CRA Organization

Highlighted below, the CRA is structured in tightly integrated groups focusing on the Risk, Detection, and Agility research areas (RA), as well as a broadly themed mission model area. The human dynamics CCRI will be directly integrated into the efforts of each RA. The team membership is as structured as fallows:

PI Biographical Information

Patrick McDaniel Patrick McDaniel is a Professor in the Computer Science and Engineering Department at The Pennsylvania State University and co-director of the Systems and Internet Infrastructure Security Laboratory. Patrick's work on telecommunications security has uncovered serious vulnerabilities in the structure of the existing cellular network. His reported vulnerabilities relate to the misuse of text messaging to congest control channels on the "over-the-air" protocols, thereby preventing the delivery of legitimate voice and data. Working with cellular providers and national carriers, he has extended this work to 3G data services and uncovered similar problems in new standards. Patrick has worked with the FBI, FCC, DHS, Lucent, and has sat on the President's National Security Telecommunications Advisory Committee (NSTAC) helping craft national telecommunications public policy. Patrick also actively participates in national debates on important public policy issues. He was named the principal investigator of the EVEREST project analyzing the security of voting systems used in Ohio. Working directly with the Ohio Secretary of State and leading teams from Penn State, the University of Pennsylvania, and the University of California-Santa Barbara, he directed source code and red-teaming efforts used to illuminate security issues in voting systems and to assess the effectiveness of technical and procedural countermeasures addressing flaws. Extending previous reports in Florida and California, the vulnerabilities and procedures revealed in this 300+ page report directly informed the election procedures used nationwide in the 2008 Presidential election.

Patrick was the editor-in-chief of the ACM Journal Transactions on Internet Technology (TOIT), and served as associate editor of the journals ACM Transactions on Information and System Security and IEEE Transactions on Computers, and IEEE Transactions on Software Engineering position. Patrick was awarded the National Science Foundation CAREER Award and has chaired several top conferences in security including, among others, the 2007 and 2008 IEEE Symposium on Security and Privacy and the 2005 USENIX Security Symposium.

Prior to joining Penn State, Patrick was a Senior Research Staff Member at AT&T Research in Florham Park, NJ.

Lujo Bauer is an Associate Research Professor at Carnegie Mellon University, with joint appointments in CyLab and the Electrical and Computer Engineering Department. His interests span many areas of computer security, including building usable access-control systems with sound theoretical underpinnings, developing languages and systems for run-time enforcement of security policies, and generally narrowing the gap between a formal model and a practical, usable system. Bauer is active in both the traditional computer security community and in the usable security community, recently chairing conferences such as ACM's Conference on Data and Application Security and Privacy (CODASPY) in 2013, the Internet Society's Network and Distributed Systems Security Symposium (NDSS) in 2014, and co-chairing the Symposium on Usable Privacy and Security (SOUPS) in 2013 and 2014. Some of Bauer's most-cited research focuses on achieving fundamental theoretical understanding of the capabilities of enforcement systems, including in distributed settings, and on developing practical mechanisms that can be formally shown to correctly enforce desired policies. This foundational approach will be leveraged when developing algorithms for agility to aid in automatically generating configuration options that satisfy desired global constraints. Bauer's research in designing and improving the efficacy of user interfaces for security provides a good starting point for addressing aspects of the human element that is a key part of attack detection.

Bennett I. Bertenthal is the James H. Rudy Professor of Psychological and Brain Sciences and is also a member of the Cognitive Sciences Program and Neuroscience Program at Indiana University. Previously, he was a Professor of Psychology at the University of Chicago, and also held appointments in the Computation Institute and Argonne National Laboratory. From 1996-1999, he was the assistant director of the Social, Behavioral, and Economic Sciences directorate at the National Science Foundation, and was also responsible for the divisions of Science Statistics and International Cooperation. From 2006-2010, he was dean of the College of Arts and Sciences at Indiana University. He is the author of over 130 publications on the development of perception and action, visual attention, multimodal communication, automatic vs. controlled decisions, and science policy. His research is multidisciplinary and includes psychophysical measures like response time, eye tracking, physiological measures like pupil dilation and heart rate variability, measures of brain activity (EEG/ERP), as well as computational modeling. During his career he has received numerous federal and private foundation grants, and served as the founding Director of the NSF funded Social Informatics Data Grid (SIDGrid). Dr. Bertenthal has lectured extensively on the social and behavioral sciences and science policy in the U.S. and abroad, and has served on multiple national advisory committees including the National Science and Technology Council subcommittees concerned with basic science and fundamental research on children. He is a fellow of the American Association for the Advancement of Science, the American Psychological Society, and the American Psychological Association.

