Skip to main content
Home > News >

I3P Researchers in the News

October 2014

Sujeet Shenio The ethics of Hacking 101 Tulsa University
Alessandro Acquisti How much of your data would you trade for a free cookie? Carnegie Mellon University Heinz College
Rae Zimmerman Designing resilient critical infrastructure New York University


September 2014

Steven Bellovin National Cyber Security Hall of Fame announces Final Selectees for the Class of 2014 Columbia University
Kevin Fu Medical Devices Vulnerable for Hack Attacks University of Michigan
Kevin Fu There's really no delete button on the Internet, expert says University of Michigan
David Kotz New approach to computer security: Wrist-bracelet Dartmouth
Alessandro Acquisti Smart Glasses vs. Smart Phones: Which Augments Reality Better? Carnegie Mellon University Heinz College
Alessandro Acquisti Why Should Big Data have more right to privacy than people? Carnegie Mellon University Heinz College
Denise Anthony Dartmouth Teacher Makes Health App Dartmouth
Jean Camp A new plan of attack for cyber security Indiana University


August 2014

Deirdre Mulligan Hacked? Customers are often last to know UC Berkeley

June 2014

Alessandro Acquisti "NSA Collects Millions of Facial Images Per Day" Carnegie Mellon University Heinz College
Diana Burley "Diana Burley recognized as Educator of the Year at the 18th Annual Colloquium for Information Systems Security Education" George Washington University
David Nicol "Illinois receives $2.1 million from NSA to help advance security of cyber systems" University of Illinois
Kevin Fu "Top three trends from AAMI 2014" University of Michigan
Barry Horowitz "Richard Clarke and Karen Jackson co-chair governor-appointed Va. security commission" University of Virginia


May 2014

Alessandro Acquisti "New Anonymous Facebook Login Hides Info, But Not From Facebook" Carnegie Mellon University Heinz College
Anup Ghosh "Cyber attacks present a greater risk to firms as they collect more data about customers"  George Mason University
Deirdre Mulligan "How Urban Anonymity Disappears When All Data Is Tracked"  UC Berkeley
Sujeet Shenoi "TU program helps train nation's spies" University of Tulsa


April 2014

Jim Alves-Foss  "University of Idaho Competes with Big Leagues in Computing" University of Idaho
Angelos Stavrou  "Mobile can be a business driver, say panelists" George Mason University
Deirdre Mulligan  "At Berkeley, experts mine questions of Big Data, power and privacy"   UC Berkeley  
Mauricio Papa "Heartbleed Bug Putting Oklahomans' Online Information At Risk" University of Tulsa
Seymour Goodman  "The U.S. Government Wants 6,000 New 'Cyber Warriors' by 2016" Georgia Tech 
Robert Cunningham "National leaders from industry, government to speak at UO computer security event" Massachusetts Institute of Technology
Sean Smith "Computing works to patch Heartbleed vulnerabilities" Dartmouth College
Steven Bellovin  "Heartbleed: Don't Panic" Columbia University
Kevin Fu  "As Windows XP security updates cease, what's next for healthcare providers"  University of Michigan

 
March 2014

Apu Kapadia  "Not OK, Glass" Indiana University
Deanna Caputo  "Federal agencies embrace new technology and strategies to find the enemy within"  MITRE Corporation
Alessandro Acquisti "Loyalty cards unlock shoppers' data" Carnegie Mellon University Heinz College
Marc Rogers "Ex-police officer tackles crimes as director of cyber forensics program" Purdue University
Zach Tudor, Ulf Lindqvist "A place for learning and development"  SRI International

 
February 2014

William Sanders "C-U named one of Techie.com's "Most Promising Tech Hubs to Watch in 2014"" University of Illinois
Steven Bellovin "Senate cybersecurity report finds agencies often fail to take basic preventive measures" Columbia University
Alessandro Acquisti "Privacy? What privacy?" Carnegie Mellon University Heinz College
Jonathan Butts  Air Force Researchers Plant Rootkit In A PLC" U.S. Air Force Institute of Technology
Jean Camp "New U.S. transparency rule: real change or a gag?" Indiana University

