L., & Franchetti, F. (2013). HPEC: High Performance Embedded Computing Annual Workshop.

"A Smart Memory Accelerated Computed Tomography Parallel Backprojection". Zhu, Q., Pileggi, L., & Franchetti, F. (2013).  FIP AICT 418 (pp. 21-44).

"A Stencil Compiler for Short-Vector SIMD Architectures". T. Henretty, R. Veras, F. Franchetti, L.-N. Pouchet, J. Ramanujam, and P. Sadayappan. Proceedings of International Conference on Supercomputing (ICS), 2013, to appear.

Greg Ganger

"Neural Information Processing Systems (NIPS)". Ho, Q., Cipar, J., Cui, H., Lee, S., Kim, J., Gibbons, P., Gibson, G., Ganger, G., & Xing, E. (2013). 

"PriorityMeister: Tail Latency QoS for Shared Networked Storage". T. Zhu, A. Tumanov, M. A. Kozuch, M. Harchol-Balter, and G. Ganger, ACM Symposium on Cloud Computing (SoCC), 2014.

 "Agility and Performance in Elastic Distributed Storage". L. Xu, J. Cipar, E. Krevat, A. Tumanov, N. Gupta, M. A. Kozuch, and G. Ganger,ACM Transactions on Storage, vol. 10, no. 4, 2014.

"Exploiting Bounded Staleness to Speed up Big Data Analytics". H. Cui, J. Cipar, Q. Ho, J. K. Kim, S. Lee, A. Kumar, J. Wei, W. Dai, G. Ganger, P. B. Gibbons, G. A. Gibson, and E. P. Xing,  USENIX Annual Technical Conference, 2014.

"SpringFS: Bridging Agility and Performance in Elastic Distributed Storage". L. Xu, J. Cipar, E. Krevat, A. Tumanov, N. Gupta, M. A. Kozuch, and G. Ganger, FAST: USENIX Conference on File and Storage Technologies, 2014.

"Toward strong, usable access control for shared distributed data". M. L. Mazurek, Y. Liang, W. Melicher, M. Sleeper, L. Bauer, G. Ganger, N. Gupta, and M. K. Reiter, FAST: USENIX Conference on File and Storage Technologies, 2014.

"So, You Want to Trace Your Distributed System? Key Design Insights from Years of Practical Experience"R. R. Sambasivan, R. Fonseca, I. Shafer, and G. Ganger, 2014.

"Active Disk Meets Flash: A Case for Intelligent SSDs". Cho, S., Park, C., Oh, H., Kim, S., Yi, Y., & Ganger, G. (2013). ACM Int'l Conference on Supercomputing (ICS).

"Asymmetry-Aware Execution Placement on Manycore Chips".

Tumanov, A., Wise, J., Mutlu, O., & Ganger, G. (2013). Workshop on Systems for Future Multicore Architectures (SFMA - Eurosys).

"More Effective Distributed ML via a Stale Synchronous Parallel Parameter Server". Ho, Q., Cipar, J., Cui, H., Lee, S., Kim, J., Gibbons, P., Gibson, G., Ganger, G., & Xing, E. (2013). Neural Information Processing Systems (NIPS).

" Specialized Storage for Big Numeric Time Series". Shafer, I., Sambasivan, R., Rowe, A., & Ganger, G. (2013). Usenix Workshop on Hot Topics in Storage and File Systems (HotStorage).

"Visualizing Request-flow Comparison to Aid Performance Diagnosis in Distributed Systems". Sambasivan, R., Shafer, I., Mazurek, M., & Ganger, G. (2013). IEEE Transactions on Visualization and Computer Graphics.

David Garlan

"Documenting Software Architectures: Views and Beyond, Second Edition". P. Clements, F. Bachmann, L. Bass, D. Garlan, J. Ivers, R. Little, P. Merson, R. Nord, and J. Stafford. Addison Wesley, September 2011.

"SORASCS: A Case Study in SOA-based Platform Design for Socio-Cultural Analysis". Bradley Schmerl, David Garlan, Vishal Dwivedi, Michael Bigrigg and Kathleen M. Carley. In Proceedings of the 33rd International Conference on Software Engineering, Hawaii, USA, 2011. To Appear.

"SWiFT: A Tool for Constructing Workflows for Dynamic Network Analysis". David Garlan, Bradley Schmerl, Vishal Dwivedi, Aparup Banerjee, Laura Glendenning, Mai Nakayama and Nina Patel. 2011. Submitted for publication.

"Using Parameters in Architectural Views to Support Heterongeneous Design and Verification". Akshay Rajhans, Ajikya Bhave, Sarah Loos, Bruce Krogh, Andre Platzer and David Garlan. 2011. Submitted for publication.

"View Consistency in Architectures for Cyber-Physical Systems". Ajikya Bhave, Bruce Krogh, David Garlan and Bradley Schmerl. In Proceedings of the 2nd ACM/IEEE International Conference on Cyber-Physical Systems, April 2011.

Virgil Gligor

"Applications of Random Intersection Graphs to Secure Sensor Networks – Connectivity Results". J. Zhao, O. Yagan, and V. D. Gligor, SIAM Workshop on Network Science 2015.

"On k-Connectivity and Minimum Vertex Degree in Random s-Intersection Graphs". J. Zhao, O. Yagan, and V. D. Gligor,SIAM Meeting on Analytic Algorithmics and Combinatorics (ANALCO 2015), 2015.

"On the strengths of connectivity and robustness in general random intersection graphs". J. Zhao, O. Yagan, and V. D. Gligor, IEEE Conference on Decision and Control, 2014.

"Dancing with the Adversary: A Tale of Wimps and Giants". V. D. Gligor,  Lecture Notes in Computer Science, vol. Security Protocols XXII, pp. 100-115, 2014.

"Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures". M. S. Kang and V. D. Gligor, ACM Conference on Computer and Communications Security Proceedings, pp. 321-333, 2014.

"Connectivity in Secure Wireless Sensor Networks under Trans- mission Constraints". J. Zhao, O. Yagan, and V. D. Gligor,  Annual Allerton Conference on Communication, Control and Computing, 2014.

"On secure and reliable communications in wireless sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme". F. Yavuz, J. Zhao, O. Yagan, and V. D. Gligor,  IEEE International Symposium on Information Theory, 2014.

"On Topological Properties of Wireless Sensor Networks under the q-Composite Key Predistribution Scheme with On/Off Channels". J. Zhao, O. Yagan, and V. D. Gligor,  IEEE International Symposium on Information Theory, 2014.

"CoDef: Collaborative Defense Against Large-Scale Link-Flooding Attacks". Lee, S. B., Kang, M. S., & Gligor, V. D. (2013). CoNEXT: International Conference on emerging Networking EXperiments and Technologies.

"KISS: "Key it Simple and Secure" Corporate Key Management". Zhou, Z., Han, J., Lin, Y.-H., Perrig, A., & Gligor, V. D. (2013). International Conference on Trust and Trustworthy Computing (TRUST).

"Secure k-connectivity in wireless sensor networks under an on/off channel model". Zhao, J., Yagan, O., & Gligor, V. D. (2013). IEEE International Symposium on Information Theory, 2013(7), 2790 - 2794.

"STRIDE: Sanctuary Trail -- Refuge from Internet DDoS Entrapment". Hsiao, H.-C., Kim, T. H.-J., Lee, S. B., Zhang, X., Yoo, S., Gligor, V. D., & Perrig, A. (2013). ASIACCS: Proceedings of the ACM Symposium on Information, Computer and Communication Security.

"The Crossfire Attack". Kang, M. S., Lee, S. B., & Gligor, V. D. (2013).  IEEE Symposium on Security and Privacy.

