$Id: index.t2t, v3.0, last updated %%mtime(%c) Exp$ %! Target: %! Options: --toc --css-sugar --encoding=iso-8859-1 %! Style: tech.css %! PreProc: %! PostProc(html): \^\^(.*?)\^\^ \1 --------------------------------------------------------------------------- === About === [[img/zlin.jpg] img/zlin.jpg] - I am a //Distinguished Professor of Engineering// in the //Department of Computer Science and Engineering// ([CSE https://cse.osu.edu/]), and the director of //Institute for Cybersecurity and Digital Trust// ([ICDT https://icdt.osu.edu/]) at //The Ohio State University// ([OSU https://www.osu.edu]). - I am also the founding director of //Computer Security Laboratory// ([SecLab https://seclab.engineering.osu.edu]), a faculty member in //Center for Automotive Research// ([CAR https://car.osu.edu/]), //Translational Data Analytics Institute// ([TDAI https://tdai.osu.edu/faculty/]), and //NSF AI Institute for Future Edge Networks and Distributed Intelligence// ([AI-Edge https://aiedge.osu.edu/]). - In addition, I am the founding faculty advisor of //Women in Cyber Security// ([WiCys http://org.osu.edu/womenincyber/]) chapter at OSU, and I am also one of the faculty advisors of //OSU Cybersecurity Club// ([OSUCyber https://osucyber.club/]). - I am broadly interested in most of the cybersecurity problems (e.g., vulnerability discovery, authentication, authorization, introspection, deception, applied cryptography, and side channel analysis), with a key focus on //advancing or using program analysis to solve the security problems//. - More specifically, I have been working on developing novel or using existing program analysis and reverse engineering techniques for vulnerability discovery with native binary code in the past decade, and recently also on byte code (Java), script code (JavaScript), or even source code (C/C++), covering the entire software stack from firmware to applications, from web, mobile, IoT (particularly Bluetooth), to blockchain. In addition to finding vulnerabilities, I also work on hardening the software against various attacks, particularly on improving or using binary code rewriting, virtual machine introspection, and trusted execution environment (TEE) towards this goal. - Sometimes, I also use program (binary or source code) analysis as a tool for measurement studies in order to gain insights and understanding on the security problems of interest. %My chief research interests are program (e.g., binary code, byte code, script code, or source code; firmware, hypervisor, kernel, or application) analysis and also trusted computing (e.g., trusted execution environment such as SGX/SEV/TrustZone), and their applications to vulnerability discovery, malware analysis, and code/execution hardening. Sometimes, I also use program analysis as a tool for other studies such as measurement in order to gain insights and understanding on the security problems of interest. - My research has been supported in part by federal agencies such as AFOSR, ARO, DARPA, NHTSA, NSA, NSF, and ONR, and industry such as Amazon, Cisco, Meta, Raytheon, and VMware. - I am an IEEE Fellow, an ACM Distinguished Member, a recipient of //NSF CAREER// Award and //AFOSR YIP// Award. I also received the //Harrison Faculty Award for Excellence in Engineering Education// from [College of Engineering https://awards.webapps.engineering.osu.edu/awards/9], and the //Outstanding Faculty Teaching Award// from Department of Computer Science and Engineering at OSU. - My short bio can be found [here file/bio.txt] - The best way to reach me is through my email: %!include: ''email.js'' - My office: DL 798 - Phone: (614) 292-0055 - Fax: (614) 292-2911 - PGP key: [zlin.pub file/zlin.pub] - Mail Address: ``` Zhiqiang Lin 798 Dreese Laboratories 2015 Neil Avenue