cyber security research at binghamton universitysecurity.cs.binghamton.edu/brochure.pdf · 2013. 2....

Post on 10-Feb-2021

11 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

  • Cyber Security Research at Binghamton UniversityBinghamton University has a well-established program in security research and education managed by a dynamic group of faculty members. Security research at Binghamton has been funded by over 7 million dollars in external funding over the last three years. Binghamton also has an extensive educational program in cyber-security that encompasses both undergraduate and graduate courses across multiple departments. This brochure provides a quick overview of the research activities of our key faculty members working in cyber security research.

    Nael Abu-GhazalehAssociate Professor, Computer Sciencenael@cs.binghamton.edu Nael Abu-Ghazaleh’s research interests are in secure architectures, computer network, and mobile computing. He received his Ph.D. in Computer Engineering from the University of Cincinnati in 1997. His research has been funded by NSF, AFRL, Defense Threat Reduction Agency, and Qatar National Research Fund. He is currently working on architectural support for security in many-core processors. He received the SUNY Chancellor’s Award for Excellence in Teaching in 2006.

    Yu ChenAssistant Professor, Electrical and Computer Engineeringychen@binghamton.edu Yu Chen’s interests are in cyber security, network infrastructure, cyber-physical systems and computer architectures. He received his Ph.D. in Electrical Engineering from the University of Southern California in 2006. He has published more than 60 research papers. His recent projects include the "Detection of Covertly Embedded Hardware in Digital Systems" and "Android Octopi: Unclonable User-Centric Monitoring and Access Control in Android Smartphone Cloud to Mitigate Blackhat Search Engine Optimization and Social Network Attacks.”

    Scott CraverAssociate Professor, Electrical and Computer Engineeringscraver@binghamton.edu Scott Craver’s research interests are in information security, cryptology, steganography, watermarking and DRM systems, and secure engineering, He received his Ph.D. in Electrical Engineering from Princeton University in 2004. Recent projects include “Towards a General Theory of Counterdeception” and “A Supraliminal Channel in a Wireless Phone Application.” He is the recipient of the AFOSR Young Investigator Award and Presidential Early Career Award (PECASE).

    mailto:scraver@binghamton.edumailto:scraver@binghamton.edumailto:scraver@binghamton.edumailto:scraver@binghamton.edumailto:scraver@binghamton.edu

  • Jessica FridrichProfessor, Electrical and Computer Engineeringfridrich@binghamton.edu Jessica Fridrich’s research interests are in steganography, steganalysis, digital watermarking, and digital image forensics. She received her PhD in Systems Science from Binghamton University in 1995 and MS in Applied Mathematics from Czech Technical University in Prague in 1987. Dr. Fridrich’s work has been supported by the US Air Force and AFOSR. She received 20 research grants totaling over $9 million for projects on data embedding and steganalysis that led to more than 130 papers and 7 US patents. Recent projects include “Rich Cover Models for Steganalysis of Digital Media” and “Digital Image Forensics Using Systematic Artifacts of Imaging Sensors.”

    Kanad GhoseProfessor and Chair, Computer Scienceghose@binghamton.edu Kanad Ghose’s research interests are in Computer Systems and Architecture, Energy-Aware Systems, Systems Security, Architectural Support for Trusted Computing, and Secure Storage Systems. He received his PhD in Computer Science from Iowa State University in 1988. He is the author of over 130 publications and 5 US Patents, two of which have been licensed. His research has been funded by NSF, DARPA, AFOSR, NYSTAR, NYSERDA, IBM, Intel, BAE Systems and Sun Microsystems. Recent projects include “Authentication of Remote Executions” and “Systems Level Approaches for DoS mitigation.” He is the recipient of two SUNY Chancellor’s awards, one for technical inventions and another for Excellence in Research and Scholarship.