Aaron Greenhouse

"Developing AADL Models for Control Systems: A Practitioner's ... ". Developing AADL Models for Control Systems: A Practitioner's Guide John Hudak Peter Feiler July 2007 TECHNICAL... (2008)

"Results of SEI Independent Research and Development ... ". Sagar Chaki Rosann W. Collins Peter Feiler John Goodenough Aaron Greenhouse Jorgen Hansson Alan R. Hevner John Hudak Angel Jordan... 2008-04-14

"Focus on Collaboration ". Rhonda Brown, Software Engineering Institute, Aaron Clouse, P., Fisher, D., Forrester, E., Garcia, S., Greenhouse, A., Hansson...  (2007)

"Results of SEI Independent Research and Development ... ". Eileen C. Forrester, Suzanne M. Garcia, aaron greenhouse, Jorgen Hansson, Jim Herbsleb, James Ivers, Peter Lee, Richard C. Linger, Thomas A...  (2007)

"SEI Annual Report FY 2006". He and fellow analyst Aaron Hackworth analyzed botnet malware and detailed... Greenhouse, A.; Halloran, TJ; & Sherlis, W. Observations on the...  (2006)

Martin Griss

"Toward the Next Generation of Emergency Operations Systems". Art Botterell, Silicon Valley Campus (2011)

"Activity-aware Mental Stress Detection Using Physiological Sensors". Feng-Tso Sun, Cynthia Kuo, Heng-Tze Cheng, Senaka Buthpitiya, and Patricia Collins, Silicon Valley Campus (2010)

"Anubis: An Attestation Protocol for Distributed Context-Aware Applications". Senaka Buthpitiya, Feng-Tso Sun, Heng-Tze Chen, Patrick Tague, and Anind K. Dey), Silicon Valley Campus (2010)

"OmniSense: A Collaborative Sensing Framework for User Context Recognition Using Mobile Phones". Heng-Tze Cheng, Senaka Buthpitiya, and Feng-Tso Sun, Silicon Valley Campus (2010)

"SensOrchestra: Collaborative Sensing for Symbolic Location Recognition". Heng-Tze Cheng, Feng-Tso Sun, and Senaka Buthpitiya, Silicon Valley Campus (2010)

Ralph Gross

"Semi-Supervised Learning of Multi-Factor Models for Face De-Identification". Ralph Gross, Latanya Sweeney, Fernando De la Torre Frade, and Simon Baker, IEEE Conference on Computer Vision and Pattern Recognition, June

"Rrobust Biometrics Person Identification Using Automatic Classifier Fusion of Speech, Mouth, and Face Experts". Niall Fox, Ralph Gross, Jeffrey F. Cohn, Richard B. Reilly. IEEE Transactions on Multimedia. 9(4):701-714

James Herbsleb

" When Cultures Clash: Participation in Open Source Communities and Its Implications For Organizational Commitment". Daniel, S., Maruping, L., Cataldo, M., Herbsleb, J. (2012). International Conference on Information Systems, Shanghai, China.

"Configuring Global Software Teams: A Multi-Company Analysis of Productivity, Quality, and Profits". Ramasubbu, N., Cataldo, M., Balan, R. K. and Herbsleb, J. (2011). In Proceedings, International Conference on Software Engineering, Honolulu, HI, pp. 261-270. (ACM Distinguished Paper award

"Factors leading to integration failures in global feature-oriented development: an empirical analysis". Cataldo, M. and Herbsleb, J. D. (2011). In Proceedings, International Conference on Software Engineering, Honolulu, HI, pp. 161-170.

"Managing a Corporate Open Source Software Asset.". Gurbani, V.K., Garvert, A., & Herbsleb, J.D. (2010). Communications of the ACM 53, 2, pp. 155-159.

"The Impact of Commercial Organizations on Volunteer Participation in an Online Community". Wagstrom, P., Mockus, A., Herbsleb, J.D., & Kraut, R.E. (2010).Academy of Management Conference.

Jason Hong

"RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication". Kim, T. H.-J., Yamada, A., Gligor, V. D., Hong, J., & Perrig, A. (2013). Financial Cryptography and Data Security.

"Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference". Kim, T. H.-J., Gligor, V. D., Guajardo, J., Hong, J., & Perrig, A. (2013). Proceedings of the Workshop on Usable Security.

"The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a City". Cranshaw, J., Schwartz, R., Hong, J.I. and Sadeh, N. ICWSM 2012.

"The state of phishing attacks". Hong, J. Communications of the ACM 55:1, January 2012. pdf

"CANTINA+: A Feature-rich Machine Learning Framework for Detecting Phishing Web Sites". Xiang, G., J.I. Hong, C.P. Rose, L.F. Cranor. ACM Transactions on Information Systems and Security (ACM TISSEC) 14:2, September 2011. pdf

Limin Jia

"Lightweight Source Authentication and Path Validation". Tiffany Hyun-Jin Kim, Limin Jia, Cristina Basescu, Soo Bum Lee, Yih-Chun Hu, and Adrian Perrig. In ACM SIGCOMM, August 2014. 

"Temporal Mode-Checking for Runtime Monitoring of Privacy Policies". Omar Chowdhury, Limin Jia, Deepak Garg, and Anupam Datta. In 26th International Conference on Computer Aided Verification (CAV), July 2014. 

"Continuous Tamper-proof Logging Using TPM 2.0". Arunesh Sinha, Limin Jia, Paul England, and Jacob R. Lorch. In 7th International Conference on Trust & Trustworthy Computing (TRUST), June 2014. 

"A Program Logic for Verifying Secure Routing Protocols". Chen Chen, Limin Jia, Hao Xu, Cheng Luo, Wenchao Zhou, and Boon Thau Loo. In IFIP International Conference on Formal Techniques for Distributed Objects, Components and Systems (FORTE), June 2014. 

"Privacy-Preserving Audit for Broker-Based Health Information Exchange". Se Eun Oh, Ji Young Chun, Limin Jia, Deepak Garg, Carl A. Gunter, and Anupam Datta. In ACM Conference on Data and Application Security and Privacy (CODASPY), Feb. 2014. 

"Design, Implementation and Verification of an Extensible and Modular Hypervisor". Datta, A., Vasudevan, A., Chaki, S., Jia, L., McCune, J., & Newsome, J. (2013). IEEE Symposium on Security and Privacy.

"Privacy Promises That Can Be Kept: A Policy Analysis Method with Application to the HIPAA Privacy Rule". Datta, A., Chowdhury, O., Gampe, A., Niu, J., von Ronne, J., Bennatt, J., Jia, L., & Winsborough, W. H. (2013). ACM Symposium on Access Control Models and Technologies.

"Run-time enforcement of information-flow properties on Android (extended abstract)". Jia, L., Aljuraidan, J., Fragkaki, E., Bauer, L., Stroucken, M., Fukushima, K., Kiyomoto, S., & Miyake, Y. (2013). European Symposium on Research in Computer Security (ESORICS).

Hyong Kim

"I've heard you have problems: Cellular signal monitoring through UE participatory sensing". H. Liang, H.S. Kim, H.-P. Tan, and W. L. Yeow, Globecom: Global Communications Conference, 2014.

"Network monitoring: Present and future", S. Lee, K. Levanti, and H. S. Kim, Computer Networks, vol. 65, pp. 84-98, 2014.

"End-user perspectives of Internet connectivity problems". H. S. Kim and L. S.. Computer Networks, vol. 56, no. 6, pp. 1710-1722, 2012.

"Improving manageability through reorganization of routing-policy configurations". S. Lee, T. Wong, and H. S. Kim. Computer Networks, vol. 56, no. 14, pp. 3192-3205, 2012.

"SageShift: managing SLAs for highly consolidated cloud". Sukwong, O., Sangpetch, A., & Kim, H. S. Silver Spring, MD: IEEE Computer Society Press. (2012). In Press.

"So near, and yet so far: Managing ‘far-away’ interferers in dense femto-cell networks". L. H., H. S. Kim, Y. W., and T. H. P.. Globecom: Global Communications Conference, 2012.

"Towards the improvement of diagnostic metrics: Fault diagnosis for DSL-Based IPTV Networks using the Renyi Entropy". M. A. K., M. S., M. R., R. M., and H. S. Kim. Globecom: Global Communications Conference, 2012.

Ramayya Krishnan

"Comparing Ingress and Egress Detection to Secure Inter-domain Routing: An Experimental Analysis". C. Goebel, D. Neumann, R. Krishnan (2011), ACM Transactions on Internet Technology, forthcoming.

"A Computational Approach to the Comparison of Information Revelation Policies in E-markets". A. Greenwald, K. Kannan, R. Krishnan (2010), Information Systems Research, Vol. 21, No. 1, pp. 15-36.

"An Empirical Analysis of Software Vendors’ Patch Release Behavior: Impact of Vulnerability Disclosure". A. Arora, R Krishnan, R Telang, Y Yang (2010) Information Systems Research, Vol. 21, No. 1, pp. 115-132.