Jean Camp is a founder of the interdiscipline of economics of security, with expertise in both rational and behavioral economics of security. Her c ore contributions are in area of the interaction between organizational, human, and economic factors with technologies of security and privacy, otherwise know as risk. Her work on risk assessment has included analysis of macro level variables in cases of spam and malware; risk pricing for authorized users; and incentive-based management of users as well as defenders. She is a pioneer in security interaction as risk communication, and implemented the first work on mental models in computer security. She builds on the economics and psychological literature in order to embed heuristics and biases in human decision making proactively in the design of secure systems. Professor Camp is the author of “Trust and Risk in Internet Commerce” (MIT Press), “Economics of Identity Theft” (Springer) and the editor of “Economics of Information Security” (Kluwer Academic). She has authored over one hundred fifty peer-reviewed works, in addition to selected or invited works, and tens of book chapters. She has made scores of invited presentations on five continents. Her patents are in the area of privacy-enhancing technologies. Prof. Camp's trajectory is uniquely interdisciplinary, as began her graduate studies in electrical engineering in North Carolina before moving to the Department of Engineering and Public Policy at Carnegie Mellon to complete her PhD in Engineering and Public Policy. Upon graduation she became a Senior Member of the Technical Staff at Sandia National Laboratories. She left Sandia National Laboratories for eight years as a professor at Harvard's Kennedy School, departing to lead the security group in the newly-formed School of Informatics at Indiana University.

Nicolas Christin is an Assistant Research Professor of Electrical and Computer Engineering at Carnegie Mellon University, and is affiliated with CyLab, Carnegie Mellon University's security lab. He also has courtesy faculty appointments in Engineering and Public Policy, and in the Information Networking Institute. He holds a Diplôme d'Ingénieur from École Centrale Lille, and M.S. and Ph.D. degrees in Computer Science from the University of Virginia. His research interests are in computer and information systems networks; most of his work is at the boundary of systems and policy research, with a slant toward security aspects. He has most recently focused on online crime, security economics, and psychological aspects of computer security. He equally enjoys field measurements and mathematical modeling. His work on applications of game-theory to security decision-making has been extensively cited, and his work on measurements of online criminal activity has garnered significant attention from the popular press (with NPR, Forbes, or the Economist among others citing various research efforts Christin led), but more importantly, helped the research community design much more accurate models of attacker behavior. Finally, his recent work on password authentication (with Cranor and Bauer among others) is a successful example of human dynamic modeling (user studies) integration with network measurements and mathematical analysis (e.g., comparison of entropy calculations with actual guessability).

Lorrie Faith Cranor is an Associate Professor of Computer Science and of Engineering and Public Policy at Carnegie Mellon University where she is director of the CyLab Usable Privacy and Security Laboratory (CUPS) and co-director of the MSIT-Privacy Engineering masters program. She is also a co-founder and scientific advisor of Wombat Security Technologies, Inc., a leading provider of cyber security training and filtering solutions. Dr. Cranor came to CMU in December 2003 after seven years at AT&T Labs-Research. Dr. Cranor has played a key role in building the usable privacy and security research community. She co-edited the seminal book Security and Usability, and founded the Symposium On Usable Privacy and Security (SOUPS). She also directs an NSF-funded Integrative Graduate Education and Research Traineeship (IGERT) program on usable privacy and security. Dr. Cranor has conducted pioneering research that investigates cyber security challenges while considering humans as an integral part of the system under consideration, rather than a secondary constraint. She has led research efforts focused on reducing susceptibility to phishing, making access control systems easier to configure and less susceptible to human error, improving the effectiveness of cyber trust indicators and warnings, and developing password policies grounded in empirical data. Her 2008 framework for reasoning about the human in the loop offers a systematic model for investigating human behavior in a secure system.