    Kartik Gopalan, Associate Professor, Computer Sciencekartik@binghamton.edu Kartik Gopalan’s research interests are in experimental computer systems, specifically resource virtualization and security in operating systems and computer networks. He received his Ph.D. in Computer Science from Stony Brook University in 2003 and M.S. in Computer Science from Indian Institute of Technology, Madras in 1996. His recent projects address security and privacy issues in virtualization and cloud computing. His work has been supported by NSF and AFRL STTR. He is a recipient of National Science Foundation CAREER Award and holds 3 US patents.

    mailto:ghose@binghamton.edumailto:ghose@binghamton.edumailto:ghose@binghamton.edumailto:ghose@binghamton.edumailto:ghose@binghamton.edu

  • Kyoung-Don Kang Associate Professor, Computer Sciencekang@cs.binghamton.edu

    Kyoung-Don Kang’s interests include security and privacy in wireless ad hoc networks, cyber physical systems, stream data management, and big data management. He received Ph.D. in Computer Science from the University of Virginia in 2003. Prior to that, he developed real-time software and firmware for embedded avionics at the Agency for Defense Development in South Korea. His research is supported by NSF and AFOSR.

    Dmitry PonomarevAssociate Professor, Computer Sciencedima@cs.binghamton.edu

    Dmitry Ponomarev’s research interests are in systems and hardware security, specifically new attacks and defense opportunities in multicore processors. He received his Ph.D. in Computer Science from Binghamton University in 2003.His research has been funded by NSF, AFRL, Intel and Qatar National Research Fund. He has published over 60 papers. His recent projects include "Architectural Support for Security in the Many-core Age: Threats and Opportunities" and “Designing Secure Systems in the Presence of Insecure Hypervisor.”

    Victor Skormin,Distinguished Service Professor, Electrical and Computer Engg.vskormin@binghamton.edu VIctor Skormin works in computer network and information security, intrusion detection, control theory, and mathematical modeling. He received Ph.D. in Process Control at Institute of Steel and Alloys. He has received over $9M of research funding from industry, NSF, and AFOSR. His recent projects include “Semantic Approach to Behavior-Based IDS and Its Applications” and “Detection of Self-Replication in Malicious Code.” He received the SUNY Chancellor's Award for Excellence in Research in 2004.

    Douglas SummervilleAssociate Professor, Electrical and Computer Engineeringdsummer@binghamton.edu Douglas Summerville’s research interests are network security, hardware security, tamper detection, and intrusion detection. His research has been supported by DURIP and AFOSR. He received his PhD in Electrical Engineering from Binghamton University in 1997. He is currently working on detecting covertly embedded hardware in digital systems. He has received the SUNY Chancellor’s Award for Excellence in Teaching in 2012.

  • Ping YangAssistant Professor, Computer Sciencepyang@binghamton.edu Ping Yang’s research interests are in information and systems security, privacy, access control policy analysis, and formal methods. She received her Ph.D. in Computer Science from Stony Brook University in 2006. Her recent projects include “Security Analysis of Access Control Policies” and “Security in Virtualized Cloud Computing Environments.” Her research has been supported by NSF and AFRL STTR. Her work also received the Most Practical Paper Award in PADL 2005 and best paper candidate nomination in ICCCN 2009.

    Ali Alper YaylaAssistant Professor, School of Managementayayla@binghamton.edu Ali Alper Yayla’s research focuses on the organizational challenges and consequences of information security. His current interests include the effect of information security on the competitiveness of organizations, the role of information security policies in organizations, and challenges of implementing well-established security policies.He received his Ph.D. in Management Information Systems from Florida Atlantic University in 2008. His work includes “The Impact of Information Security Events on the Stock Value of Firms” and “Enforcing Information Security Policies through Cultural Boundaries.”

    Lijun YinAssociate Professor, Computer Sciencelijun@cs.binghamton.edu Lijun Yin is conducting research on biometrics, face and gesture modeling and recognition. His research has been supported by NSF, AFRL, and NYSTAR. He has published over 90 papers in related areas, and has released two 3D face expression databases to the research community. His recent work focuses on developing a 3D spontaneous expression copus for emotion analysis with applications to counter-terrorism. He received his Ph.D. from University of Alberta in 2000 and M.Sc. from Shanghai Jiao Tong University in 1992.

top related