Columbus, OH 43210-1277 ``` --------------------------------------------------------------------------- === Research === - Current Interests: - **Mobile Security** (mobile app analysis, automotive security, contact tracing, 5G, Bluetooth/IoT security) - Mobile **Super/Mini** App Security - RootFree Attacks [[ASIACCS'24 file/ASIACCS24.pdf]] - APIDiff [[USENIX-SEC'23 file/SEC23c.pdf]] - APIScope [[CCS'23 file/CCS23a.pdf]] - Detecting AppSecret Leaks in Miniapps [[CCS'23 file/CCS23b.pdf]] - TaintMini [[ICSE'23 file/ICSE23a.pdf]] - Cross Miniapp Request Forgeory (CMRF) [[CCS'22 file/CCS22b.pdf]] - MiniCrawler [[SIGMETRICS'21 file/SIGMETRICS21.pdf]] - **Bluetooth** Security and Privacy - BleGuuide [[AsiaCCS'23 file/AsiaCCS23.pdf]] - Formal verification of BLE Passkey Entry pairing [[NDSS'23 file/NDSS23.pdf]] - Allowlist-based Side Channel Attacks [[CCS'22 file/CCS22a.pdf]][[Best Paper Award Honorable Mention file/CCS22.jpg]] - Google/Apple Exposure Notification+ [[PETS'22 file/PETS22.pdf]] - Bluetooth Downgrading Attacks [[USENIX-SEC'20 file/SEC20d.pdf]] - FirmXRay [[CCS'20 file/CCS20.pdf]] - BleScope [[CCS'19 file/CCS19a.pdf]] - **Automotive** Security - QtRE [[USENIX-SEC'23 file/SEC23.pdf]] - CAN-Hunter [[NDSS'20 file/NDSS20.pdf]] - DongleScope [[USENIX-SEC'20 file/SEC20a.pdf]] - SAVIOR [[USENIX-SEC'20 file/SEC20c.pdf]] - 5G-Spector [[NDSS'24 file/NDSS24.pdf]] - 3DScan [[USENIX-SEC'23 file/SEC23f.pdf]] - RILDefender [[NDSS'23 file/NDSS23b.pdf]] - LocationScope [[SIGMETRICS'23 file/SIGMETRICS23.pdf]] - IoTSpotter [[CCS'22 file/CCS22e.pdf]] - ManiScope [[CCS'22 file/CCS22c.pdf]] - InputScope [[S&P'20 file/SP20.pdf]] - FirmScope [[USENIX-SEC'20 file/SEC20b.pdf]] - SkyWalker [[USENIX-SEC'19 file/SEC19a.pdf]] - Leaks in Ride-hailing Services [[NDSS'19 file/NDSS19.pdf]] - LeakScope [[S&P'19 file/SP19.pdf]] - IoTFuzzer [[NDSS'18 file/NDSS18b.pdf]] - AuthScope [[CCS'17 file/CCS17a.pdf]] - SmartGen [[WWW'17 file/WWW17.pdf]] - AutoForge [[NDSS'16 file/NDSS16.pdf]] - SMV-Hunter [[NDSS'14 file/NDSS14b.pdf]] - **Software Security** (binary or firmware code analysis, vulnerability discovery, and software hardening) - Cocoon [[OOPSLA'24 file/OOPSLA24.pdf]] - STING [[USENIX-SEC'23 file/sec23e.pdf]] - QtRE [[USENIX-SEC'23 file/sec23a.pdf]] - Smart Contract Vulnerability Analysis [[ICSE'23 file/ICSE23b.pdf]] - SymLM [[CCS'22 file/CCS22d.pdf]] - PaymentScope [[USENIX-SEC'22 file/SEC22.pdf]] - SelectiveTaint [[USENIX-SEC'21 file/SEC21a.pdf]] - FirmScope [[USENIX-SEC'20 file/SEC20b.pdf]] - TxSpector [[USENIX-SEC'20 file/SEC20e.pdf]] - CONFIRM: CFI Benchmarks [[USENIX-SEC'19 file/SEC19b.pdf]] - Probabilistic Disassembly [[ICSE'19 file/ICSE19.pdf]] - Superset Disassembly [[NDSS'18 file/NDSS18a.pdf]] - K-Hunt [[CCS'18 file/CCS18.pdf]] - Guarder [[USENIX-SEC'18 file/SEC18b.pdf]] - FreeGuard [[CCS'17 file/CCS17c.pdf]], - X-Force [[USENIX-SEC'14 file/SEC14b.pdf]] - Trace-oriented Programming [[CCS'13 file/CCS13.pdf]] - STIR [[CCS'12 file/CCS12.pdf]] - REWARDS [[NDSS'10 file/Rewards_NDSS10.pdf]] - IntScope [[NDSS'09 file/IntScope_NDSS09.pdf]] - AutoFormat [[NDSS'08 file/AutoFormat_NDSS08.pdf]] - **Systems Security** (OS kernel and hypervisor security, trusted computing) - Reusable Enclave [[USENIX-SEC'23 file/SEC23d.pdf]] - SGX-Racer [[USENIX-SEC'23 file/SEC23b.pdf]] - vSGX [[S&P'22 file/SP22.pdf]] - SGX State Continuity Vulnerability Detection [[USENIX-SEC'21 file/SEC21c.pdf]] - CrossLine Attack [[CCS'21 file/CCS21.pdf]][[Best Paper Award Runner-up file/CCS21.jpg]] - Rust-SGX [[CCS'19 file/CCS19b.pdf]] - AMD-SEV-IO-Security [[USENIX-SEC'19 file/SEC19c.pdf]] - SGX-Pectre [[EUROSP'19 file/EUROSP19.pdf]] - SGX-BigMatrix [[CCS'17 file/CCS17b.pdf]] - SGX-Elide [[CGO'18 file/CGO18.pdf]] - SGX-LAPD [[RAID'17 file/RAID17.pdf]] - Hybrid-Bridge [[NDSS'14 