<
查看: 8950| 回复: 7
收起左侧

Computer/Network Security Prof List

edwardgtxy | 显示全部楼层
本楼:   👍  0
0%
0%
0   👎
全局:   612
99%
1%
8

注册一亩三分地论坛,查看更多干货!

您需要 登录 才可以下载或查看附件。没有帐号?注册账号

x
本帖最后由 edwardgtxy 于 2010-8-17 03:22 编辑

先挖个坑吧,最近在整理一份list,用来了解下圈内有啥人,顺便为将来申请做准备。入选的prof都是主攻security或有这方面大项目的教授们,而不是偶尔去security打打酱油的那些。如果偶有遗漏了啥,或者别的童鞋对某个教授有内部消息的话,欢迎补充。

HC-专攻security的教授.
Busy-大牛,但现在当官了,或者在搞别的玩意


. Χ
CMU
好多教授居然都不在faculty list里。。只有通过cylab站点才能找到,十分诡异。。
. 1point3acres
Lorrie Faith Cranor (HC)
http://lorrie.cranor.org/
Privacy, usable privacy andsecurity software, computers and society, technology policy, voting

Greg Ganger
http://www.ece.cmu.edu/~ganger/
Operating systems, security,storage/file systems, networking, and distributed systems.google  и

Peter Lee (busy)
http://www-2.cs.cmu.edu/~petel/.1point3acres
Programming languages,compilers, proof-carrying code, educational technology, network security,operating systems
. 1point3acres.com
Frank Pfenning
http://www.cs.cmu.edu/~fp/
Programming languages, logic,type theory, automated deduction, security

Jeannette M. Wing (HC)
http://www-2.cs.cmu.edu/~wing/. 1point3acres.com
Trustworthy computing, security, privacy, formal methods,distributed and concurrent systems, programming languages, softwareengineering.

Bruce MacDowell Maggs (AJ)
http://www.cs.cmu.edu/~bmm/. 1point 3 acres
Adjunct Professor, Computer Science Department, CarnegieMellon
Professor, Department of Computer Science, Duke University
Vice President, Research Akamai Technologies

Hui Zhang (busy)
http://www-2.cs.cmu.edu/~hzhang/

ADRIAN PERRIG
http://www.ece.cmu.edu/~adrian/.

David Brumley (HC)
http://www.ece.cmu.edu/~dbrumley/index.html.
bug finding, program analysis, etc

http://www.cylab.cmu.edu/research/projects/current/index.html


Berkeley

Anthony D. Joseph (missing???)
http://bnrg.cs.berkeley.edu/~adj/
OperatingSystems & Networking (OSNT)
Security(SEC)
Computer and Network Security; Distributed systems; Mobilecomputing; Wireless networking; Software engineering, and operating systems.--

Vern Paxson (HC)
http://www.icir.org/vern/
botnet master ;p

Dawn Song (HC)
http://www.cs.berkeley.edu/~dawnsong/
Computer security, privacy, and applied cryptography,including security and privacy issues in systems, software, networking, anddatabases. Analysis of and defense against malicious code. Using programanalysis, algorithms design, and machine learning for security and privacy.

Doug Tygar (busy)
http://www.cs.berkeley.edu/~tygar/
Privacy, computer security, electronic commerce .--

David Wagner (HC)
http://www.cs.berkeley.edu/~daw/
Computer security, especially security of large-scalesystems and networks. Applications of static and dynamic program analysis tocomputer security. I am currently working on software security, electronic voting, and other topics.


MIT
http://www.eecs.mit.edu/sup-faculty.html

Srini Devadas (HC?)
http://people.csail.mit.edu/devadas/
Computer-aided design. Computer security. Computerarchitecture.

Ronald L. Rivest (HC). 1point 3acres
http://people.csail.mit.edu/rivest/
Cryptography. Computer/network security. Algorithms. Votingtechnology. . 1point 3 acres
check out his last name!

Nickolai Zeldovich (HC)
http://people.csail.mit.edu/nickolai/
Building practical secure systems. Operating systems,hardware design, networking, and distributing systems. Programming languagesand tools, security analysis and verification.. 1point3acres.com



Stanford
.1point3acres
http://cs.stanford.edu/research/faculty
http://forum.stanford.edu/research/profiles.php

Dan Boneh (HC).
http://crypto.stanford.edu/~dabo/
applied cryptography, network security

Dawson Engle (HC). 1point 3acres
http://www.stanford.edu/~engler/. From 1point 3acres bbs
Source code analysis; software quality and security

Monica S. Lam (missing??)
http://suif.stanford.edu/~lam/
compilers, program analysis, operating systems, security,computer architecture, high-performance computing

John C. Mitchell (HC)
http://theory.stanford.edu/people/jcm/ ..
computer security: access control, network protocols,privacy, software systems, web security.


