Idea Transcript
People Working in System & Network Security Zhiqiang Lin $Id: people.t2t, v1.0, last updated Thu Aug 19 23:34:18 2010 Exp $
Note: I create this pape for my purpose of quickly catching on what those active core people are working at. It is not an entire collection of all the system & network security researchers, but just those who has already graduated and works on the problem I am intersted in. So those who are still PhD students are not listed. I personally like program analysis; that's why I listed many PL & SE -oriented security people. Also, if it happens for me to forget listing someone, please let me know and I will be happy to add him/her. For the crypto researcher list, please refer to the page maintained by Bruno Crispo and David Wagner
Name
Homepage
Research Interests
Martin Abadi
http://www.soe.ucsc.edu/~abadi/
Security, specification and verification, programming languages ...
Kostas G. Anagnostakis
http://s3g.i2r.a-star.edu.sg/~kostas/
Malware defense, distributed systems, networking and computational markets ...
Ross Anderson http://www.cl.cam.ac.uk/~rja14/
Economics of information security, p2p system, robustness of cryptographic protocols ...
William Arbaugh http://www.cs.umd.edu/~waa/
Information systems security and privacy, security management ...
Giuseppe Ateniese
http://www.cs.jhu.edu/~ateniese/
Applied cryptography and network security
Vijay Atluri
http://cimic.rutgers.edu/~atluri/
Information Security, Privacy, Databases, Workflow Management,Spatial Databases ...
John Aycock
http://pages.cpsc.ucalgary.ca/~aycock/
Computer security, worms, virus, trjoans, future threats and defenses ...
Michael Backes http://www.infsec.cs.uni-sb.de/~backes/
Information security and cryptography ...
Lucas Ballard
http://www.cs.jhu.edu/~lucas/
Security in biometrics and VoIP, and web security ...
Michael Bailey
http://www.eecs.umich.edu/~mibailey/
Security and availability of complex distributed systems ...
Paul Barford
http://pages.cs.wisc.edu/~pb/
Network security, intrustion detection, network measurement and evaluation...
Adam Barth
http://www.adambarth.com/
Browser security, and privacy
Lujo Bauer
http://www.ece.cmu.edu/~lbauer/
Computer security, proof-carrying authorization, distributed access control ...
Steven M. Bellovin
http://www.cs.columbia.edu/~smb/
Networks, security, and especially why the two don't get along ...
Emery Berger
http://prisms.cs.umass.edu/emery/
Automatic error detection, toleration, and correction ...
Konstantin Beznosov
http://konstantin.beznosov.net/professional/main/main.html
System & network security, security usability, access control ...
Dan Boneh
http://crypto.stanford.edu/~dabo/
Applied cryptography, and network security ...
Nikita Borisov
http://www.hatswitch.org/~nikita/
Computer security and privacy, especially as applied to large-scale distributed systems...
Herbert Bos
http://www.cs.vu.nl/~herbertb/
System and network security, intrusion detection and signature generation ...
David Brumley
http://www.ece.cmu.edu/~dbrumley/
Software security, network security, and applied cryptography
Roy Campbell
www.cs.uiuc.edu/~rhc
Security, distributed operating systems and ubiquitous computing
Miguel Castro
http://research.microsoft.com/en-us/um/people/mcastro/
Software security, network security, and distributed systems
Philip Chan
http://www.cs.fit.edu/~pkc/
Adaptive systems, machine learning methods for computer security, web personalization ...
Hao Chen
http://www.cs.ucdavis.edu/~hchen/
Web security, cellular network security, software security, and malware defense ...
Peter M. Chen
http://www.eecs.umich.edu/~pmchen/
Virtual machine systems, speculative execution in OS & DS, fault-tolerant computing
Shuo Chen
http://research.microsoft.com/en-us/um/people/shuochen/
Systems security, software security, browser security, formal verification, program analysis
Yan Chen
http://www.cs.northwestern.edu/~ychen/
Computer networking and large-scale distributed systems, network measurement, diagnosis ...
Tzi-cker Chiueh http://www.ecsl.cs.sunysb.edu/~chiueh/
System & network security, malware defense ...
Stephen Chong http://www.cs.cornell.edu/w8/~schong/
Expressive and Enforceable Information Security Policies ...
Mihai Christodorescu
http://pages.cs.wisc.edu/~mihai/
Computer security, malware analysis, program verification, and software engineeringe ...
Evan Cooke
http://www.eecs.umich.edu/~emcooke/
Network security and distributed systems, malware analysis (defense) ...