"Correlated Failures, Diversi?cation and Information Security Risk Management". Pei-yu Chen, Gaurav Kataria and Ramayya Krishnan (2010). MIS Quarterly, forthcoming.

"The Halo Effect in Multi-component Ratings and its Implications for Recommender Systems: The Case of Yahoo! Movies". N. Sahoo, R. Krishnan, G. Duncan, J. Callan (2010), Information Systems Research, forthcoming.

Jing Lei

"Lightweight Source Authentication and Path Validation". Tiffany Hyun-Jin Kim, Limin Jia, Cristina Basescu, Soo Bum Lee, Yih-Chun Hu, and Adrian Perrig. In ACM SIGCOMM, August 2014. 

"Temporal Mode-Checking for Runtime Monitoring of Privacy Policies". Omar Chowdhury, Limin Jia, Deepak Garg, and Anupam Datta. In 26th International Conference on Computer Aided Verification (CAV), July 2014. 

"Continuous Tamper-proof Logging Using TPM 2.0". Arunesh Sinha, Limin Jia, Paul England, and Jacob R. Lorch. In 7th International Conference on Trust & Trustworthy Computing (TRUST), June 2014. 

"A Program Logic for Verifying Secure Routing Protocols". Chen Chen, Limin Jia, Hao Xu, Cheng Luo, Wenchao Zhou, and Boon Thau Loo. In IFIP International Conference on Formal Techniques for Distributed Objects, Components and Systems (FORTE), June 2014. 

"Privacy-Preserving Audit for Broker-Based Health Information Exchange". Se Eun Oh, Ji Young Chun, Limin Jia, Deepak Garg, Carl A. Gunter, and Anupam Datta. In ACM Conference on Data and Application Security and Privacy (CODASPY), Feb. 2014. 

"Design, Implementation and Verification of an Extensible and Modular Hypervisor". Datta, A., Vasudevan, A., Chaki, S., Jia, L., McCune, J., & Newsome, J. (2013). IEEE Symposium on Security and Privacy.

"Privacy Promises That Can Be Kept: A Policy Analysis Method with Application to the HIPAA Privacy Rule". Datta, A., Chowdhury, O., Gampe, A., Niu, J., von Ronne, J., Bennatt, J., Jia, L., & Winsborough, W. H. (2013). ACM Symposium on Access Control Models and Technologies.

"Run-time enforcement of information-flow properties on Android (extended abstract)". Jia, L., Aljuraidan, J., Fragkaki, E., Bauer, L., Stroucken, M., Fukushima, K., Kiyomoto, S., & Miyake, Y. (2013). European Symposium on Research in Computer Security (ESORICS).

Peter Madsen

"Dynamic Transparency, Prudential Justice, and Corporate Transformation: Becoming Socially Responsible in the Internet Age". Special Issue on Network Ethics, Journal of Business Ethics , accepted and forthcoming in 2010.

"A Survey of International Corporate Responsibility". Edited by John Hooker, Mohamed Doboshi and Peter Madsen, Volume 4 of the International Corporate Responsibility Series, Philosophy Documentation Center, University of Delaware, 2009.

"Corporate Dynamic Transparency: The new ICT-Driven Ethics?". Ethics and Information Technology, by A. Vaccaro, and P. Madsen, 11(2), 113-122, 2009.

"ICT and an NGO: Difficulties in Attempting to be Extremely Transparent". Ethics and Information Technology, by A. Vaccaro, and P. Madsen, 11(3), 221-231, 2009.

"Transparency, and Information and Communication Technology: Social Responsibility and Accountability in Business and Education". Edited by Antonino Vaccaro, Hugo Horta and Peter Madsen, Philosophy Documentation Center, 2008.

Ken Mai

"Data Retention in MLC NAND Flash Memory: Characterization, Optimization and Recovery; nominated for best paper award," Y. Cai, Y. Luo, E. F. Haratsch, K. W. Mai, and O. Mutlu, HPCA: IEEE International Symposium on High-Performance Compute Architecture, 2015.

"Comparative Evaluation of FPGA and ASIC Implementations of Bufferless and Buffered Routing Algorithms for On-Chip Networks," Y. Cai, K. W. Mai, and O. Mutlu, ISQED: International Symposium on Quality Electronic Design, 2015.

"SLIC: Statistical Learning in Chip," R. D. Blanton, X. Li, K. W. Mai, D. Marculescu, R. Marculescu, J. Paramesh, J. Schneider, and D. E. Thomas,  ISIC: International Symposium on Integrated Circuits, 2014.

"Neighbor-Cell Assisted Error Correction for MLC NAND Flash Memories," Y. Cai, G. Yalcin, O. Mutlu, E. Haratsch, O. Unsal, A. Cristal, and K. W. Mai,  ACM Sigmetrics Conference, pp. 491-504, 2014.

"An Efficient Reliable PUF-Based Cryptographic Key Generator in 65nm CMOS". Bhargava, M., & Mai, K. W. (2014). Design, Automation, and Test in Europe Conference (DATE).

"Building Fast, Dense, Low-Power Caches Using Erasure-Based Inline Multi-Bit ECC". Kim, J., McCartney, M., Bhargava, M., Yang, H., Mai, K. W., & Falsafi, B. (2013). Pacific Rim International Symposium on Dependable Computing (PRDC).

"Error Analysis and Retention-Aware Error Management for NAND Flash Memory". Cai, Y., Yalcin, G., Mutlu, O., Haratsch, E., Cristal, A., Unsal, O., & Mai, K. W. (2013). Intel Technology Journal, 17(1), 140-164.

" SCAN-PUF: A Low Overhead Physically Unclonable Function from Scan Chain Power-Up States". Niewenhuis, B., Blanton, R. D., Bhargava, M., & Mai, K. W. (2013). International Test Conference, 1-8.

"Threshold Voltage Distribution in MLC NAND Flash Memory: Characterization, Analysis, and Modeling". Cai, Y., Haratsch, E., Mutlu, O., & Mai, K. W. (2013). DATE: Design Automation and Test in Europe, 1285-1290.

Diana Marculescu

"SLIC: Statistical Learning in Chip". R. D. Blanton, X. Li, K. W. Mai, D. Marculescu, R. Marculescu, J. Paramesh, J. Schneider, and D. E. Thomas, ISIC: International Symposium on Integrated Circuits, 2014.

"Energy-Efficient VFI-Partitioned Multicore Design Using Wireless NoC Architectures," R. Kim, G. Liu, P. Wettin, R. Marculescu, D. Marculescu, and P. P. Panda, CASES: International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, 2014.

"The EDA Challenges in the Dark Silicon Era," M. Shafique, S. Garg, D. Marculescu, and J. Henkel,  DAC: Proceedings of the Design Automation Conference, pp. 6, 2014.

"Beyond Poisson: Modeling Inter-Arrival Times of Requests in a Data," D.-C. Juan, L. Li, H.-K. Peng, D. Marculescu, and C. Faloutsos,  PAKDD: Pacific-Asia Conference on Knowledge Discovery and Data Mining, 2014.

"A Comprehensive and Accurate Latency Model for Network-on-Chip Performance Analysis,"  Z. Qian, D.-C. Juan, P. Bogdan, C.-Y. Tsui, D. Marculescu, and R. Marculescu, ASPDAC: IEEE/ACM Asian-South Pacific Design Automation Conference, 2014.

"Workshops on Extreme Scale Design Automation (ESDA) Challanges and Opportunities for 2025 and Beyond,"  R.I. Bahar, A. K. Jones, S. Katkoori, P.H. Madden, D. Marculescu, and I. Markov, Computing Community Corsortium (CCC); Magazine, 2014.

"Statistical Peak Temperature Prediction and Thermal Yield Improvement for 3D Chip-Multiprocessors," D.-C. Juan, S. Garg, and D. Marculescu, ACM Transactions on Design Automation of Electronic Systems, vol. 19, no. 4, 2014.

"Power-Planning-Aware Soft Error Hardening via Selective Voltage Assignment," K.-C. Wu and D. Marculescu, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 22, no. 1, pp. 136-145, 2014.

"Power-Planning-Aware Soft Error Hardening via Selective Voltage Assignment". Wu, K.-C., & Marculescu, D. (2014). IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 22(1), 136-145.

"Addressing Process Variations at the Microarchitecture and System Level". Garg, S., & Marculescu, D. (2013). Foundations and Trends in Electronic Design Automation, 6(3), 217-291.