Cornell

JOSEPH Y. HALPERN
http://www.cs.cornell.edu/home/halpern/
distributed computing, AI, security, and game theory

Andrew Myers (HC?)
http://www.cs.cornell.edu/andru/
It is too hard to build trustworthy software systems usingconventional systems APIs. I work on higher-level, language-based abstractionsfor programming that better address important cross-cutting concerns: security,extensibility, persistence, distribution..

Rafael Pass
http://www.cs.cornell.edu/~rafael/.--
Cryptography and its interplay with Computational Complexityand Game Theory.
. 1point3acres

Fred B. Schneider (HC??)
http://www.cs.cornell.edu/fbs/index.htm
My research is intended to support the construction ofconcurrent and distributed systems for high-integrity and mission-criticalsettings. Fault-tolerance and security are critical in such settings.



UIUC.google  и

Nikita Borisov (HC)
http://www.hatswitch.org/~nikita/
computer security and privacy, especially as applied tolarge-scale distributed systems

Carl Gunter
http://cs.illinois.edu/people/faculty/carl-gunter
programming languages, formal analysis of networks andsecurity, and privacy
. 1point 3 acres
Sam King (HC)
http://www.cs.uiuc.edu/homes/kingst/Home.html
security, OS, virtual machines

Roy H. Campbell
http://www.iti.illinois.edu/people/researchers/roy-h-campbell
engineering and construction techniques of complex systemsoftware



. 1point 3acres
University of Washington ..

David Wetherall
http://djw.cs.washington.edu/index.htm
Networks, wireless, ubiquitous computing, security.
.
Steven D. Gribble (HC)-baidu 1point3acres
http://www.cs.washington.edu/homes/gribble/index.html
Operating systems, distributed systems, scalable systems,browser architecture, system security. 1point 3 acres

Tadayoshi Kohno (Yoshi Kohno) (HC)
http://www.cs.washington.edu/homes/yoshi/
Computer security and privacy
. ----
Henry M. Levy (HC)
http://www.cs.washington.edu/homes/levy/
Operating systems, architecture, security, internetmeasurement.1point3acres


Princeton

Andrew W. Appel (HC).
http://www.cs.princeton.edu/~appel/
computer security, compilers, programming languagesemantics, machine-checked proofs, and election technology

Edward W.Felten (HC)
http://www.cs.princeton.edu/~felten/
computer security and privacy, and public policy issuesrelating to information technology. 1point3acres

Michael J. Freedman
http://www.cs.princeton.edu/~mfreed/
distributed systems, security, and networking

. check 1point3acres for more.


U Texas. ----

Yin Zhang (HC)
http://userweb.cs.utexas.edu/users/yzhang/
networkmanagement, networkmeasurement, networksecurity, wirelessoptimization, overlayrouting and multihoming, and datastream computation

Fred Chang (??)
http://userweb.cs.utexas.edu/~chang/
He is the former Director of Research at the NationalSecurity Agency.

Mike Dahlin (HC)
http://userweb.cs.utexas.edu/users/dahlin/
Internet- and large-scale services, fault tolerance,security, operating systems, distributed systems, and file systems.
. .и
Mohamed G. Gouda (HC)
http://userweb.cs.utexas.edu/users/gouda/
Programming Methodology, Concurrent and DistributedComputing, Fault-tolerant Computing, Secure Computing, Network Protocols,Sensor Networks, Formal Methods.
. 1point3acres
Simon S. Lam
http://userweb.cs.utexas.edu/users/lam/
. 1point 3acres
Vitaly Shmatikov (HC)
http://userweb.cs.utexas.edu/users/shmat/
computer security and privacy, formal methods for analysisof secure systems and network protocols

Michael Walfish (HC?)
http://userweb.cs.utexas.edu/users/mwalfish/

Brent Waters (HC)
http://userweb.cs.utexas.edu/users/bwaters/
cryptography and network security