 
January 2014

Anup Ghosh  "For Target, the Breach Numbers Grow" George Mason University
Deanna Caputo, Eric Johnson, Shari Lawrence Pfleeger "Why Training Doesn't Mitigate Phishing" MITRE, I3P-Dartmouth, Vanderbilt University
Alessandro Acquisti "Privacy and technology: How simple photos are leading to full profiles of ordinary people"
"Academics Call for End to Mass Surveillance"
Carnegie Mellon University Heinz College
Deirdre Mulligan "Are Google, Yahoo and Microsoft Living Up to Their Promises in China?" UC Berkeley
Mauricio Papa "Consultant: Despite Hacks, Info Leaks, Americans Still Lax On Digital Security" University of Tulsa

 
December 2013

Deirdre Mulligan Privacy Laws Can Create Opportunities, Limitations, California Lawmakers Advised UC Berkeley

 
November 2013

Alessandro Acquisti My Identity Was Stolen. Here's How They Did It
Carnegie Mellon Researchers Investigate How Information Shared Via Online Social Networks Can Lead to Hiring Discrimination
Carnegie Mellon University Heinz College

 
October 2013

Jean Camp Informatics professor highlights effects of NSA surveillance on students
IU to help Army protect against cyber attacks
Indiana University

 
September 2013

Sean Smith Dartmouth IT Security Institute Gets New Leadership Dartmouth
Alessandro Acquisti Facebook Plans to Add Millions More Faces to Its Facial Recognition Database Carnegie Mellon University Heinz  College

 
June 2013

Deirdre Mulligan NSA Surveillance Reflects a Broader Interpretation of the Patriot Act UC Berkeley

 
May 2013

Anup Ghosh "Pentagon accuses China of cyberattacks on U.S military, business targets" George Mason University
Brian Tierney "Reservoir Labs & Tilera Unveil A New Generation In Cyber Security" Lawrence Berkeley National Laboratory
Alessandro Acquisti "Drones With Facial Recognition Technology Will End Anonymity, Everywhere"
"60 MINUTES: Facial recognition technology outpaces regulation"
Carnegie Mellon University
Rahul Telang "Putting a Price Tag on Film Piracy" Carnegie Mellon University
M. Eric Johnson "Espionage and sabotage in the virtual world" Dartmouth


March 2013

Apu Kapadia Two IU computer scientists earn NSF CAREER Awards for young investigators Indiana University

 
February 2013

Sujeet Shenoi "Welcome to the Malware-Industrial Complex" University of Tulsa
Dickie George "Banks seek NSA help amid attacks on their computer systems" Johns Hopkins University
Alessandro Acquisti "Freedom Isn't Free"
"Coming soon? Take photo, ID person"
Carnegie Mellon University
L. Jean Camp "Spinning door for students in IU's security informatics program powered by jobs, jobs, jobs" Indiana University
Apu Kapadia "PlaceRaider: Virtual Theft in Physical Spaces with Smartphones" Indiana University
Seymour Goodman "Tale of 'Bob': Does outsourcing new software pose cyber security risk?" Georgia Tech
Kevin Fu "Preparing for for new healthcare malware attacks" I3P Senior Research Associate
Sal Stolfo "Cisco VoIP Phones Affected By On Hook Security Vulnerability" Former I3P Researcher

December 2012

Denise Anthony Privacy worries go far beyond e-mails Dartmouth College

November 2012

Sujeet Shenoi  Cyber Corps program trains spies for the digital age  University of Tulsa
Dickie George
Sujeet Shenoi
Federal agencies, private firms fiercely compete in hiring cyber experts Johns Hopkins University
University of Tulsa
Alessandro Acquisti A Trail of Clicks, Culminating in Conflict Carnegie Mellon University
Peter G. Neumann Killing the Computer to Save It SRI International

October 2012

Rahul Telang IFPI - International Federation of the Phonographi : Overall impact of unlicensed p2p file-sharing is negative Carnegie Mellon University
Alessandro Acquisti Skeptics scoff, privacy advocates protest as biometric IDs advance Carnegie Mellon University
Travis Breaux 'Reconciling Multi-jurisdictional Legal Requirements: A Case Study in Requirements Water Marking' Wins Best Paper Award Carnegie Mellon University
M. Eric Johnson Facebook Tests 'Want' and 'Collect' Buttons: How to Get Started Dartmouth College
Denise Anthony Professor examines privacy violations Dartmouth College
Zach Tudor FIIW Keynote: What You Can't Measure, You Can't Improve . . . The Current State of Cyber Security SRI International
Brian Tierney At 100 Gbps, ESnet Puts Network Research on Fast Track Lawrence Berkeley National Lab
James Alves-Foss October 25th Cybersecurity Workshop University of Idaho
Deanna Caputo The Human Factor: Using Behavioral Science to Counter Insider Threats MITRE Corporation
Sujeet Shenoi 25 of today's coolest network and computing research projects University of Tulsa
Sujeet Shenoi The NSA Wants Hackers, And It Wants Them On Its Side University of Tulsa
Kevin Fu   Highly Contagious Malware Could Cause 'Mass Murder' By Hacking Pacemakers To Send A Deadly Jolt University of Massachusetts, Amherst
Rae Zimmerman "Book Talk by Professor Rae Zimmerman - Transport, the Environment and Security. Making the Connection." New York University