" Learning the Optimal Operating Point for Many-Core Systems with Extended Range Voltage/Frequency Scaling. ". Juan, D.-C., Garg, S., Park, J., & Marculescu, D. (2013).CODES+ISSS: IEEE/ACM International Conference on Hardware-Software Codesign and System Synthesis, 1-10.

Radu Marculescu

"SLIC: Statistical Learning in Chip". R. D. Blanton, X. Li, K. W. Mai, D. Marculescu, R. Marculescu, J. Paramesh, J. Schneider, and D. E. Thomas, ISIC: International Symposium on Integrated Circuits, 2014.

"Energy-Efficient VFI-Partitioned Multicore Design Using Wireless NoC Architectures". R. Kim, G. Liu, P. Wettin, R. Marculescu, D. Marculescu, and P. P. Panda, CASES: International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, 2014.

"Low-Latency Wireless 3D NoCs Via Randomized Shortcut Chips". H. Matsutani, M. Koibuchi, I. Fujiwara, T. Kagami, Y. Take, T. Kuroda, P. Bogdon, R. Marculescu, and H. Amano, DATE: Design Automation and Test in Europe, 2014.

"An efficient Network-on-Chip (NoC) based multicore platform for hierarchical parallel genetic algorithms". Y. Xue, Z. Qian, G. Wei, P. Bogdan, C.-Y. Tsui, and R. Marculescu, NOCS: The ACM/IEEE International Symposium on Networks-on-Chip, vol. 2014, pp. 17-24, 2014.

"ASH: Scalable Mining of Collective Behaviors in Social Media using Riemannian Geometry". H.-K. Peng and R. Marculescu, ASE BIGDATA/SOCIALCOM/CYBERSECURITY Conference, vol. 2014, pp. 10, 2014.

"Don't Let History Repeat Itself: Optimal Multidrug Quorum Quenching of Pathogens Network". G. Wei and R. Marculescu, First ACM International Conference on Nanoscale Computing and Communication, pp. 9, 2014.

"A Comprehensive and Accurate Latency Model for Network-on-Chip Performance Analysis". Z. Qian, D.-C. Juan, P. Bogdan, C.-Y. Tsui, D. Marculescu, and R. Marculescu, ASPDAC: IEEE/ACM Asian-South Pacific Design Automation Conference, 2014.

"A Comprehensive and Accurate Latency Model for Network-on-Chip Performance Analysis". Qian, Z., Juan, D.-C., Bogdan, P., Tsui, C.-Y., Marculescu, D., & Marculescu, R. (2014). ASPDAC: IEEE/ACM Asian-South Pacific Design Automation Conference.

" Dynamic power management for multidomain system-on-chip platforms: An optimal control approach". Bogdon, P., Marculescu, R., & Jain, S. (2013). ACM Transactions on Design Automation of Electronic Systems, 18(4).

"Performance Evaluation of Multicore Systems: From Traffic Analysis to Latency Predictions (Embedded Tutorial)". Qian, Z., Bogdon, P., Tsui, C.-Y., & Marculescu, R. (2013).  ICCAD: Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 82-84.

Roy Maxion

"Making Experiments Dependable". Maxion, Roy A. The Next Wave / NSA Magazine, Vol. 19, No. 1, pp. 13-22, March 2012, National Security Agency, Ft. Meade, Maryland. Reprinted from Dependable and Historic Computing, LNCS 6875, pp. 344-357, Springer, Berlin, 2011.

"Should Security Researchers Experiment More and Draw More Inferences?". Killourhy, Kevin S. and Maxion, Roy A. In 4th Workshop on Security Experimentation and Test (CSET-11), in conjunction with the 20th USENIX Security Symposium, 08-12 August 2011, San Francisco, California. "http://static.usenix.org/event/cset11/tech/"

"Keystroke Biometrics with Number-Pad Input". Maxion, Roy A. and Killourhy, Kevin S. In IEEE/IFIP International Conference on Dependable Systems & Networks (DSN-10), pp. 201-210, Chicago, Illinois, 28 June to 01 July 2010. IEEE Computer Society Press, Los Alamitos, California, 2010.

"Why Did My Detector Do That?! Predicting Keystroke-Dynamics Error Rates". Killourhy, Kevin S. and Maxion, Roy A. 13th International Symposium on Recent Advances in Intrusion Detection, 15-17 September 2010, Ottawa, Ontario, Canada. S. Jha, R. Sommer, and C. Kreibich (Eds.): RAID 2010, Lecture Notes in Computer Science, LNCS Vol. 6307, pp. 256-276, Springer-Verlag, Berlin/Heidelberg, 2010. ISBN 978-3-642-15511-6.

"Comparing Anomaly-Detection Algorithms for Keystroke Dynamics". Killourhy, Kevin S. and Maxion, Roy A. In International Conference on Dependable Systems & Networks (DSN-09), pp. 125-134, Estoril, Lisbon, Portugal, 29 June to 02 July 2009. IEEE Computer Society Press, Los Alamitos, California, 2009.

Nancy Mead

"Making the Business Case for Software Assurance". Mead, N. R., Allen, J., Conklin, W. A., Drommi, A., Harrison, J., Ingalsbe, J., Rainey, J., & Shoemaker, D. (CMU/SEI-2009-SR-001). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2009.

"Novel Methods of Incorporating Security Requirements Engineering into Software Engineering Courses and Curricula". Mead, N. R. & Shoemaker, D. Ch. VI, 98-113. Software Engineering: Effective Teaching and Learning Approaches and Practices. Edited by Ellis, Demurjian, and Naveda. IGI Global, 2008.

"Software Security Engineering: A Guide for Project Managers". Allen, J., Barnum, S., Ellison, R., McGraw, G., & Mead, N. R. Addison-Wesley, 2008.

"Threat Modeling: Diving into the Deep End". Ingalsbe, J. A., Kunimatsu, L., Baeten, T., & Mead, N. R. IEEE Software 5, 1 (Jan./Feb. 2008): 28-34.

"Optimizing Investments in Security Countermeasures: A Practical Tool for Fixed Budgets". Caulkins, J., Hough, E. D., Mead, N. R., & Osman, H. IEEE Security & Privacy 5, 5 (Sept./Oct. 2007): 24-27.

Andrew Moore

"A Pattern for Increased Monitoring for Intellectual Property Theft by Departing Insiders". Moore, A.P., Hanley, M., and Mundie, D. 2012. In Proc. 18th Conference on Pattern Languages of Programs (PLoP). PLoP'11, October 21-23 2011, ACM Press ACM 978-1-4503-1283-7, 2012. www.hillside.net/plop/2011/papers/D-6-Moore.pdf

"A Pattern for Trust Trap Mitigation". Mundie, D. and A.P. Moore. 2012. In Proc. 18th Conference on Pattern Languages of Programs (PLoP). PLoP'11, October 21-23 2011, ACM Press ACM 978-1-4503-1283-7, 2012. http://www.hillside.net/plop/2011/papers/D-23-Mundie.doc

"The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)". D.M. Cappelli, Moore, A.P., R.F. Trzeciak. Addison-Wesley, 2012.

"A Preliminary Model of Insider Theft of Intellectual Property". Moore, A. P., Cappelli, D. M., Caron, T.C., Shaw, E., Spooner, D. & Trzeciak, R. F. (2011). Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, Special Issue Addressing Insider Threats and Information Leakage, 2011. http://www.isyou.info/jowua/papers/jowua-v2n1-2.pdf

"Goal-Based Assessment for the Cybersecurity of Critical Infrastructure". Merrell, S., Moore, A. P., Stevens, J., In Proc. of the 2010 IEEE International Conference on Technologies for Homeland Security, Waltham, MA, 8-10 November 2010.

Priya Narasimhan

"Challenges and Opportunities for Embedded Computing in Retail Environments". K. Mankodiya, R. Gandhi, and P. Narasimhan. 3rd International conference on Sensor Systems and Software, pp. 121-136, 2012.

"Detection and Diagnosis of QoS Problems for Large-Scale Mobile Wireless Video Streaming". N. Mickulicz, R. Gandhi, and P. Narasimhan. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

"Draco: Statistical Diagnosis of Chronic Problems in Large Distributed Systems". S. Pertet, K. Joshi, M. Hiltunen, S. Daniels, R. Gandhi, and P. Narasimhan. DSN: Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2012.

