cyber security research at binghamton universitysecurity.cs.binghamton.edu/brochure.pdf · 2013. 2....

4
Cyber Security Research at Binghamton University Binghamton University has a well-established program in security research and education managed by a dynamic group of faculty members. Security research at Binghamton has been funded by over 7 million dollars in external funding over the last three years. Binghamton also has an extensive educational program in cyber-security that encompasses both undergraduate and graduate courses across multiple departments. This brochure provides a quick overview of the research activities of our key faculty members working in cyber security research. Nael Abu-Ghazaleh Associate Professor, Computer Science [email protected] Nael Abu-Ghazaleh’s research interests are in secure architectures, computer network, and mobile computing. He received his Ph.D. in Computer Engineering from the University of Cincinnati in 1997. His research has been funded by NSF, AFRL, Defense Threat Reduction Agency, and Qatar National Research Fund. He is currently working on architectural support for security in many-core processors. He received the SUNY Chancellor’s Award for Excellence in Teaching in 2006. Yu Chen Assistant Professor, Electrical and Computer Engineering [email protected] Yu Chen’s interests are in cyber security, network infrastructure, cyber-physical systems and computer architectures. He received his Ph.D. in Electrical Engineering from the University of Southern California in 2006. He has published more than 60 research papers. His recent projects include the "Detection of Covertly Embedded Hardware in Digital Systems" and "Android Octopi: Unclonable User-Centric Monitoring and Access Control in Android Smartphone Cloud to Mitigate Blackhat Search Engine Optimization and Social Network Attacks.” Scott Craver Associate Professor, Electrical and Computer Engineering [email protected] Scott Craver’s research interests are in information security, cryptology, steganography, watermarking and DRM systems, and secure engineering, He received his Ph.D. in Electrical Engineering from Princeton University in 2004. Recent projects include “Towards a General Theory of Counterdeception” and “A Supraliminal Channel in a Wireless Phone Application.” He is the recipient of the AFOSR Young Investigator Award and Presidential Early Career Award (PECASE).

Upload: others

Post on 10-Feb-2021

7 views

Category:

Documents


0 download

TRANSCRIPT

  • Cyber Security Research at Binghamton UniversityBinghamton University has a well-established program in security research and education managed by a dynamic group of faculty members. Security research at Binghamton has been funded by over 7 million dollars in external funding over the last three years. Binghamton also has an extensive educational program in cyber-security that encompasses both undergraduate and graduate courses across multiple departments. This brochure provides a quick overview of the research activities of our key faculty members working in cyber security research.

    Nael Abu-GhazalehAssociate Professor, Computer [email protected] Nael Abu-Ghazaleh’s research interests are in secure architectures, computer network, and mobile computing. He received his Ph.D. in Computer Engineering from the University of Cincinnati in 1997. His research has been funded by NSF, AFRL, Defense Threat Reduction Agency, and Qatar National Research Fund. He is currently working on architectural support for security in many-core processors. He received the SUNY Chancellor’s Award for Excellence in Teaching in 2006.

    Yu ChenAssistant Professor, Electrical and Computer [email protected] Yu Chen’s interests are in cyber security, network infrastructure, cyber-physical systems and computer architectures. He received his Ph.D. in Electrical Engineering from the University of Southern California in 2006. He has published more than 60 research papers. His recent projects include the "Detection of Covertly Embedded Hardware in Digital Systems" and "Android Octopi: Unclonable User-Centric Monitoring and Access Control in Android Smartphone Cloud to Mitigate Blackhat Search Engine Optimization and Social Network Attacks.”

    Scott CraverAssociate Professor, Electrical and Computer [email protected] Scott Craver’s research interests are in information security, cryptology, steganography, watermarking and DRM systems, and secure engineering, He received his Ph.D. in Electrical Engineering from Princeton University in 2004. Recent projects include “Towards a General Theory of Counterdeception” and “A Supraliminal Channel in a Wireless Phone Application.” He is the recipient of the AFOSR Young Investigator Award and Presidential Early Career Award (PECASE).

    mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]

  • Jessica FridrichProfessor, Electrical and Computer [email protected] Jessica Fridrich’s research interests are in steganography, steganalysis, digital watermarking, and digital image forensics. She received her PhD in Systems Science from Binghamton University in 1995 and MS in Applied Mathematics from Czech Technical University in Prague in 1987. Dr. Fridrich’s work has been supported by the US Air Force and AFOSR. She received 20 research grants totaling over $9 million for projects on data embedding and steganalysis that led to more than 130 papers and 7 US patents. Recent projects include “Rich Cover Models for Steganalysis of Digital Media” and “Digital Image Forensics Using Systematic Artifacts of Imaging Sensors.”