Manuel Costa
http://research.microsoft.com/en-us/people/manuelc/
Scalable and reliable systems and networks ...
Crispin Cowan
http://crispincowan.com/
System & network security, survivability ...
Jedidiah R. Crandall
http://www.cs.unm.edu/~crandall/
VM systems, software security, and malware defense ...
Weidong Cui
http://research.microsoft.com/en-us/um/people/wdcui/
Systema & network security, malware analysis
Marc Dacier
http://www.eurecom.fr/people/dacier.en.htm
Attack attribution, underground economy, trustworthy infrastructure, cloud computing ...
George Danezis http://research.microsoft.com/en-us/um/people/gdane/
Computer security and privacy, traffic analysis, statistical inference, & P2P security ...
Anupam Datta
Information security and privacy, Security Analysis of Network Protocols ...
http://www.andrew.cmu.edu/user/danupam/
Saumya Debray http://www.cs.arizona.edu/people/debray/
Software security, binary rewriting and link-time code optimization, code compression
Rachna Dhamija http://people.deas.harvard.edu/~rachna/
Security Usability, Authentication, Anti-phishing, Privacy, Security, ...
Sven Dietrich
http://home.adelphi.edu/~spock/
Computer security, applied cryptography, anonymity, privacy ...
George Dinolt
http://faculty.nps.edu/gwdinolt/
Security policies, secure systems architectures and design ...
Wenliang (Kevin) http://www.cis.syr.edu/~wedu/ Du
Security in wireless Ad hoc and sensor networks, distributed computing and grid Computing ...
Dawson Engler
Software security, program analysis, bug finding...
http://www.stanford.edu/~engler/
Ulfar Erlingsson http://www.ru.is/faculty/ulfar/
Dependable, distributed software systems ...
David Evans
http://www.cs.virginia.edu/~evans/
System security, software engineering, programming languages, cryptography, networking ...
Nick Feamster
http://www.cc.gatech.edu/~feamster/
Networked computer systems: network operations, architecture, protocol design ...
Edward W. Felten
http://www.cs.princeton.edu/~felten/
Computer security and privacy, and technology policy ...
Jeff Foster
http://www.cs.umd.edu/~jfoster/
Programming languages, software engineering, program analysis ...
Cedric Fournet
http://research.microsoft.com/en-us/um/people/fournet/
Concurrent programming, distributed systems, and security ...
Michael Franz
http://www.ics.uci.edu/~franz/
Security and efficiency aspects of mobile-code systems and on VM technology ...
Michael J. Freedman
http://www.cs.princeton.edu/~mfreed/
Distributed systems, security, networking, and applied cryptography ...
Kevin Fu
http://www.cs.umass.edu/~kevinfu/
Security and privacy for pervasive computation ...
Vinod Ganapathy
http://www.cs.rutgers.edu/~vinodg/
Computer security and reliability,software engineering, program analysis, OS ...
Tal Garfinkel
http://www.stanford.edu/~talg/
VM systems, computer security, networks ...
Virgil D. Gligor
http://www.ece.cmu.edu/~virgil/
Network and distributed systems security, applied cryptography ...
Jonathon Giffin
http://www.cc.gatech.edu/~giffin
System and software security, intrusion detection, program analysis, virtualization ...
Patrice Godefroid
https://research.microsoft.com/en-us/um/people/pg/
Program specification, analysis, testing and verification, model checking
Steven D. Gribble
http://www.cs.washington.edu/homes/gribble/
OS, DS, scalable Internet services, systems security, malware defense
Debin Gao
http://www.sis.smu.edu.sg/faculty/infosys/debingao.asp
System & Network security, intrusion detection ...
Carrie Gates
http://flame.cs.dal.ca/~gates/
Network security and traffic analysis, network situational awareness ...
Ian Goldberg
http://www.cs.uwaterloo.ca/~iang/
Security and privacy, creating security and privacy technologies for Internet transactions...
Philippe Golle
http://crypto.stanford.edu/~pgolle/
Network security, privacy ...
Guofei Gu
http://faculty.cs.tamu.edu/guofei/
System & Network security, malware detection, defense, and analysis, Web security ...
Yong Guan
http://home.eng.iastate.edu/~guan/
Computer and network forensics, wireless and sensor network security, privacy-enhancing ...
Fanglu Guo
http://www.ecsl.cs.sunysb.edu/~fanglu/
System & network security, wireless network, network performance and dependability ...