"Theia: visual signatures for problem diagnosis in large hadoop clusters". E. Garduno, S. Kavulya, J. Tan, R. Gandhi, and P. Narasimhan. Large Installation System Administration Conference (LISA), vol. 26, pp. 33-42, 2012.

Ryan O'Donnell

"A new point of NP-hardness for Unique Games ". R. O'Donnell, J. Wright. (pdf) STOC '12

"Gaussian Noise Sensitivity and Fourier Tails". G. Kindler, R. O'Donnell. (pdf) CCC '12

"Linear Programming, Width-1 CSPs, and Robust Satisfaction". G. Kun, R. O'Donnell, S. Tamaki, Y. Yoshida, Y. Zhou. (pdf) ITCS '12

"Hardness of Max-2Lin and Max-3Lin over integers, reals, and large cyclic groups". R. O'Donnell, Y. Wu, Y. Zhou. (pdf) CCC '11

"The Fourier Entropy-Influence Conjecture for certain classes of Boolean Functions". R. O'Donnell, J. Wright, Y. Zhou. (pdf) ICALP '11

Bryan Parno

"Comparing Ingress and Egress Detection to Secure Inter-domain Routing: An Experimental Analysis". C. Goebel, D. Neumann, R. Krishnan (2011), ACM Transactions on Internet Technology, forthcoming.

"A Computational Approach to the Comparison of Information Revelation Policies in E-markets". A. Greenwald, K. Kannan, R. Krishnan (2010), Information Systems Research, Vol. 21, No. 1, pp. 15-36.

"An Empirical Analysis of Software Vendors’ Patch Release Behavior: Impact of Vulnerability Disclosure". A. Arora, R Krishnan, R Telang, Y Yang (2010) Information Systems Research, Vol. 21, No. 1, pp. 115-132.

"Correlated Failures, Diversi?cation and Information Security Risk Management". Pei-yu Chen, Gaurav Kataria and Ramayya Krishnan (2010). MIS Quarterly, forthcoming.

"The Halo Effect in Multi-component Ratings and its Implications for Recommender Systems: The Case of Yahoo! Movies". N. Sahoo, R. Krishnan, G. Duncan, J. Callan (2010), Information Systems Research, forthcoming.

Adrian Perrig

"KISS: "Key it Simple and Secure" Corporate Key Management". Zhou, Z., Han, J., Lin, Y.-H., Perrig, A., & Gligor, V. D. (2013). International Conference on Trust and Trustworthy Computing (TRUST).

"ReDABLS: Revisiting device attestation with bounded leakage of secrets". Zhao, J., Gligor, V. D., Perrig, A., & Newsome, J. (2013). 21st International Workshop on Security Protocols.

"RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication". Kim, T. H.-J., Yamada, A., Gligor, V. D., Hong, J., & Perrig, A. (2013). Financial Cryptography and Data Security.

"Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference". Kim, T. H.-J., Gligor, V. D., Guajardo, J., Hong, J., & Perrig, A. (2013). Proceedings of the Workshop on Usable Security.

"STRIDE: Sanctuary Trail -- Refuge from Internet DDoS Entrapment". Hsiao, H.-C., Kim, T. H.-J., Lee, S. B., Zhang, X., Yoo, S., Gligor, V. D., & Perrig, A. (2013). ASIACCS: Proceedings of the ACM Symposium on Information, Computer and Communication Security.

Frank Pfenning

"Logical approximation for program analysis". Robert J. Simmons and Frank Pfenning. Submitted to the Journal on Higher-Order and Symbolic Computation, March 2010.

"Possession as linear knowledge". Frank Pfenning. In B.Farwer, editor, Proceedings of the 3rd International Workshop on Logics, Agents, and Mobility (LAM 2010), Edinburgh, Scotland, July 2010. Abstract of invited talk. To appear.

" Refinement types for logical frameworks and their interpretation as proof irrelevance". William Lovas and Frank Pfenning. Logical Methods in Computer Science, May 2010. To appear.

"Session types as intuitionistic linear propositions". Luís Caires and Frank Pfenning. In P.Gastin and F.Laroussinie, editors, Proceedings of the 21st International Conference on Concurrency Theory (CONCUR 2010), Paris, France, August 2010. Springer LNCS. To appear.

"The practice and promise of substructural frameworks". Frank Pfenning. In K.Crary and M.Miculan, editors, Proceedings of 5th International Workshop on Logical Frameworks and Meta-Languages: Theory and Practice (LFMTP 2010), Edinburgh, Scotland, July 2010. Abstract of invited talk. To appear.

Raj Rajkumar

"Bounding Memory Interference Delay in COTS-based Multi-Core Systems". H. Kim, D. de Niz, B. Andersson, M. Klein, O. Mutlu, and R. Rajkumar, RTAS: IEEE Real-time and Embedded Technology and Applications Symposium, 2014.

"On Resource Overbooking in an Unmanned Aerial Vehicle". Niz, D. D. N., Wage, L., Storer, N., Rowe, A., & Rajkumar, R. (2013). IEEE International Conference on Embedded Software and Systems (IEEE ICESS).

"pCOMPATS: Period-Compatible Task Allocation and Splitting on Multi-Core Processors". A. Kandhalu, K. Lakshmanan, J. Kim, and R. Rajkumar. 2012.

"QoS based Resource Allocation for Next-Generation Spacecraft Networks". A. Kandhalu and R. Rajkumar. IEEE Real-Time Systems Symposium, 2012.

"SAFER: System-level Architecture for Failure Evasion in Real-time Applications". R. Rajkumar and J. Kim. IEEE Real-Time Systems Symposium, 2012.

"Special Section on Cyber-Physical Systems and Cooperating Objects". C. Lu, R. Rajkumar, and E. Tovar. IEEE Transactions on Industrial Informatics, vol. 8, no. 2, pp. 378-378, 2012.

Anthony Rowe

"Distributed Control of a Swarm of Buildings Connected to a Smart Grid: Demo Abstract". B. Aksanli, A. S. Akyurek, M. Behl, M. Clark, A. Donzé, P. Dutta, P. Lazik, M. Maasoumy, R. Mangharam, T. X. Nghiem, V. Raman, A. Rowe, A. Sangiovanni-Vincentelli, S. Seshia, T. S. Rosing, and J. Venkatesh, in Proceedings of the 1st ACM Conference on Embedded Systems for Energy-Efficient Buildings, New York, NY, USA: ACM, pp. 172–173, 2014.

"Fine-grained remote monitoring, control and pre-paid electrical service in rural microgrids". M. Buevich, D. Schnitzer, T. Escalada, A. Jacquiau-Chamski, and A. Rowe, in IPSN’14, Proceedings of the 13th International Symposium on Information Processing in Sensor Networks (part of CPS Week), April 15-17, 2014, Berlin, Germany, pp. 1–12, 2014.

"Hybrid Visible Light Communication for Cameras and Low-power Embedded Devices". N. Rajagopal, P. Lazik, and A. Rowe, in Proceedings of the 1st ACM MobiCom Workshop on Visible Light Communication Systems, New York, NY, USA: ACM, pp. 33–38, 2014.

"Programmable Automotive Headlights". R. Tamburo, E. Nurvitadhi, A. Chugh, M. Chen, A. Rowe, T. Kanade, and S. G. Narasimhan, in Computer Vision - ECCV 2014 - 13th European Conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part IV, pp. 750–765, 2014.

"Mortar.io: a concrete building automation system: demo abstract". C. Palmer, P. Lazik, M. Buevich, J. Gao, M. E. Berges, A. Rowe, R. L. Pereira, and C. Martin, Proceedings of the 1st ACM Conference on Embedded Systems for Energy-Efficient Buildings, pp. 204–205, 2014.

"A System for Fine-Grained Remote Monitoring, Control and Pre-Paid Electrical Service in Rural Microgrids". M. Buevich, D. Schnitzer, T. Escalada, A. Jacquiau-Chamski, and A. Rowe, IPSN: ACM/IEEE International Conference on Information Processing in Sensor Networks, 2014.

"Is There a Place for VLC in Wireless Sensor Networks?".  N. Rajagopal, P. Lazik, and A. Rowe, Proceedings of the 1st ACM MobiCom Workshop on Visible Light Communication Systems, pp. 33–38, 2014.

