How can we automatically and reliably identify vulnerabilities within large code bases and complex protocols?
Ivan Pustogarov
- Assistant Professor
- Concordia Institute for Information Systems Engineering
- information systems security12
- cryptographic protocols6
- privacy10
- P2P networks
- wireless mesh networking
- blockchain2
- cryptocurrency4
- FinTech3
- detection of vulnerabilities3
- cybersecurity16
- cryptography5
- anti-surveillance tools2
- deanonymization
- anonymity modeling
- intra-flow interference
- data security7
- embedded systems8
- network security12
- coding theory
-
Jeremy Clark
cryptography, blockchain, cryptocurrency
-
Mohammad Mannan
anti-surveillance tools, web authentication, trusted computing
-
Lingyu Wang
network security, privacy, security metrics
-
Ayda Basyouni
software quality and best practices, information systems security, networks
-
Suryadipta Majumdar
cybersecurity, information systems security, data security
-
Amr Youssef
cryptography, cyberphysical systems, cryptographic algorithms
-
Mourad Debbabi
information systems security, cyberphysical systems, smart grids
-
Carol Fung
network management, cybersecurity, network security
-
Chadi Assi
wireless networks, network design, network optimization
-
J. William Atwood
autonomic networking, multicast, communication protocols
-
Martin A. French
risk, surveillance, privacy
-
Anjali Agarwal
cloud networks, wireless networks, cognitive radio networks
-
Serguei A. Mokhov
Forensic Lucid, formal methods, software engineering