    Kanad GhoseProfessor and Chair, Computer [email protected] Kanad Ghose’s research interests are in Computer Systems and Architecture, Energy-Aware Systems, Systems Security, Architectural Support for Trusted Computing, and Secure Storage Systems. He received his PhD in Computer Science from Iowa State University in 1988. He is the author of over 130 publications and 5 US Patents, two of which have been licensed. His research has been funded by NSF, DARPA, AFOSR, NYSTAR, NYSERDA, IBM, Intel, BAE Systems and Sun Microsystems. Recent projects include “Authentication of Remote Executions” and “Systems Level Approaches for DoS mitigation.” He is the recipient of two SUNY Chancellor’s awards, one for technical inventions and another for Excellence in Research and Scholarship.

    Kartik Gopalan, Associate Professor, Computer [email protected] Kartik Gopalan’s research interests are in experimental computer systems, specifically resource virtualization and security in operating systems and computer networks. He received his Ph.D. in Computer Science from Stony Brook University in 2003 and M.S. in Computer Science from Indian Institute of Technology, Madras in 1996. His recent projects address security and privacy issues in virtualization and cloud computing. His work has been supported by NSF and AFRL STTR. He is a recipient of National Science Foundation CAREER Award and holds 3 US patents.

    mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]

  • Kyoung-Don Kang Associate Professor, Computer [email protected]

    Kyoung-Don Kang’s interests include security and privacy in wireless ad hoc networks, cyber physical systems, stream data management, and big data management. He received Ph.D. in Computer Science from the University of Virginia in 2003. Prior to that, he developed real-time software and firmware for embedded avionics at the Agency for Defense Development in South Korea. His research is supported by NSF and AFOSR.

    Dmitry PonomarevAssociate Professor, Computer [email protected]

    Dmitry Ponomarev’s research interests are in systems and hardware security, specifically new attacks and defense opportunities in multicore processors. He received his Ph.D. in Computer Science from Binghamton University in 2003.His research has been funded by NSF, AFRL, Intel and Qatar National Research Fund. He has published over 60 papers. His recent projects include "Architectural Support for Security in the Many-core Age: Threats and Opportunities" and “Designing Secure Systems in the Presence of Insecure Hypervisor.”

    Victor Skormin,Distinguished Service Professor, Electrical and Computer [email protected] VIctor Skormin works in computer network and information security, intrusion detection, control theory, and mathematical modeling. He received Ph.D. in Process Control at Institute of Steel and Alloys. He has received over $9M of research funding from industry, NSF, and AFOSR. His recent projects include “Semantic Approach to Behavior-Based IDS and Its Applications” and “Detection of Self-Replication in Malicious Code.” He received the SUNY Chancellor's Award for Excellence in Research in 2004.

    Douglas SummervilleAssociate Professor, Electrical and Computer [email protected] Douglas Summerville’s research interests are network security, hardware security, tamper detection, and intrusion detection. His research has been supported by DURIP and AFOSR. He received his PhD in Electrical Engineering from Binghamton University in 1997. He is currently working on detecting covertly embedded hardware in digital systems. He has received the SUNY Chancellor’s Award for Excellence in Teaching in 2012.

  • Ping YangAssistant Professor, Computer [email protected] Ping Yang’s research interests are in information and systems security, privacy, access control policy analysis, and formal methods. She received her Ph.D. in Computer Science from Stony Brook University in 2006. Her recent projects include “Security Analysis of Access Control Policies” and “Security in Virtualized Cloud Computing Environments.” Her research has been supported by NSF and AFRL STTR. Her work also received the Most Practical Paper Award in PADL 2005 and best paper candidate nomination in ICCCN 2009.

    Ali Alper YaylaAssistant Professor, School of [email protected] Ali Alper Yayla’s research focuses on the organizational challenges and consequences of information security. His current interests include the effect of information security on the competitiveness of organizations, the role of information security policies in organizations, and challenges of implementing well-established security policies.He received his Ph.D. in Management Information Systems from Florida Atlantic University in 2008. His work includes “The Impact of Information Security Events on the Stock Value of Firms” and “Enforcing Information Security Policies through Cultural Boundaries.”

    Lijun YinAssociate Professor, Computer [email protected] Lijun Yin is conducting research on biometrics, face and gesture modeling and recognition. His research has been supported by NSF, AFRL, and NYSTAR. He has published over 90 papers in related areas, and has released two 3D face expression databases to the research community. His recent work focuses on developing a 3D spontaneous expression copus for emotion analysis with applications to counter-terrorism. He received his Ph.D. from University of Alberta in 2000 and M.Sc. from Shanghai Jiao Tong University in 1992.