"The Swarm at the Edge of the Cloud". E. A. Lee, B. Hartmann, J. Kubiatowicz, T. S. Rosing, J. Wawrzynek, D. Wessel, J. M. Rabaey, K. Pister, A. L. Sangiovanni-Vincentelli, S. A. Seshia, D. Blaauw, P. Dutta, K. Fu, C. Guestrin, B. Taskar, R. Jafari, D. L. Jones, V. Kumar, R. Mangharam, G. J. Pappas, R. M. Murray, and A. Rowe, IEEE Design & Test, vol. 31, no. 3, pp. 8–20, 2014.

"On Developing User Interfaces for Piloting Unmanned Systems". J. Edmondson, G. Cahill, and A. Rowe, 2014.

" Visual Light Landmarks for Mobile Devices". Rajagopal, N., Lazik, P., & Rowe, A. (2014). IPSN: ACM/IEEE International Conference on Information Processing in Sensor Networks

Marios Savvides

"A Robust Monte Carlo and Tensor-based Shape Context Matching Approach to Facial Beard/Moustache Ranking and Retrieval". T. H. N. Le, K. Luu, K. Singh, and M. Savvides, Neural Information Processing Systems (NIPS) Annual Workshop on Women in Machine Learning, 2014.

"Distributed Class Dependent Feature Analysis - A Big Data Approach".  C. Zhu, K. Luu, and M. Savvides, IEEE International Conference on Big Data, pp. 201-206, 2014.

 "A Novel Eyebrow Segmentation and Eyebrow Shape-based Identification". U. Prabhu, T. H. N. Le, and M. Savvides, ICB: International Conference on Biometrics, pp. 1-8, 2014.

"Facial Ethnic Appearance Synthesis". J. Xu and M. Savvides, European Conference on Computer Vision (ECCV) Workshop on Soft Biometrics, 2014.

"Weight-optimal Local Binary Patterns". J. Xu and M. Savvides, European Conference on Computer Vision (ECCV) Workshop on Computer Vision, pp. pp. 148–159, 2014.

"Hallucinating the Full Face from the Periocular Region via Dimensionally Weighted K-SVD and Beyond". D. Pal, J. Xu, and M. Savvides, IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Biometrics Workshop, pp. 1-8, 2014.

"Subspace Based Discrete Transform Encoded Local Binary Patterns Representation for Robust Periocular Matching on NIST’s Face Recognition Grand Challenge". F. J. Xu and M. Savvides, IEEE Transactions on Image Processing: a Publication of the IEEE Signal Processing Society, vol. 23, no. 8, pp. 3409-3505, 2014.

"An iris image super-resolution framework based on gaussian translational weighted model for less constrained iris recognition system". Li, Y., & Savvides, M. (2014). To appear in IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI).

"Sparse Feature Extraction for Pose-Tolerant Face Recognition". Abiantun, R., Prabhu, U., & Savvides, M. (in press). To appear in IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI).

"An Augmented Linear Discriminant Analysis Approach for Identifying Identical Twins with the Aid of Facial Asymmetry Features". Xu, F., & Savvides, M. (2013).  IEEE Computer Vision Pattern Recognition (CVPR) Workshop on Biometrics, 56-63.

"Iris Spoofing: Reverse Engineering the Daugman Feature Extraction Scheme". Venugopalan, S., & Savvides, M. (2013). In Kevin Bowyer and Mark Burge (Eds.) Handbook of Iris Recognition (Advances in Computer Vision and Pattern Recognition) (pp. 355-367). Springer Verlag.

William Scherlis

"Symposium: Software, Scale, Strategy". NITRD 20th Anniversary (2012).

"Software: the endless value spiral". Atlantic G-20 Conference: (PDF) in the conference proceedings (2009)

"Endless Value Spiral". Computerworld, interview with Gary Anthes, 2008

"National Research Council". National Research Council: Advancing software-intensive systems producibility for the DoD (chair): Uncertainty at Scale (2007). DoD Software Research Needs (2008).

Robert Seacord

"Source Code Analysis Laboratory (SCALe) ". (SCALe) Robert C. Seacord William Dormann James McCurley Philip Miller Robert Stoddard David Svoboda Jefferson Welch April 2012

"Library | The CERT Oracle Secure Coding Standard for Java". This is the first authoritative, comprehensive compilation of code-level requirements for building secure systems in Java.

"As-If Infinitely Ranged Integer Model, Second Edition". Dannenberg, Roger; Dormann, Will; Keaton, David; Plum, Thomas; Seacord, Robert; Svoboda, David; Volkovitsky, Alex; & Wilson, Timothy. (CMU/SEI-2010-TN-008). Software Engineering Institute, Carnegie Mellon University, 2010.

"Source Code Analysis Laboratory (SCALe)". Robert C. Seacord William Dormann James McCurley Philip Miller Robert Stoddard David Svoboda Jefferson Welch December 2010

"Specifications for Managed Strings, Second Edition". Burch, Hal; Long, Fred; Rungta, Raunak; Seacord, Robert; & Svoboda, David. (CMU/SEI-2010-TR-018). Software Engineering Institute, Carnegie Mellon University, 2010. http://www.sei.cmu.edu/library/abstracts/reports/10tr018.cfm

Srinivasan Seshan

"DIRC: Increasing Indoor Wireless Capacity Using Directional Antennas". X. Liu, A. Sheth, M. Kaminsky, K. Papagiannaki, S. Seshan, and P. Steenkiste. In Proceedings of the ACM SIGCOMM, Aug. 2009.

"Enabling MAC Protocol Implementations on Software-defined Radios". G. Nychis, T. Hottelier, Z. Yang, S. Seshan, and P. Steenkiste. In Proceedings of the USENIX NSDI, (Boston, MA), Apr. 2009.

"Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries". A. Sheth, S. Seshan, and D. Wetherall. In Proceedings of International Conference on Pervasive Computing, (Berlin, Heidelberg), May 2009, pp. 274-290.

"RFDump: An Architecture for Monitoring the Wireless Ether". K. Lakshminarayanan, S. Sapra, S. Seshan, and P. Steenkiste. In Proceedings of ACM CoNEXT, (Rome, Italy), Dec. 2009.

"Wifi-reports: improving wireless network selection with collaboration". J. Pang, B. Greenstein, M. Kaminsky, D. McCoy, and S. Seshan. In Proceedings of ACM MobiSys, (New York, NY, USA), June 2009, pp. 123-136.

Bruno Sinopoli

"Toward a Principled Framework to Design Dynamic Adaptive Streaming Algorithms over HTTP". X. Yin, V. Sekar, and B. Sinopoli, in Proceedings of the 13th ACM Workshop on Hot Topics in Networks, pp. 9, 2014.

"Modeling impact of attacks, recovery, and attackability conditions for situational awareness". H. Cam, P. Mouallem, Y. Mo, B. Sinopoli, and B. Nkrumah, Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), 2014 IEEE International, pp. 181-187, 2014.

"Network observability and localization of sources of diffusion in tree networks with missing edges". S. Zejnilovic, J. Gomes, and B. Sinopoli, European Signal Processing Conference (EUSIPCO), pp. 2345-2349, 2014.

"Network observability for source localization in graphs with unobserved edges". S. Zejnilovic, D. Mitsche, J. Gomes, and B. Sinopoli, IEEE Global Conference on Signal and Information Processing (GlobalSIP), pp. 857-861, 2014.

"Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs". Y. Mo, S. Weerakkody, and B. Sinopoli, IEEE Control Systems Magazine, vol. 35, no. 1, pp. 93-109, 2015.

"Stochastic Event-Triggered Sensor Schedule for Remote State Estimation". D. Han, Y. Mo, J. Wu, S. Weerakkody, B. Sinopoli, and L. Shi, IEEE Transactions on Automatic Control, vol. PP, no. 99, pp. 1, 2015.

"Detecting Integrity Attacks on SCADA Systems". Y. Mo, R. Chabukswar, and B. Sinopoli, IEEE Transactions on Control Systems Technology: a Publication of the IEEE Control Systems Society, vol. 22, no. 4, pp. 1396-1407, 2014.

"Detection in Adversarial Environments". K.G. Vamvoudakis, J.P. Hespanha, B. Sinopoli, and Y. Mo, IEEE Transactions on Automatic Control, vol. 59, no. 12, pp. 3209-3223, 2014.

