Information Security Research at UIUC

Information security , also known as Cyber Security is the detection and prevention of vulnerabilities and attacks that lead to theft of information or damages to hardware, software, or data of computer systems. The increase in the amount of new hardware and software that get released and their increasing number of users cause new vulnerabilities and attacks to be found every day. Due to its complexity, both in terms of politics and technology, it is also one of the major challenges of the contemporary world.

On top of cyber security, information security is also about the role of information and communications technologies in shedding light on issues such as vulnerability of children and adults to domestic violence, oppression, and/or exploitation.

Full NameEmailDepartmentTitlePublishing Date
Carl Guntercgunter@illinois.eduComputer ScienceA Hypothesis Testing Approach to Sharing Logs with Confidence2020-3-16
Masooda Bashirmnb@illinois.eduInformation SciencesAn Analysis of Phishing Emails and How the Human Vulnerabilities are Exploited2020
William Sanderswhs@illinois.eduElectrical and Computer EngineerinData-driven model-based detection of malicious insiders via physical access logs2019-11
Zbigniew Kalbarczykkalbarcz@illinois.eduElectrical and Computer EngineeringAssessing and mitigating impact of time delay attack: Case studies for power grid controls2020-1
Yih-Chun Huyihchun@illinois.eduElectrical and Computer EngineeringBloom Filter Based Low-Latency Provenance Embedding Schemes in Wireless Networks2020-5
Nicol Daviddmnicol@illinois.eduComputer ScienceOptimal Monitoring Strategies for Critical Infrastructure Networks2020-4-30
Tao Xietaoxie@illinois.eduComputer ScienceJSidentify: A hybrid framework for detecting plagiarism among javascript code in online mini games6/27/2020
Tarek Abdelzaherzaher@illinois.eduComputer ScienceHandling Missing Sensors in Topology-Aware IoT Applications with Gated Graph Neural Network2020-9-4
Stephen Levinsonselevins@illinois.eduElectrical and Computer EngineeringFuture direction2014-1-1
Christopher Fletchercwfletch@illinois.eduComputer ScienceCache telepathy: Leveraging shared resource attacks to learn DNN architectures2020
Jian Huangjianh@illinois.eduElectrical and Computer EngineeringUnderstanding and finding crash-consistency bugs in parallel file systems2020
Adam Batesbatesa@illinois.eduComputer ScienceTactical provenance analysis for endpoint detection and response systems2020-5
Robin Kravetsrhk@illinois.eduComputer ScienceAggio: A coupon safe for privacy-preserving smart retail environments12/6/2018
Deming Chendchen@illinois.eduElectrical and Computer EngineeringPoisoning Attack on Load Forecasting2019-5
Miller Andrewnsoc1024@illinois.eduElectrical and Computer EngineeringNon-interactive Proofs of Proof-of-Work2020
Negar Kiyavashkiyavash@illinois.eduElectrical and Computer EngineeringA covert queueing channel in fcfs schedulers6/1/2018
Michael Baileymdbailey@illinois.eduElectrical and Computer EngineeringMeasuring Identity Confusion with Uniform Resource Locators4/21/2020
Jose Meseguermeseguer@illinois.eduComputer ScienceFormal verification of the yubikey and yubihsm apis in maude-npa2018
Haitham Al-Hassaniehhaitham@illinois.eduElectrical and Computer EngineeringMany-to-many beam alignment in millimeter wave networks1/1/2019
Vikram Advevadve@illinois.eduComputer ScienceHPVM: Heterogeneous parallel virtual machine2/10/2018
Kumar Rakeshrakeshk@illinois.eduElectrical and Computer EngineeringMelody: Synthesized datasets for evaluating intrusion detection systems for the smart grid1/4/2018
Darko Marinovmarinov@illinois.eduComputer ScienceOpen Source Vulnerability Notification1/1/2019
Michael Shawmjshaw@illinois.eduBusiness AdministrationAnalysis and prediction of unplanned intensive care unit readmission using recurrent neural networks with long shortterm memory7/1/2019
Kevin Changkcchang@illinois.eduComputer ScienceNonintrusive Smartphone User Verification Using Anonymized Multimodal Data3/1/2019
Klara Nahrstedtklara@illinois.eduComputer ScienceDetection of DoS Attacks Using ARFIMA Modeling of GOOSE Communication in IEC 61850 Substations10/5/2020
Romit Choudhurytcroy@illinois.eduElectrical and Computer EngineeringMany-to-many beam alignment in millimeter wave networks1/1/2019
James Basneyjbasney@illinois.eduNational Center for Supercomputing Applications (NCSA)Custos: Security Middleware for Science Gateways7/26/2020
Tamer Basarbasar1@illinois.eduElectrical and Computer EngineeringA Data-Informed Approach for Analysis, Validation, and Identification of COVID-19 Models10/6/2020
Sibin Mohansibin@illinois.eduComputer SciencePeriod Adaptation for Continuous Security Monitoring in Multicore Real-Time Systems2020-3
Cedric Langbortlangbort@illinois.eduAerospace EngineeringSecure contingency prediction and response for cyber-physical systems2020-8
Petros Voulgarisvoulgari@illinois.eduAerospace EngineeringA multilevel sampled-data approach for resilient navigation and control of autonomous systems2/1/2020
Nitin Vaidyanhv@illinois.eduElectrical and Computer EngineeringCollaborative defense against data injection attack in IEC61850 based smart substations11/10/2016
Yuguo Chenyuguo@illinois.eduStatisticsStatistical Network Analysis: A Review with Applications to the Coronavirus Disease 2019 Pandemic2020-8-1
Jay Kesankesan@illinois.eduLawAn Empirical Investigation of the Relationship between Local Government Budgets, IT Expenditures and Cyber Losses1/1/2019
Christoforos Hadjicostischadjic@illinois.eduElectrical and Computer EngineeringDetection of collaborative cyber-attacks through correlation and time dependency analysis2016
Mahesh Viswanathanvmahesh@illinois.eduComputer ScienceModelchecking Safety Properties in Randomized Security Protocols2020
Iyer Ravishankarrkiyer@illinois.eduElectrical and Computer EngineeringA Retrospective Longitudinal Study of COVID-19 as Seen by a Large Urban Hospital in Chicago11/30/2020