Peter Gutmann
http://www.cs.auckland.ac.nz/~pgut001/
Design and analysis of security techniques and systems ...
J. Alex Halderman
http://www.cse.umich.edu/~jhalderm/
Software security, data privacy, electronic voting, digital rights management, cybercrime ...
Michael Hicks
http://www.cs.umd.edu/~mwh/
Software reliability and security ...
Thorsten Holz
http://honeyblog.org/
Malware collection (honeypot), analysis, detection, prevention ...
Yih-Chun Hu
http://users.crhc.illinois.edu/yihchun/
Security and systems -- secure systems and mobile communications ...
Cynthia Irvine
http://faculty.nps.edu/irvine/
High assurance systems and multilevel security...
Angelos Keromytis
http://www1.cs.columbia.edu/~angelos/
Computer security, cryptography, and networking
Emre Kiciman
http://research.microsoft.com/en-us/people/emrek/
Large-scale systems (mostly Internet services) reliability and operations ...
Yongdae Kim
http://www-users.cs.umn.edu/~kyd/
Practical security mechanisms in file systems, p2p systems, sensor and ad-hoc network ...
Engin Kirda
http://www.iseclab.org/people/ek/
Software and network security, web vulnerability detection and prevention, binary analysis...
Negar Kiyavash http://users.crhc.illinois.edu/kiyavash/
Timing Channels, Digital Fingerprinting, Biometrics and Cryptography ...
Christian Kreibich
http://www.icir.org/christian/
Network architecture, distributed systems, and network security ...
Shriram Krishnamurthi
http://www.cs.brown.edu/~sk/
Computer-aided verification, computer security, and software engineering ...
Christopher Kruegel
http://www.cs.ucsb.edu/~chris/
Computer & network security, malware analysis, web security, and vulnerability analysis...
Peng Liu
http://ist.psu.edu/s2/pliu/
Survivable systems, systems & network Security, privacy ...
Collin Jackson
http://www.collinjackson.com/
Securing the Web Platform, Security for Mashups, Privacy in the Browser ...
Trent Jaeger
http://www.cse.psu.edu/~tjaeger/
VM systems, Linux security, source code analysis ...
Farnam Jahanian
http://www.eecs.umich.edu/~farnam/
Distributed computing, network security, and network protocols & architecture...
Sushil Jajodia
http://csis.gmu.edu/faculty/jajodia.html
Information systems security, survivability and information warfare, watermarking ...
Somesh Jha
http://pages.cs.wisc.edu/~jha/
Computer security, software engineering, program analysis ...
Xuxian Jiang
http://www.csc.ncsu.edu/faculty/jiang/
Virtual machines (VMs) and OS security, malware analysis
Markus Jakobsson
http://www.informatics.indiana.edu/markus/
Netwrok security, phishing and countermeasures, click-fraud, cryptography ...
Rob Johnson
http://www.cs.sunysb.edu/~rob/
Software security, system and network security, cryptography s...
Anthony D. Joseph
http://bnrg.cs.berkeley.edu/~adj/
Internet security, mobile/distributed computing, and wireless communications ...
Jaeyeon Jung
http://www2.seattle.intel-research.net/~jjung/
Intrusion detecion, network forensic analysis ...
Sam King
http://www.cs.uiuc.edu/homes/kingst/Home.html
VMs, OS & user level application code security ...
Tadayoshi Kohno
http://www.cs.washington.edu/homes/yoshi/
Computer security, privacy, and applied cryptography ...
Arun Lakhotia
http://www.cacs.louisiana.edu/~arun/
Program analysis, program visualization and understanding, software evolution/protection ...
Adam J. Lee
http://www.cs.pitt.edu/~adamlee/
Protocol design and optimization, privacypreserving policy evaluation ...
http://www.cc.gatech.edu/~wenke/
Systems and network security, applied cryptography, network management, and data mining
Wenke Lee
Brian Neil Levine http://prisms.cs.umass.edu/brian/
Mobile networks, security, and the Internet ...
Ninghui Li
http://www.cs.purdue.edu/homes/ninghui/
Cmputer security, access control, privacy, applied cryptography ...
Zhuowei Li
http://zhuowei.net/default.aspx
Malware/spyware analysis, defense and containment, Intrusion detection ...
Zhenkai Liang
http://www.comp.nus.edu.sg/~liangzk/
Software security, program analysis
David Lie
http://www.eecg.toronto.edu/~lie/
OS, computer architecture, formal verification and networking ...