"Resilient Detection in the Presence of Integrity Attacks". Y. Mo, J.P. Hespanha, and B. Sinopoli, IEEE Transactions on Signal Processing, vol. 62, no. 1, pp. 31-43, 2014.

"Secure Estimation in the Presence of Integrity Attacks". Y. Mo and B. Sinopoli, IEEE Transactions on Automatic Control, vol. PP, no. 99, pp. 1, 2014.

"Resilient Detection in the Presence of Integrity Attacks".  Y. Mo, J. Hespanha, and B. Sinopoli, IEEE Transactions on Signal Processing, vol. 62, no. 1, pp. 31-43, 2014.

"Consensus and Products of Random Stochastic Matrices: Exact Rate for Convergence in Probability". Bajovic, D., Xavier, J., Moura, J. M. F., & Sinopoli, B. (2013). IEEE Transactions on Signal Processing, 61(10), 5987-6002.

"Network observability and localization of the source of diffusion based on a subset of nodes". Zejnilovic, S., Gomes, J. P., & Sinopoli, B. (2013). IEEE Allerton Conference on Communication, Control, and Computing, 847-852.

Asim Smailagic

"A Technology Probe of Wearable In-Home Computer-Assisted Physical Therapy". K. Huang, P. Sparto, S. Kiesler, A. Smailagic, J. Mankoff, and D. Siewiorek, CHI: Conference Proceedings, Conference on Human Factors in Computing Systems, vol. April 2014, 2014.

"EMA Data Reveal Associations Between Sleep and Self-Efficacy for Adhering to a Healthy Lifestyle Plan". L. Burke, S. Rathbun, P. Strollo, E. Chasens, A. Smailagic, D. Siewiorek, L. Ewing, B. French, and S. Shiffman, American Heart Association Annual Conference on Epidemmiology and Prevention/Nutrition, Physical Activity and Metabolism, 2014.

"QuiltView: a Crowd-Sourced Video Response System". Z. Chen, W. Hu, K. Ha, J. Harkes, B. Gilbert, B. Hong, D. Siewiorek, A. Smailagic, and M. Satyanarayanan, ACM HotMobile, 2014.

"The Usability Impact of Prefetching and Caching on Cloud-sourced Applications". B. Taylor, A. Yoshihisa, M. Satyanarayanan, A. Dey, D. Siewiorek, and A. Smailagic, SigMobile, 2014.

"Using Physiological Sensors to Detect Levels of User Frustration Induced by System Delays". B. Taylor, A. Dey, A. Smailagic, and D. Siewiorek, CHI: Conference Proceedings, Conference on Human Factors in Computing Systems.

"An Adaptive Filter for the Removal of Drifting Sinusoidal Noise without a Reference". J.W. Kelly, D. Siewiorek, A. Smailagic, and W. Wang,  IEEE Journal on Biomedical and H ealth Informatics, 2014.

"Chapter 12: Wearable Computers". D. Siewiorek, A. Smailagic, and T. Starner. in The Human-Computer Interaction Handbook, Julie Jacko, Ed., Boca Raton, FL: CRC Press, Taylor & Francis Group, 2012.

"HeadCoach: Home Balance Rehabilitation Exercise Monitoring". K. Huang, S. Kiesler, D. Siewiorek, A. Smailagic, and P. Sparto, ISWC: International Symposium on Wearable Computers, 2012.

"iPod for home balance rehabilitation exercise monitoring". K. Huang, J.P. Sparto, S. Kiesler, D. Siewiorek, and A. Smailagic. ISWC: International Symposium on Wearable Computers, pp. 116-117, 2012.

"Sparse linear regression with elastic net regularization for brain-computer interfaces". J.W. Kelly, A.D. Degenhart, D. Siewiorek, A. Smailagic, and W. Wang.  IEEE International Conference on Engineering in Medicine and Biology Society (EMBC), pp. 4275-4278, 2012.

"Usability testing for a multi-user telehealth kiosk prototype". K. L. Courtney, J. T. Matthews, J. M. McMillan, L. Person Mecca, A. Smailagic, and D. Siewiorek. European Federation for Medical Informatics, 2012.

Patrick Tague

"A5: Automated Analysis of Adversarial Android Applications". T. Vidas, J. Tan, J. Nahata, C.-L. Tan, N. Christin, and P. D. Tague, Proceedings of the 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2014), 2014.

"Non-Invasive User Tracking via Passive Sensing: Privacy Risks of Time-Series Occupancy Measurement". X. Wang and P. D. Tague, ACM Workshop on Artificial Intelligence and Security (AISec), 2014.

"JADE: Jamming-Averse Routing on Cognitive Radio Mesh Networks". Y. S. Kim, B. DeBruhl, and P. D. Tague, IEEE Workshop on Cognitive Radio and Electromagnetic Spectrum Security (CRESS), 2014.

"LAPWiN: Location-Aided Probing for Protecting User Privacy in Wi-Fi Networks". Y. S. Kim, Y. Tian, L. T. Nguyen, and P. D. Tague, IEEE Conference on Communications and Network Security (CNS), 2014.

"IdentityLink: User-Device Linking through Visual and RF-Signal Cues". L. T. Nguyen, Y. S. Kim, P. D. Tague, and J. Zhang, ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), 2014.

"Proximity-Based Wireless Access Control through Considerate Jamming". Y. S. Kim and P. D. Tague, ACM Workshop on Security and Privacy Aspects of Mobile Environments (SPME), 2014.

"PrivateDroid: Private Browsing Mode for Android". S. M. Kywe, C. Landis, Y. Pei, J. Satterfield, Y. Tian, and P. D. Tague, IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2014.

"All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API". Y. Tian, Y.-C. Liu, A. Bhosale, L.-S. Huang, P. D. Tague, and C. E. Jackson, IEEE Symposium on Security and Privacy, 2014.

"OAuth Demystified for Mobile Application Developers". E. Chen, Y. Pei, S. Chen, Y. Tian, R. Kotcher, and P. D. Tague, ACM Conference on Computer and Communications Security Proceedings, 2014.

"Power Napping with Loud Neighbors: Optimal Energy-Constrained Jamming and Anti-Jamming". B. DeBruhl, C. Kroer, A. Datta, T. Sandholm, and P. D. Tague, WiSec: Proceedings of the ACM Conference on Wireless Network Security, 2014.

"Keeping up with the Jammers: Observe-and-Adapt Algorithms for Studying Mutually Adaptive Opponents". B. DeBruhl and P. D. Tague, Pervasive and Mobile Computing, vol. 12, no. 1, pp. 244-257, 2014.

"Energy-Governed Resilient Networked Systems". Athreya, A. P., Chan-Maestas, H., Katz, E., Tague, P. D., & Iannucci, R. A. (2014). IEEE Consumer Communications and Networking Conference (CCNC).

Ozan Tonguz

"Implementing Virtual Traffic Lights with Partial Penetration: A Game-Theoretic Approach". O. Tonguz, W. Viriyasitavat, and J. M. Roldan, IEEE Communications Magazine, vol. 52, no. 12, pp. 173-182, 2014.

"Geometry-Based Vehicle-to-Vehicle Channel Modeling for Large-Scale Simulation". M. Boban, J. Barros, and O. Tonguz, IEEE Transactions on Vehicular Technology, vol. 63, no. 9, pp. 4146-4164, 2014.

"Deploying Roadside Units in Sparse Vehicular Networks: What Really Works and What Does Not". A. B. Reis, F. Neves, S. Sargento, and O. Tonguz, IEEE Transactions on Vehicular Technology, vol. 63, no. 6, pp. 2794-2806, 2014.

"Inter-Vehicle Communication: Quo Vadis". F. Dressler, H. Hartenstein, O. Altintas, and O. Tonguz, IEEE Communications Magazine, vol. 52, no. 6, pp. 170-177, 2014.

"TVR: Tall Vehicle Relaying in Vehicular Networks". M. Boban, R. Meireles, J. Barros, P. Steenkiste, and O. Tonguz, IEEE Transactions on Mobile Computing, vol. 13, no. 5, pp. 1118-1131, 2014.

"An Empirical Performance Study of Intra-vehicular Wireless Sensor Networks under WiFi and Bluetooth Interference". Lin, J.-R., Talty, T., & Tonguz, O. (2013).  Globecom: Global Communications Conference, 6.