file/NDSS14a.pdf]] - HyperShell [[USENIX-ATC'14 file/ATC14.pdf]] - Crypto-key Protection [[USENIX-SEC'14 file/SEC14a.pdf]] - VM Space Travler [[S&P'12 file/SP12.pdf]] - SigGraph [[NDSS'11 file/SigGraph_NDSS11.pdf]] - Groups: - The //Computer Security Laboratory// ([SecLab https://seclab.engineering.osu.edu]) at The Ohio State University. - The talented [students students.html] I have the fortune to have advised and worked with. - Recent Publications [[Complete list publication.html]] - [[OOPSLA'24 file/OOPSLA24.pdf]] "Cocoon: Static Information Flow Control in Rust" - [[NDSS'24 file/NDSS24.pdf]] ''5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service'' - [[CCS'23 file/CCS23a.pdf]] "Uncovering and Exploiting Hidden APIs in Mobile Super Apps" - [[CCS'23 file/CCS23b.pdf]] "Don’t Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs" - [[USENIX-SEC'23 file/SEC23a.pdf]] "Egg Hunt in Tesla Infotainment: A First Look at Reverse Engineering of Qt Binaries'' - [[USENIX-SEC'23 file/SEC23b.pdf]] "Controlled Data Races in Enclaves: Attacks and Detection'' - [[USENIX-SEC'23 file/SEC23c.pdf]] "One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat'' - [[USENIX-SEC'23 file/SEC23d.pdf]] "Reusable Enclaves for Confidential Serverless Computing'' - [[USENIX-SEC'23 file/SEC23e.pdf]] "Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract'' - [[USENIX-SEC'23 file/SEC23f.pdf]] "A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games'' - [[NDSS'23 file/NDSS23b.pdf]] ''Thwarting Smartphone SMS Attacks at the Radio Interface Layer'' - [[SIGMETRICS'23 file/SIGMETRICS23.pdf]] "Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding" - [[ICSE'23 file/ICSE23a.pdf]] ''TaintMini: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis'' - [[ICSE'23 file/ICSE23b.pdf]] ''Demystifying Exploitable Bugs in Smart Contracts'' - [[NDSS'23 file/NDSS23a.pdf]] ''Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing'' - [[CCS'22 file/CCS22a.pdf]] "When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its Countermeasure" - [[CCS'22 file/CCS22b.pdf]] "Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability Detection" - [[CCS'22 file/CCS22c.pdf]] "Detecting and Measuring of Misconfigured Manifest in Android Apps" - [[CCS'22 file/CCS22d.pdf]] "SymLM: Predicating Function Name in Stripped Binaries through Context-Sensitive Execution-Aware Code Embeddings" - [[CCS'22 file/CCS22e.pdf]] "Understanding IoT Security from a Market-Scale Perspective" - [[USENIX-SEC'22 file/SEC22.pdf]] "Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Mobile Games'' - [[PETS'22 file/PET22.pdf]] "Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing" - [[S&P'22 file/SP22.pdf]] "vSGX: Virtualizing SGX Enclaves on AMD SEV'' - [[NDSS'22 file/NDSS22.pdf]] ''Multi-Certificate Attacks Against Proof-of-Elapsed-Time And Their Countermeasures'' --------------------------------------------------------------------------- === Teaching === - CSE 5474: Software Security [Spring 2024 spring24a.html] - CSE 5474: Software Security [Spring 2023 spring23a.html] - CSE 5474: Software Security [Spring 2022 spring22a.html] - CSE 5194: Software Security [Spring 2021 spring21a.html] - CSE 5473: Network Security [Fall 2020 fall20a.html] - CSE 4471: Information Security [Fall 2019 fall2019.html] - CSE 5473: Network Security [Fall 2018 fall18a.html] - CSE 5479: Software Security [Fall 2018 fall18b.html] % - CS 6332: Systems Security and Binary Code Analysis [Fall 2017 fall2017.html] % - CS 7301: Advanced Topics in Systems Security [Spring 2017 spring2017.html] % - CS 6332: Systems Security and Binary Code Analysis [Fall 2016 fall2016.html] % - CS 4393: Computer and Network Security [Spring 2016 spring2016.html] % - CS 6332: Systems Security and Binary Code Analysis [Fall 2015 fall2015.html] % - CS 