Ulf Lindqvist
http://www.csl.sri.com/people/lindqvist/
Computer misuse analysis, modeling, categorization, and automatic real-time detection ...
Alex X. Liu
http://www.cse.msu.edu/~alexliu/
Networking and security, distributed computing, dependable and high-assurance systems ...
Benjamin Livshits
http://research.microsoft.com/en-us/um/people/livshits/
Software security, bug finding, vulnerability analysis ....
Michael E. Locasto
http://www.cpsc.ucalgary.ca/~locasto/
System Security, with a focus on automatic, correct, and efficient defense mechanism ...
Javier Lopez
http://www.cis.upenn.edu/~stevez/
Network security, security Services and cryptographic protocols for network applications ...
Jonathan M. McCune
http://www.ece.cmu.edu/~jmmccune/
Trusted Computing, Operating system and virtualization security, ...
Sergio Maffeis
http://www.doc.ic.ac.uk/~maffeis/
Web application security, JavaScript, security protocols, types, ...
Mohammad Mannan
http://people.scs.carleton.ca/~mmannan/
Authentication and passwords, malicious software, software security, identity fraud ...
Lorenzo Martignoni
http://martignlo.greyhats.it/
Malware analysis and detection, Vulnerability analysis, VM, Computer forensics ...
Roy A. Maxion
http://www2.cs.cmu.edu/afs/cs.cmu.edu/user/maxion/www/
Fault/intrusion detection, attacker/defender testbed, reliable hardware/software ...
David Mazieres http://www.scs.stanford.edu/~dm/
Computer system and security
David Molnar
http://www.dmolnar.com/
Cryptography, privacy, and computer security
Z. Morley Mao
http://www.eecs.umich.edu/~zmao/
Network security/forensics, network systems/applications, and network management
Patrick McDaniel http://www.patrickmcdaniel.org/
Systems & network security, language-based security ...
John C. Mitchelll http://theory.stanford.edu/people/jcm/
Access control, network protocols, privacy, software systems, and web security ...
George Mohay
Computer security, intrusion detection, computer forensics ...
http://sky.fit.qut.edu.au/~mohayg/
Fabian Monrose http://www.cs.unc.edu/~fabian/
Malware classification and modeling, traffic analysis, applied crypto and privacy ...
Greg Morrisett
http://www.eecs.harvard.edu/~greg/
Applications of programming language technology for building secure and reliable systems. ...
Andrew Myers
http://www.cs.cornell.edu/andru/
Computer security, programming languages, and distributed and persistent objects ...
George Necula
http://www.cs.berkeley.edu/~necula/
Security in distributed systems, programming language theory, design and implementation ...
Peng Ning
http://discovery.csc.ncsu.edu/
Software and systems security, and security in Ad-hoc & WSN ...
Paul C. Van Oorschot
http://www.scs.carleton.ca/~paulv/
Authentication, network security, software security, applied cryptography ...
Bryan Parno
http://www.ece.cmu.edu/~bparno/
Network and host-based security, applied cryptography ...
Vern Paxson
http://www.icir.org/vern/
System & Network Security, malware defense ...
Marco Pistoia
http://www.research.ibm.com/people/p/pistoia/
Mobile-code security, component software, and static program analysis of OO ...
Adrian Perrig
http://www.ece.cmu.edu/~adrian/
Networking and systems security, security for mobile computing and sensor networks ...
Radha Poovendran
http://www.ee.washington.edu/research/nsl/faculty/radha/
Security of critical networks and network components ...
Phillip Porras
http://www.csl.sri.com/people/porras/
Intrusion detection, high assurance computing, security evaluation, network management ...
Atul Prakash
http://www.eecs.umich.edu/~aprakash/
Security and privacy, cyber-physical systems ...
Neils Provos
http://www.citi.umich.edu/u/provos/
Web-Based Malware, distributed DoS, intrusion detection & prevention ...
Feng Qin
http://www.cse.ohio-state.edu/~qin/
Software dependability, operating systems, and security ...
Moheeb Rajab
http://www.cs.jhu.edu/~moheeb/
networking and network security ...
Michael Reiter
http://www.cs.unc.edu/~reiter/
System & network security, distributed system, applied crypto ...
William Robertson
http://wilrobertson.com/
Web security, anomaly detection, malware analysis, and electronic voting ...
Cristina NitaRotaru
http://homes.cerias.purdue.edu/~crisn/
DS, network protocols and applications, security in wireless ad hoc network ...