"Cars as Roadside Units: A Self-Organizing Network Solution". Tonguz, O., & Viriyasitavat, W. (2013). IEEE Communications Magazine, 51(12), 112-120.

Randall Trzeciak

"The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)". Cappelli, D. M.; Moore, A. P.; & Trzeciak, R. F. Addison-Wesley 2012.

"An Analysis of Technical Observations in Insider Theft of Intellectual Property Cases ". Hanley, Michael; Dean, Tyler; Schroeder, Will; Trzeciak, Randall F., & Montelibano, Joji. (CMU/SEI-2011-TN-006). Software Engineering Institute, Carnegie Mellon University, 2011. http://www.cert.org/archive/pdf/11tn006.pdf

"A Preliminary Model of Insider Theft of Intellectual Property ". Moore, A. P.; Cappelli, Dawn M.; Caron, Thomas C.; Shaw, Eric; Spooner, Derrick & Trzeciak, Randall F. (CMU/SEI-2011-TN-013). Software Engineering Institute, Carnegie Mellon University, 2011. http://www.cert.org/archive/pdf/11tn013.pdf

" Spotlight On: Insider Threat from Trusted Business Partners". Weiland, Robert M.; Moore, Andrew P.; Cappelli, Dawn M.; Trzeciak, Randall F.; & Spooner, Derrick. Software Engineering Institute and CyLab, Carnegie Mellon University, 2010. http://www.cert.org/archive/pdf/TrustedBusinessPartners0210.pdf

"Common Sense Guide to Prevention and Detection of Insider Threat, 3rd Edition—Version 3.1". Cappelli, D. M.; Moore, A. P.; Trzeciak, R. F.; & Shimeall, T. J. Software Engineering Institute, Carnegie Mellon University and CyLab. http://www.cert.org/archive/pdf/CSG-V3.pdf (2009)

Amit Vasudevan

" Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture". Amit Vasudevan, Jonathan M. McCune, Ning Qu, Leendert van Doorn, Adrian Perrig. TRUST 2010: 141-165

"MalTRAK: Tracking and Eliminating Unknown Malware". Amit Vasudevan, ACSAC 2008: 311-321

Luis von Ahn

"Input-Agreement: A New Mechanism for Collecting Data Using Human Computation Games". Edith Law and Luis von Ahn. ACM Conf. on Human Factors in Computing Systems, CHI 2009. pp 1197-1206.

"Matchin: Eliciting User Preferences with an Online Game". Severin Hacker and Luis von Ahn. ACM Conf. on Human Factors in Computing Systems, CHI 2009. pp 1207-1216.

"General Techniques for Designing Games with a Purpose". Luis von Ahn and Laura Dabbish. Communications of the ACM, August 2008. pp 58-67.

"reCAPTCHA: Human-Based Character Recognition via Web Security Measures". Luis von Ahn, Ben Maurer, Colin McMillen, David Abraham and Manuel Blum. Science, September 12, 2008. pp 1465-1468.

"Games With A Purpose". Luis von Ahn. IEEE Computer Magazine, June 2006. pp 96-98.

Maverick Woo

"Native x86 Decompilation using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring". E. J. Schwartz, J. Lee, M. Woo, and D. Brumley, Proceedings of USENIX Security Symposium, 2013.

"Scheduling Black-box Mutational Fuzzing". Woo, M., Cha, S. K., Gottlieb, S., & Brumley, D. J. (2013).  ACM Conference on Computer and Communications Security Proceedings.

"Towards Automatic Software Lineage Inference". J. Jang, M. Woo, and D. Brumley, Proceedings of USENIX Security Symposium, 2013.

Osman Yagan

"On k-Connectivity and Minimum Vertex Degree in Random s-Intersection Graphs". J. Zhao, O. Yagan, and V. D. Gligor, SIAM Meeting on Analytic Algorithmics and Combinatorics (ANALCO 2015), 2015.

"On the strengths of connectivity and robustness in general random intersection graphs". J. Zhao, O. Yagan, and V. D. Gligor, IEEE Conference on Decision and Control, 2014.

"Connectivity in Secure Wireless Sensor Networks under Trans- mission Constraints". J. Zhao, O. Yagan, and V. D. Gligor, Annual Allerton Conference on Communication, Control and Computing, 2014.

"On secure and reliable communications in wireless sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme". F. Yavuz, J. Zhao, O. Yagan, and V. D. Gligor, IEEE International Symposium on Information Theory, 2014.

"On Topological Properties of Wireless Sensor Networks under the q-Composite Key Predistribution Scheme with On/Off Channels". J. Zhao, O. Yagan, and V. D. Gligor, IEEE International Symposium on Information Theory, 2014.

"Robustness in clustering-based weighted inter-connected networks". Y. Qiu and O. Yagan, European Physical Journal B, vol. 87, no. 4, pp. 1-8, 2014.

"On the connectivity of sensor networks under random pairwise key predistribution". O. Yağan and A. M. Makowski, IEEE Transactions on Information Theory, 59(9):5754-5762, September 2013. (pdf)

"Scaling laws for connectivity in random threshold graph models with non-negative fitness variables". A. M. Makowski and O. Yağan, IEEE Journal on Selected Areas in Communications (JSAC): Special Issue on Social Networks, 31(9):573-583, September 2013. (pdf)

"Secure k-connectivity in wireless sensor networks under an on/off channel model". Zhao, J., Yagan, O., & Gligor, V. D. (2013).  IEEE International Symposium on Information Theory, 2013(7), 2790 - 2794.

Hui Zhang

"EONA: Experience-Oriented Network Architecture". J. Jiang, X. Liu, V. Sekar, I. Stoica, and H. Zhang, in Proceedings of the 13th ACM Workshop on Hot Topics in Networks, pp. 11, 2014.

"Using Video-Based Measurements to Generate a Real-Time Network Traffic Map". Y. Sun, J. Jiang, V. Sekar, H. Zhang, F. Lin, and N. Wang, in Proceedings of the 13th ACM Workshop on Hot Topics in Networks, pp. 10, 2014.

"A Federated Architecture for Network Forensics." Y. Xie, V. Sekar, M. K. Reiter, and H. Zhang.

"Coordinated Sampling sans Origin-Destination Identifiers: Algorithms, Analysis, and Evaluation". V. Sekar, A. Gupta, M. K. Reiter, and H. Zhang.

" A Case for Wireless 3D NoCs for CMPs (Best Paper Award)". Matsutani, H., Bogdon, P., Marculescu, R., Take, Y., Saski, D., Zhang, H., Koibuchi, M., Kuroda, T., & Amano, H. (2013). IEEE/ACM Proc. Asia and South Pacific Design Automation Conf. (ASP-DAC),, 23-28.

Pei Zhang

"Deployment of Swarms of Micro-Aerial Vehicles: from Theory to Practice". P. Zhang, ICRA: IEEE International Conference on Robotics and Automation.

"Headio: Zero-Configured Heading Acquisition for Indoor Mobile Devices Through Multimodal Context Sensing". P. Zhang, Ubiquitous Computing Systems, Proceedings.

"BOES: Building Occupancy Estimation System Using Sparse Ambient Vibration Monitoring". S. Pan, A. Bonde, L. Zhang, P. Zhang, and H. Y. Noh, SPIE Smart Structures/NDE conference, vol. 8692, 2014. 

"iCEnergy: Augmented Reality Display for Intuitive Energy Monitoring". S. Pan, B. Liu, L. Zhang, and P. Zhang. SenSys: Proceedings of the International Conference on Embedded Networked Sensor Systems, 2012.

"MARS: A Muscle Activity Recognition System Using Inertial Sensors". F. Mokaya, C. Kuo, and P. Zhang. IPSN: ACM/IEEE International Conference on Information Processing in Sensor Networks, 2012.

"MARS: A Real Time Motion Capture and Muscle Fatigue Monitoring Tool". F. Mokaya, B. Nguyen, C. Kuo, Q. Jacobson, and P. Zhang. SenSys: Proceedings of the International Conference on Embedded Networked Sensor Systems, 2012.

"Polaris: Getting Accurate Indoor Orientations for Mobile Devices Using Ubiquitous Visual Patterns on Ceilings". Z. Sun, A. Purohit, S. Pan, F. Mokaya, R. Bose, and P. Zhang. HotMobile: Workshop on Mobile Computing Systems and Applications, 2012.