评分

参与人数 3大米 +153 收起 理由
dotweiba + 3 感谢分享!
zach + 100
剑痴 + 50

查看全部评分


上一篇:请教各位大牛选校应该注意那几点的因素啊?
下一篇:请教 warald 和 各位 牛 关于 制作个人主页
Warald 2010-8-14 03:27:10 | 显示全部楼层
本楼:   👍  0
0%
0%
0   👎
全局:   19377
93%
7%
1546
给edward鼓掌~~

建议先迅速占几层楼,以后可以慢慢更新
回复

使用道具 举报

zach 2010-8-14 23:10:08 | 显示全部楼层
本楼:   👍  0
0%
0%
0   👎
全局:   2399
91%
9%
238
加精吧
回复

使用道具 举报

 楼主| edwardgtxy 2010-8-14 23:19:09 | 显示全部楼层
本楼:   👍  0
0%
0%
0   👎
全局:   612
99%
1%
8
mit的security是咋回事,怎么没人呢。。
回复

使用道具 举报

ciz 2010-10-1 07:57:18 | 显示全部楼层
本楼:   👍  0
0%
0%
0   👎
全局:   34
100%
0%
0
本帖最后由 ciz 于 2010-10-1 10:05 编辑

贴个水校的

Columbia.google  и

Steve Bellovin http://www.cs.columbia.edu/~smb/ 我啥也不说
Junfeng Yang http://www.cs.columbia.edu/~junfeng/ Reliable System, Stanford Dawson Engler 的学生
Angelos Keromytis http://www.cs.columbia.edu/~angelos/ Computer Security, Cryptography, Networking
Tal Malkin http://www.cs.columbia.edu/~tal/ Computer Security, Complexity Theory, Cryptography
Sal Stolfo http://www.cs.columbia.edu/~sal/ IDS

评分

参与人数 1大米 +30 收起 理由
Warald + 30

查看全部评分

回复

使用道具 举报

Warald 2010-10-1 12:46:42 | 显示全部楼层
本楼:   👍  0
0%
0%
0   👎
全局:   19377
93%
7%
1546
本帖最后由 Warald 于 2010-10-1 12:48 编辑 . ----
贴个水校的
.--
Columbia

Steve Bellovin http://www.cs.columbia.edu/~smb/ 我啥也不说
Junfeng Yang http://www.cs.columbia.edu/~junfeng/ Reliable System, Stanford Dawson Engler 的学生
Angelos Keromyti ...
ciz 发表于 2010-10-1 07:57
.google  и

Stolfo早些年还做dm,这两年好像彻底转成网络安全了吧
记得bellovin爷爷组里好多小妞的照片
回复

使用道具 举报

ciz 2010-10-1 13:09:23 | 显示全部楼层
本楼:   👍  0
0%
0%
0   👎
全局:   34
100%
0%
0
6# Warald
Bellovin 老爷爷组里有各国妞…… 还有中国的呢 = =

Stolfo 现在领着一个 IDS 实验室,看上去没有安全之外的东西。至于 IDS 跟 DM 有没有啥内部关系我就小白了。Stolfo 是我来这里认识的第一个三哥的最爱 = =

另外,这所水校 CS MS 如果要跟教授做 Project 的话,还是比较容易的。系哩鼓励做 Project,而且是落到实际行动的,比如 10Fall 刚刚开学的时候有个 Research Fair,让手上有项目的老师去 Show show,MS/UG 们去看看。更何况还有 Junfeng Yang 这种在主页上直接写需要 Project Students 的老师。
回复

使用道具 举报

imwmwm 2010-10-1 14:23:46 | 显示全部楼层
本楼:   👍  0
0%
0%
0   👎
全局:   15
100%
0%
0
7# ciz
啊~ 我想做Project
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 注册账号
隐私提醒:
  • ☑ 禁止发布广告,拉群,贴个人联系方式:找人请去🔗同学同事飞友,拉群请去🔗拉群结伴,广告请去🔗跳蚤市场,和 🔗租房广告|找室友
  • ☑ 论坛内容在发帖 30 分钟内可以编辑,过后则不能删帖。为防止被骚扰甚至人肉,不要公开留微信等联系方式,如有需求请以论坛私信方式发送。
  • ☑ 干货版块可免费使用 🔗超级匿名:面经(美国面经、中国面经、数科面经、PM面经),抖包袱(美国、中国)和录取汇报、定位选校版
  • ☑ 查阅全站 🔗各种匿名方法

本版积分规则

Advertisement
>
快速回复 返回顶部 返回列表