Avi Rubin
http://www.avirubin.com/
Systems and networking security, with special attention to computer privacy ...
Hassen Saidi
http://www.csl.sri.com/users/saidi/
Intrusion detection, and static analysis, computer-aided verification, logic ...
Reiner Sailer
http://www.research.ibm.com/people/s/sailer/
Security services for virtualized environments, security analysis, malware prevention ...
Pierangela Samarati
http://www.dti.unimi.it/samarati/
Data security, information system security, access control policies, models and systems ...
Ravi Sandhu
http://profsandhu.com/
Information security, privacy, authorization models, protocols and mechanisms ...
Stefan Savage
http://www-cse.ucsd.edu/~savage/
System & networking (esp availability, security, and occasionally performance) ...
Stuart Schechter http://research.microsoft.com/en-us/people/stus/
Computer security ...
R. Sekar
Intrusion detection, software security, and OS enhancements ...
http://seclab.cs.sunysb.edu/sekar/
Hovav Shacham http://www.cs.ucsd.edu/~hovav/
Applied cryptography, systems security, and tech policy ...
Umesh Shankar http://www.umeshshankar.com/
Browser security and privacy, intrusion detection, program analysis ...
Micah Sherr
Privacy, e-voting, OS security, network and protocol security, and NIDS ...
http://www.cs.georgetown.edu/~msherr/
Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/
Computer security and privacy, formal methods for analysis of secure systems ...
Stelios Sidiroglou
http://www1.cs.columbia.edu/~ss1759
OS, network and software security and software survivability ...
Radu Sion
http://www.cs.sunysb.edu/~sion/
Information assurance, applied cryptography and network security
Sean W. Smith
http://www.cs.dartmouth.edu/~sws/
System security, PKI, applied crypto ...
Anil Somayaji
http://www.scs.carleton.ca/~soma/
Computer security, OS, artificial life, and complex adaptive systems ...
Robin Sommer
http://www.icir.org/robin/
Network security, high-performance network intrusion detection in operational settings ...
Dawn Song
http://www.cs.berkeley.edu/~dawnsong/
Software security, network security, and applied cryptography ...
Eugene Spafford http://spaf.cerias.purdue.edu/
Information security, computer crime investigation and information ethics ...
Angelos Stavrou http://cs.gmu.edu/~astavrou/
Large systems security & survivability, secure P2p and overlay networking, privacy ...
Salvatore J. Stolfo
http://www1.cs.columbia.edu/~sal/
Intrusion detection system ...
Zhengdong Su
http://www.cs.ucdavis.edu/~su/
Programming languages, software engineering, and computer security ...
G. Edward Suh
http://www.csl.cornell.edu/~suh/
Computer Architecture, computer security, reliability ...
Paul Syverson
http://www.syverson.org/
Onion routing; Protocols, security, anonymity, and privacy in Ad-hoc & WSN ...
Peter Szor
http://www.peterszor.com/
Computer virus detection, and intrusion prevention...
Patrick Traynor http://www.cc.gatech.edu/~traynor/
Security in cellular networks
Gene Tsudik
http://www.ics.uci.edu/~gts/
Privacy, computer and network security, applied cryptography ...
Doug Tygar
http://www.cs.berkeley.edu/~tygar/
Privacy, computer security and electronic commerce
Shambhu J. Upadhyaya
http://www.cse.buffalo.edu/~shambhu
Information assurance, computer security, fault diagnosis, fault tolerant computing ...
Alfonso Valdes
http://www.csl.sri.com/users/valdes/
Probabilistic alert correlation, dependable intrusion tolerance ...
V.N. http://www.cs.uic.edu/~venkat/ Venkatakrishnan
Web & browser security, privacy and information flow policies ...
Giovanni Vigna
http://www.cs.ucsb.edu/~vigna/
Web Security, intrusion detection, vulnerability analysis, malware and badware analysis
Jan Vitek
http://www.cs.purdue.edu/homes/jv/
Programming languages, VM, program analysis and optimization, information security
Geoffrey M. Voelker
http://www-cse.ucsd.edu/~voelker/
Network and systems security ...
David Wagner
http://www.cs.berkeley.edu/~daw/
Systems & networks, applications of static and dynamic program analysis to computer security
Dan Wallach
http://www.cs.rice.edu/~dwallach/
Mobile code security, p2p networking security, wireless security, security in evoting systems
Michael Waidner http://www.zurich.ibm.com/~wmi/
Computer and network security, privacy ...