4393: Computer and Network Security [Spring 2015 spring2015.html] % - CS 6301: Offense-based Cyber Security [Fall 2014 fall2014.html] % - CS 4v95: Offense-based Cyber Security [Fall 2014 fall2014.html] % - CS 4393: Computer and Network Security [Spring 2014 spring2014.html] % - CS 6301: Systems Security and Binary Code Analysis [Fall 2013 fall2013a.html] % - CS 7301: Advanced Operating Systems Security [Fall 2013 fall2013b.html] % - CS 4393: Computer and Network Security [Spring 2013 spring2013.html] % - CS 6324: Information Security [Fall 2012 fall2012.html] % - CS 6301: Systems Security and Binary Code Analysis [Spring 2012 spring2012.html] % - CS 6V81: Advanced Digital Forensics and Data Reverse Engineering [Fall 2011 fall2011.html] - Recent Talks - 10/17/2023, Unpacking the Threats of All-in-One Mobile Super Apps [[PDF file/talks/super-apps-talk-raid.pdf]], **keynote** at The 26th International Symposium on Research in Attacks, Intrusions and Defenses ([RAID 2023 https://raid2023.org/program.html]), Hong Kong. - 08/11/2023, When Super Apps Become Operating Systems: The Good, The Bad, and The Ugly [[PDF file/talks/super-apps-talk-snap.pdf]], invited talk at Snap Inc., Santa Monica, California - 06/07/2023, When Super Apps Become Operating Systems: The Good, The Bad, and The Ugly [[PDF file/talks/super-apps-talk-tencent.pdf]], invited talk at Tencent Inc., Guangzhou, China - 04/18/2023, Unlocking the Potential of Domain Aware Binary Analysis in the Era of IoT [[PDF file/talks/Domain_aware_binary_analysis_slides.pdf]], invited talk at the Cybersecurity Club meetings at OSU - 04/13/2023, Rethinking the Security and Privacy of Bluetooth Low Energy [[PDF file/talks/Rethink_BLE_Security_Privacy_WUSTL_2023.pdf]], invited talk at Washington University at St. Louis - 04/07/2023, Unlocking the Potential of Domain Aware Binary Analysis in the Era of IoT, Distinguished Talk at Cybersecurity Symposium at Arizona State University - 03/03/2023, Unlocking the Potential of Domain Aware Binary Analysis in the Era of IoT, Keynote at Workshop on Binary Analysis Research (BAR) - [More ... talks.html] --------------------------------------------------------------------------- === Service === - Editorial Service: - Associate Editor: ACM Transactions on Privacy and Security (TOPS), 20~ - Associate Editor: ACM/IEEE Transactions on Networking (ToN), 21~22 - Associate Editor: IEEE Transactions on Mobile Computing (TMC), 20~22 - Associate Editor: IEEE Transactions on Dependable and Secure Computing (TDSC), 16~22 - Conference Organization: - Program co-chair: International Conf. on Security and Privacy in Comm. Networks (SECURECOMM), 22 - Program co-chair: ACM ASIA Conference on Computer and Communications Security (ASIACCS), [21 https://asiaccs2021.comp.polyu.edu.hk/] - Program co-chair: Information Security Conference (ISC), [19 https://isc2019.cs.stonybrook.edu/] - Program co-chair: Workshop on Forming an Ecosystem Around Software Transformation (FEAST), [19 https://feastworkshop.github.io/2019/index.html] - Program co-chair: ACM Workshop on Secure and Trustworthy Superapps (SaTS), [23 https://superappsec.github.io/] - Area chair: ACM Conference on Computer and Communications Security (CCS), [19 http://www.sigsac.org/ccs/CCS2019/] - Area chair: World Wide Web (WWW) Conference, [24 https://www2024.thewebconf.org] - Steering committee: International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 17~ - Steering committee: Information Security Conference, 19~ - Steering committee chair: ACM Workshop on Secure and Trustworthy Superapps (SaTS), 23~ - Local arrangement chair: ACM Conference on Computer and Communications Security (CCS), [17 http://www.sigsac.org/ccs/CCS2017/] - Technical Program Committee (TPC) Member: - ACM Conference on Computer