Cleotilde Gonzalez is an international leader in behavioral and computational research of Dynamic Decision Making. She investigates experience-based decision making, with experimental and computational cognitive modeling methods, to determine when and how individuals rely on experience to make decisions and how experience helps them adapt to novel situations. Together with her colleagues, she developed a theory of learning and decisions from experience in dynamic tasks, called Instance-Based Learning Theory (IBLT). IBLT is represented computationally in a number of cognitive models that make accurate predictions and provide additional theoretical insights on experience-based decision making within a cognitive framework. IBLT was originally developed with the support of the Army Research Laboratories, Advanced Decisions Architectures, Collaborative Technologies Alliance (ARL, ADA-CTA), a program in which Prof. Gonzalez was a lead PI. IBL models have been developed in a wide range of real-life contexts, and recently in cyber-security. IBL models rely of learning and memory mechanisms from the well-known ACT-R cognitive architecture. The cyber-security models emerged from a MURI grant on cyber situation awareness, by the Army Research Office (ARO). Prof. Gonzalez has proposed a theoretical framework to extend IBL models that integrate adversary-defender interactions through Behavioral Game Theory (BGT). Prof. Gonzalez has started to use IBL-BGT models to study cyber warfare and to investigate development of trust in the Network Sciences, ARL- CTA. For more information about her research see:

Diane S. Henshel is an Associate Professor in the School of Public and Environmental Affairs at Indiana University and Director of the Developmental NeuroToxicology and Risk Assessment Laboratory. A trained neuroscientist, her work focuses on developing indices used in risk assessments and on assessing risk of complex problems and situations, usually related to environmental contamination (e.g. cumulative ecosystem risk) or sustainable development (e.g. relative risk of alternative transportation systems and routing). As a consultant Henshel's work with government agencies and communities focuses on cumulative risk assessment modeling and communicating risk to different audiences.

Dr. Henshal recently spent a year as Executive Director of the Risk Assessment Forum of the USEPA, where one of her main projects involved helping develop EPA's cumulative risk assessment technical guidance. Henshel is currently working with NOAA on a project to develop cumulative risk assessments of a landscape scale watershed, incorporating large amounts of dissimilar data (molecular test results through chemical analyses and human use and population scale sociodemographic data) across multiple levels of biological and social organization. An author of over 50 peer reviewed publications, in addition to book chapters, and two edited books on Environmental Toxicology and Risk Assessment, Henshel is also author of over two dozen grey literature reports and over 100 meeting abstracts addressing topics related to risk assessment.

Trent Jaeger is a Professor in the Computer Science and Engineering Department at The Pennsylvania State University and the Co-Director of the Systems and Internet Infrastructure Security (SIIS) Lab. He is a well-known expert in computer systems security having published over 100 peer-reviewed papers on these topics and is the author of the book “Operating Systems Security,” which examines the principles of secure operating systems. Dr. Jaeger’s research has resulted in several contributions to the security of the Linux kernel, including the Linux Security Modules framework, Linux Integrity Modules framework, and the integration of IPsec with SELinux. His current research focuses on techniques for retrofitting programs with security code automatically, testing systems for program vulnerabilities in the large, and monitoring cloud computations to validate customer requirements. Dr. Jaeger is currently the Chair of the ACM Special Interest Group on Security, Audit, and Control (ACM SIGSAC), which is a security research community with nearly 1000 members. He has been the program chair of several conferences and workshops, including ACM ASIACCS in 2014. He previously worked at IBM Research from 1996 to 2005, when he joined Penn State.