Cliff Wang
http://www.csc.ncsu.edu/directories/faculty_info.php? id=2324
Network security, Secure protocols and algorithms for sensor networks and wireless...
Haining Wang
http://www.cs.wm.edu/~hnw/
Network security, network QoS, computer Security, wireless and mobile computing ...
Helen J. Wang
http://research.microsoft.com/en-us/um/people/helenw/
System security, malware defense, web security, wireless location privacy ...
Jia Wang
http://www.research.att.com/~jiawang/
Internet routing, network measurement and management, and network security ...
Lingyu Wang
http://users.encs.concordia.ca/~wang/
Data privacy, vulnerability analysis, intrusion detection, security metrics ...
Ke Wang
http://www1.cs.columbia.edu/~kewang/
Intrusion detection, user behavior modeling, spam blocking ...
Xinyuan (Frank) http://ise.gmu.edu/~xwangc/ Wang
Network-based intrusion source tracing, botnet, VoIP security, information hiding ...
XiaoFeng Wang http://www.informatics.indiana.edu/xw7/
Automatic program Analysis, DoS containment, incentive engineering
Yi-Min Wang
https://research.microsoft.com/en-us/um/people/ymwang/ Cybersecurity & systems management ...
Brent Waters
http://userweb.cs.utexas.edu/~bwaters/
Network security and applied cryptography ...
Nicholas C Weaver
http://www.icsi.berkeley.edu/~nweaver/
Network and systems security ...
Westley Weimer http://www.cs.virginia.edu/~weimer/
Software quality, program analysis, designing languages and language features ...
Tara Whalen
http://sites.google.com/site/tjwhalen/
Usable security, computer and network security, human-computer interaction, privacy ...
William H. Winsborough
http://www.cs.utsa.edu/~winsboro/
Computer security and privacy in distributed systems and networks ...
Rebecca N. Wright
http://www.cs.rutgers.edu/~rebecca.wright/
Computer and communications security ...
S. Felix Wu
http://www.cs.ucdavis.edu/~wu/
Vulnerability analysis, IPSec/VPN policy management, routing protocol security ...
Yinglian Xie
http://research.microsoft.com/en-us/people/yxie/
Network security, privacy, distributed systems, and networking ...
Dongyan Xu
http://www.cs.purdue.edu/homes/dxu/
Virtualization in system security, and distributed computing
Jun Xu
http://research.google.com/pubs/author857.html
System and network security, software security ...
Shouhuai Xu
http://www.cs.utsa.edu/~shxu/
Provably survivable/trustworthy systems ...
Junfeng Yang
http://www.cs.columbia.edu/~junfeng/
OS, software error detection, security, and storage systems ...
Danfeng (Daphne) Yao
http://www.cs.rutgers.edu/~danfeng/
Computer and information security and applied cryptography ...
Vinod Yegneswaran
http://www.csl.sri.com/people/yegneswaran/
System & network security, malware defense ...
Heng Yin
http://lcs.syr.edu/faculty/yin/
Binary analysis, malware detection ...
Haifeng Yu
http://www.comp.nus.edu.sg/~yuhf/
Distributed Systems Security, Distributed Algorithms, Distributed Systems Availability ...
Ting Yu
http://www4.ncsu.edu/~tyu/
Trust management and privacy preservation in open systems, and database management systems...
Nickolai Zeldovich
http://people.csail.mit.edu/nickolai/
System and Network Security, software security, information flow ...
Steve Zdancewic
http://www.cis.upenn.edu/~stevez/
Language-based security, access control and authorization logic ...
Xiangyu Zhang
http://www.cs.purdue.edu/homes/xyzhang/
Software debugging, program analysis, dynamic slicing ...
Xiaolan (Catherine) Zhang
http://www.google.com/search?q=Catherine+Zhang
Secure software technology ...
Sheng Zhong
http://www.cse.buffalo.edu/~szhong/
Wireless networks, data privacy and applied cryptography, theory and algorithms ...
Yuanyuan Zhou http://www.cs.uiuc.edu/homes/yyzhou/
Computer architecture, OS, software reliability, software debugging ...
Sencun Zhu
http://www.cse.psu.edu/~szhu/
Network and systems security, and security in Ad-hoc & WSN ...
Cliff C. Zou
http://www.cs.ucf.edu/~czou/
Computer and network security, network modeling and performance evaluation ...
HOME SOURCE