and Communications Security (CCS), [14 http://www.sigsac.org/ccs/CCS2014/], [15 http://www.sigsac.org/ccs/CCS2015/], [16 http://www.sigsac.org/ccs/CCS2016/], [18 http://www.sigsac.org/ccs/CCS2018], [19 http://www.sigsac.org/ccs/CCS2019/], [20 http://www.sigsac.org/ccs/CCS2020/], [22 http://www.sigsac.org/ccs/CCS2022/], [23 http://www.sigsac.org/ccs/CCS2023/] - IEEE Symposium on Security and Privacy, [21 http://www.ieee-security.org/TC/SP2021], [22 http://www.ieee-security.org/TC/SP2022], [24 http://www.ieee-security.org/TC/SP2024] - USENIX Security Symposium, [17 https://www.usenix.org/conference/usenixsecurity17/], [21 https://www.usenix.org/conference/usenixsecurity21/], [22 https://www.usenix.org/conference/usenixsecurity22/], [24 https://www.usenix.org/conference/usenixsecurity24/] - ISOC Network and Distributed System Security Symposium (NDSS), [15 http://www.internetsociety.org/events/ndss-symposium-2015], [19 https://www.ndss-symposium.org/ndss2019/], [20 https://www.ndss-symposium.org/ndss2020/] - World Wide Web (WWW) Conference, [18 https://www2018.thewebconf.org] - IEEE International Conference on Mobility: Operations, Services, and Technologies (MOST), [23 https://ieeemobility.org/MOST2023/], [24 https://ieeemobility.org/MOST2024/] - ISOC Symposium on Vehicle Security & Privacy (VehicleSec), [23 https://www.ndss-symposium.org/ndss2023/submissions/cfp-vehiclesec/], [24 https://www.ndss-symposium.org/ndss2024/submissions/cfp-vehiclesec/] - IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), [20 https://dsn2020.webs.upv.es/], [21 http://dsn2021.ntu.edu.tw/], [22 https://dsn2022.github.io/] - ACM ASIA Conference on Computer and Communications Security (ASIACCS), [13 http://hise.hznu.edu.cn/asiaccs/index.html], [14 http://asiaccs2014.nict.go.jp/index.html], [15 http://icsd.i2r.a-star.edu.sg/asiaccs15/index.php], [16 http://meeting.xidian.edu.cn/conference/AsiaCCS2016/home.html], [18 https://sites.google.com/site/asiaccs2018/] - Annual Computer Security Applications Conference (ACSAC), [14 https://www.acsac.org/2014/], [16 https://www.acsac.org/2016], [17 https://www.acsac.org/2017], [18 http://www.acsac.org/2018], [19 http://www.acsac.org/2019], [20 http://www.acsac.org/2020], [21 http://www.acsac.org/2021], [22 http://www.acsac.org/2022] - International Symposium on Research in Attacks, Intrusions and Defenses (RAID), [16 http://raid2016.wp.telecom-sudparis.eu] - European Symposium on Research in Computer Security (ESORICS), [21 https://esorics2021.athene-center.de/], [22 https://esorics2022.compute.dtu.dk/] - Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), [16 http://dimva2016.mondragon.edu/en], [17 https://itsec.cs.uni-bonn.de/dimva2017/], [18 http://www.dimva2018.org], [19 http://www.dimva2019.org], [22 http://www.dimva2022.org] - International Conference on Applied Cryptography and Network Security (ACNS), [20 https://sites.google.com/di.uniroma1.it/ACNS2020] [21 http://sulab-sever.u-aizu.ac.jp/ACNS2021/] - International Conf. on Security and Privacy in Comm. Networks (SECURECOMM), [15 http://securecomm.org/2015], [16 http://securecomm.org/2016], [17 http://securecomm.org/2017], [18 http://securecomm.org/2018], [19 http://securecomm.org/2019], [20 http://securecomm.org/2020] - Annual Digital Forensics Research Conference (DFRWS), [13 http://www.dfrws.org/2013/index.shtml], [14 http://www.dfrws.org/2014/], [15 http://www.dfrws.org/2015/], [16 http://www.dfrws.org/2016/], [17 http://www.dfrws.org/2017/], [18 http://www.dfrws.org/2018/], [19 http://www.dfrws.org/2019/], [20 http://www.dfrws.org/2020/] - International Conference on Privacy, Security and Trust (PST), [13 http://unescoprivacychair.urv.cat/pst2013/index.php], [14 http://pst2014.ryerson.ca/index.html], [15 http://pst2015.yasar.edu.tr/], [18 