Srikanth V. Krishnamurthy is a professor of Computer Science and Engineering at the University of California, Riverside. He is a well known expert in the areas of networking, systems and security, especially in the wireless domain. He has worked on several topics pertaining to wireless and network security and intrusion detection. He has built several systems including those for anti-jamming and social network privacy. Twitsper, a privacy preserving wrapper for Twitter, that he developed with PI Madhyastha has been downloaded over a 1000 times and has received significant media attention. Krishnamurthy has been a part of several ARL/ARO funded grants including two collaborative technology alliances and two MURIs. He has also received the prestigious NSF CAREER award from NSF. Krishnamurthy is an IEEE Fellow. He was the editor-in-chief of ACM MC2R and an associate editor for the IEEE Transactions on Mobile Computing. He has also served as the technical program committee Co-Chair for IEEE ICNP, IEEE SECON and IEEE WoWMoM. He was the program committee vice-chair for ACM MobiCom in 2007.

Tom LaPorta is the William E Leonhard Chair Professor in Computer Science and Engineering at Penn State. He is the founder and Director of the Institute of Networking and Security Research at Penn State which has over 20 faculty members and 60 graduate students. He is also the Director of the Communications Network Academic Research Center, and lead for the Quality of Information Thrust in the Network Sciences Collaborative Technology Alliance funded by the Army Research Lab. He served as Technical Area Lead for the Sensor Information Processing and Delivery area of the International Technology Alliance program funded by the Army Research Lab and UK Ministry of Defense for 5 years, and now serves as a project champion. La Porta is an IEEE Fellow, Bell Labs Fellow, received the Bell Labs Distinguished Technical Staff Award in 1996, and an Eta Kappa Nu Outstanding Young Electrical Engineer Award in 1996. He also won a Thomas Alva Edison Patent Awards in 2005 and 2009. Dr. La Porta was the founding Editor-in-Chief of the IEEE Transactions on Mobile Computing, and currently serves on its Steering Committee (he was Chair from 2009-2010). He served as Editor-in-Chief of IEEE Personal Communications Magazine. He was the Director of Magazines for the IEEE Communications Society and was on its Board of Governors for three years. He has published numerous papers and holds 35 patents.

Professor Karl Levitt received his Ph.D. from New York University in 1966. He has conducted research in automated verification, computer security, fault-tolerant computing, advanced architectures, and software engineering. Since 1986, Karl Levitt has been a Professor of Computer Science at the University of California, Davis, and director of UC Davis' Computer Security Laboratory, which has been designated as a Center of Excellence within the UC Davis College of Engineering. Professor Levitt was a pioneer in developing network and distributed intrusion detection techniques. His primary research interests are computer security (especially intrusion detection), formal methods, and automated program analysis. He is a codeveloper of the Malicious Code Testbed, a system that determines the presence of malicious code, such as worms or trojan horses in source or object code. He has been PI or co-PI for DARPA, NSA, NSF, NASA-Ames, Army Research Laboratory, and industry-sponsored projects relating to intrusion detection, automated response to intrusions, formal specification of security policy, audit analysis and security for mobile code systems. He has authored or coauthored over 100 papers on security, formal methods, program analysis, fault-tolerance, systolic arrays, and software engineering. Prior to joining UC Davis, he worked 20 years for SRI International, the last five as Director of the Computer Science Laboratory. From 2005 until 2009 he was at the National Science Foundation as lead program manager for the Trustworthy Computing Program, which grew in his tenure from $25M/year to $65M/year. He also was Co- Chair of the Infosec Research Council (IRC) and involved in other interagency activities. IN 2009 he received the NSF Director's Award for meritorious service, one of the two conferred that year NSF-wide.