June 2012

Rahul Telang Dear [Insert Company Name], Personalized Emails Don't Impress Customers Carnegie Mellon University
Rahul Telang "File sharing is no different from Jimmy Carr's clever accounting Carnegie Mellon University
Alessandro Acquisti A Dollar For Your Data Carnegie Mellon University
Alessandro Acquisti What's next after Facebook buys facial rec software? Carnegie Mellon University
Johannes Gehrke IEEE to Award 14 Industry Professionals Cornell University
Anup Ghosh US military locks down on soldiers' smartphones George Mason University
Seymour Goodman Cyberpower And International Security - Analysis Georgia Institute of Technology
James Alves-Foss IGEM boosts UI cybersecurity program University of Idaho
Dickie George Exclusive: Spy agency seeks cyber-ops curriculum Johns Hopkins University
Helen Nissenbaum Google Privacy Inquiries Get Little Cooperation New York University
Kevin Fu Infections At Medical Device Firm Lasted For Months University of Massachusetts, Amherst
Kevin Fu Downloading of software updates for lifesaving medical devices proves very dangerous University of Massachusetts, Amherst

March 2012

Robert Hutchinson Congressional Hearing: "Cybersecurity: Threats to Communications Networks and Public-Sector Responses Sandia National Laboratories
Greg Shannon Congressional Hearing: "Cybersecurity: Threats to Communications Networks and Public-Sector Responses Carnegie Mellon University
Roy Maxion Bypassing the Password Carnegie Mellon University
Rae Zimmerman Coastal cities face higher risk of flooding New York University

February 2012

Alessandro Acquisti Real-time face recognition comes to your iPhone camera Carnegie Mellon University
Alessandro Acquisti Privacy in the Age of Big Data Carnegie Mellon University
M. Eric Johnson Facebook IPO will not affect users Dartmouth College
M. Eric Johnson Small business owners find gold in daily deal websites, but at a cost Dartmouth College
M. Eric Johnson Social media: Information networks are vital to success Dartmouth College
Kevin Fu The hack-able body University of Massachusetts, Amherst
Mustaque Ahamad Georgia Tech spinoff secures funding for phone security technology Georgia Institute of Technology

January 2012

Yacov Haimes Chemical cybernetics' and the problem of climate change University of Virginia
Alessandro Acquisti Visibility before all Carnegie Mellon University
Alessandro Acquisti Facial recognition technology creates privacy headaches for agencies Carnegie Mellon University
Mustaque Ahamad Cyber threats in 2012: 5 pain points Georgia Institute of Technology
Mustaque Ahamad More web users aim to thwart prying eyes Georgia Institute of Technology
Sean Smith Usenix: Dartmouth Expanding Diff, Grep Unix Tools Dartmouth College

 December 2011

Raymond Parks Principles of Cyber-warfare Sandia National Laboratories
David Duggan Principles of Cyber-warfare Sandia National Laboratories
M. Eric Johnson Tuck MBAs select top tech toys for the holiday season Dartmouth College
M. Eric Johnson Tuck students compile list of season’s top toys Dartmouth College
Bruce Bakis So, What Are These Privacy Audits That Google And Facebook Have To Do For The Next 20 Years? MITRE Corporation
Rahul Telang Delaying content leaves money on the table Carnegie Mellon University
Rahul Telang Yet Another Study Shows That Hollywood's Own Bad Decisions Are Increasing The Amount Of Infringement Carnegie Mellon University
Alessandro Acquisti Hacking at Hotels: Mutating Threats at the Ramparts Carnegie Mellon University
Salvatore Stolfo Printer Vulnerability Puts HP Behind the Eight Ball Columbia University
Salvatore Stolfo Print Me if you Dare,' Columbia University Intrusion Detection Systems Lab  Columbia University

 For more stories, visit the archive.

 
 

Last Updated: 10/14/14