http://pstnet.ca/pst2018/], [19 https://pstnet.ca/] - ACM Cloud Computing Security Workshop (CCSW), [19 https://ccsw.io/], [21 https://ccsw.io/] - Workshop on Automotive and Autonomous Vehicle Security (AutoSec), [21 https://www.ndss-symposium.org/ndss-program/autosec-2021/], [22 https://www.ndss-symposium.org/ndss-program/autosec-2022/] - Program Analysis and Verification on Trusted Platforms (PAVeTrust) [21 https://www.acsac.org/2021/workshops/pavetrust/], [22 https://www.acsac.org/2022/workshops/pavetrust/] - Information Security Conference (ISC), [17 http://isc2017.vgu.edu.vn/], [19 https://isc2019.cs.stonybrook.edu/] - Workshop on System Software for Trusted Execution (SysTex), [16 https://systex.ibr.cs.tu-bs.de/index.html], [17 https://systex17.ibr.cs.tu-bs.de/] - Workshop on Forming an Ecosystem Around Software Transformation (FEAST), [17 https://tc.gtisc.gatech.edu/feast17/], [18 https://feastworkshop.github.io/2018], [19 https://feastworkshop.github.io/2019] - IEEE International Conference on Distributed Computing Systems (ICDCS), [14 http://lsd.ls.fi.upm.es/icdcs2014] - IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), [13 http://www.pds.ewi.tudelft.nl/ccgrid2013/], [14 http://datasys.cs.iit.edu/events/CCGrid2014/] - IEEE International Conference on Big Data (BigData), [13 http://www.ischool.drexel.edu/bigdata/bigdata2013/index.htm], [14 http://cci.drexel.edu/bigdata/bigdata2014/], [16 http://cci.drexel.edu/bigdata/bigdata2016/] - International Congress on Big Data (BigData), [14 http://www.ieeebigdata.org/2014/org.html], [17 http://www.ieeebigdata.org/2017/] - International Symposium on Foundations and Applications of Big Data Analytics (FAB), [15 http://fab.cpsc.ucalgary.ca/2015/], [16 http://fab.cpsc.ucalgary.ca/2016/] - International Symposium on Big Data Management and Analytics (BIDMA), [16 http://bidma.cpsc.ucalgary.ca/index.php] - IEEE International Conference on Cyber Security and Cloud Computing (CSCloud), [15 http://csis.pace.edu/CSCloud/] - International Workshop on Cloud Compliance (IWCC), [15 https://sites.google.com/site/iwcc2015/] - The European Workshop on Systems Security (EuroSec), [14 http://www.syssec-project.eu/eurosec-2014/] - IEEE International Performance Computing and Communications Conference (IPCCC), [11 http://ipccc.org/ipccc2011/index.html], [12 http://ipccc.org/ipccc2012/index.html], [13 http://ipccc.org/ipccc2013/index.html], [14 http://www.ipccc.org/ipccc2014/main.php?page=1], [15 http://ipccc.org/ipccc2015/main.php?page=1] - Workshop on Hardware and Architectural Support for Security and Privacy (HASP), [12 https://sites.google.com/site/haspworkshop2012/], [13 https://sites.google.com/site/haspworkshop2013/], [14 https://sites.google.com/site/haspworkshop2014/], [15 http://caslab.eng.yale.edu/workshops/hasp2015/], [16 http://caslab.eng.yale.edu/workshops/hasp2016/] - International Symposium on Secure Virtual Infrastructures, [13 http://www.onthemove-conferences.org/index.php/doacloud13], [14 http://www.onthemove-conferences.org/index.php/doacloud2014] - Panelist: - NSF proposal review panels, 12, 16, 17, 18, 19, 20, 21, 22 - Artifact Evaluation Committee Member: - Annual Computer Security Applications Conference (ACSAC), [19 http://www.acsac.org/2019], [20 http://www.acsac.org/2020], [21 http://www.acsac.org/2021], [22 http://www.acsac.org/2022], [23 http://www.acsac.org/2023] --------------------------------------------------------------------------- === Misc === - [My calendar https://outlook.office365.com/calendar/published/bff3c7633ca446eaa9f3b0d34ac0ad89@cse.ohio-state.edu/09c82ea641f14e0fbb03c1ca349842a315631078760524886573/calendar.html] %!include: ''iff.js'' --------------------------------------------------------------------------- [HOME index.html] [SOURCE %%infile]