Prasant Mohapatra is currently a Professor in the Department of Computer Science at University of California, Davis. He is the former Tim Bucher Family Endowed Chair Professor and the Chairman of the department. He has also held Visiting Scientist positions at Intel Corporation, Panasonic Technologies, Institute of Infocomm Research (I2R), Singapore, and National ICT Australia (NICTA). He has been a Visiting Professor at the University of Padova, Italy and KAIST, South Korea. He was/is on the editorial board of the IEEE Transactions on Computers, IEEE Transactions on Mobile Computing, IEEE Transaction on Parallel and Distributed Systems, ACM WINET, and Ad Hoc Networks. He has been on the program/organizational committees of several international conferences. Starting January 2014, he will serve as the Editor-in-Chief of the IEEE Transactions on Mobile Computing. Dr. Mohapatra received his doctoral degree from Penn State University in 1993, and received an Outstanding Engineering Alumni Award in 2008. He also received an Outstanding Research Faculty Award from the College of Engineering at the University of California, Davis. He is a Fellow of the IEEE and AAAS. Dr. Mohapatra's research interests are in the areas of wireless networks, mobile communications, sensor networks, Internet protocols, and QoS. He has published more than 250 papers in reputed conferences and journals on these topics. Dr. Mohapatra's research has been funded through grants from the National Science Foundation, Department of Defense, Intel Corporation, Siemens, Panasonic Technologies, Hewlett Packard, Raytheon, Huawei Technologies, and EMC Corporation.

Iulian Neamtiu is a leading expert in dynamic software updating, program and smartphone analysis, as well as quantitative and empirical software engineering. He is the principal developer of Ginseng, the first dynamic software updating implementation that allowed real-world C programs to be updated while they run, while providing strong update safety guarantees, and without imposing a significant performance overhead. His group has developed several tools for analysis of Android apps, including the RERAN record-and-replay infrastructure and the A3E systematic app explorer. He has received the CAREER award from the National Science Foundation (2012) as well as Regents' Fellowship (2009) and Bravo Zulu (2013) awards from the University of California, Riverside.

Zhiyun Qian is an assistant professor in Computer Science and Engineering at University of California, Riverside. He's received the NSF CRII award (pre-CAREER) and other NSF awards. His expertise is in system and network security with emphasis on analyzing the security properties of real world systems such as Android and network infrastructure. His research is frequently covered by media such as,,, His study on TCP security has revealed serious flaws in 1) TCP stack implementations that result in changes being committed to the Linux kernel, and 2) firewall middleboxes whose vendors have published advisories acknowledging the security flaws that allow TCP connection hijacking. He has also revealed flaws in Android GUI systems that allow a malicious background app to infer activities about the foreground app, which can lead to phishing attacks that steal user credentials. Prior to joining University of California, Riverside, Qian was a research staff member at NEC Labs in Princeton, NJ.

Dr. S. Felix Wu is currently a Professor of Computer Science, and Associate Dean of Academic Personnel and Research for College of Engineering at University of California at Davis. He was an Assistant Professor of Computer Science at NC State University from 1995 to 2000. He received his BS from Tunghai University, Taiwan in 1985, MS., and Ph.D. from Columbia University in 1989 and 1995 respectively, all in Computer Science. Prof. Wu has been doing “experimental” research, i.e., building prototype systems to justify and validate novel architectural concepts. His research has made significant impacts to the Internet community. As an example, in 1996, his research team discovered and announced a critical flaw on most commercial OSPF (Open Shortest Path First) routers. Shortly after that, his team developed the first router-based intrusion detection system, JiNao, to detect attacks against OSPF networks. In 2000, when DDoS (Distributed Denial of Services) attacks disabled many commercial web sites, his IPSec-based DECIDUOUS (DECentralized IDentification of intrUsion sOUrceS) system brought several attentions from the venture capital community. Prof. Wu’s research has been supported by DARPA, NSF, ARL, ARO, AFOSR, NSA, ITRI, ETRI, Fujitsu, Intel, IBM, Cisco among others. His recent focus has been on the subject of Computational Social Sciences with applications in Cyber Security, Future Internet Design, Data Analytics, Sustainability, and Software Define Network. He has served as a program committee member, an area editor, and a panelist, for many conferences, journals, and funding agencies. He has been on the steering committee for RAID (Recent Advances in Intrusion Detection) since 2000. Prof. Wu has published more than 130 research papers.