4/11/2007 and 4/12/2007 Purdue University and University of Illinois at Urbana-Champaign Browser Security: A New Research Territory Shuo Chen Cybersecurity.
Quantification of Integrity Michael Clarkson and Fred B. Schneider Cornell University MIT Systems Security and Cryptography Discussion Group October 15,
1 Complete Information Flow Tracking from the Gates Up Tiwari, Wassel, Mazloom, Mysore, Chong, Sherwood, UCSB, ASPLOS 2009 Shimin Chen LBA Reading Group.
1 Mobile Computing Mohammad L. Habib Instructor: Dr. Aggarwal 60-520-02.
Securing Untrusted Code via Compiler-Agnostic Binary Rewriting Richard Wartell, Vishwath Mohan, Dr. Kevin Hamlen, Dr. Zhiqiang Lin The University of Texas.
Cyber-Physical Cloud(y) Computing: Good News, Bad News and Looking Forward Haibo Chen.
Leveraging Smart Phones to Reduce Mobility Footprints Stephen Smaldone †, Benjamin Gilbert ‡, Nilton Bila *, Liviu Iftode †, Eyal de Lara *, and Mahadev.
Building Trusted Path on Untrusted Device Drivers for Mobile Devices Wenhao Li, Mingyang Ma, Jinchen Han, Yubin Xia, Bingyu Zang, Cheng-Kang Chu, Tieyan.