Skip to content

Commit 3b95972

Browse files
authored
Merge pull request #142 from secure-systems-lab/jhdalek55-patch-1
Changing Preston stuff
2 parents ab20781 + ea59161 commit 3b95972

File tree

1 file changed

+34
-9
lines changed

1 file changed

+34
-9
lines changed

_data/data.yml

Lines changed: 34 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -310,17 +310,18 @@ people:
310310
name: "Preston Kent Moore"
311311
anchor: preston_moore
312312
internal: true
313-
role: "Ph.D. 2022 (co-advised with Phyllis Frankl)"
313+
role: "Ph.D. 2022 (co-advised with Phyllis Frankl), now a Senior Software Engineer at Anaconda"
314314
since: "2015"
315-
photo: "img/people/preston_moore.jpg"
315+
photo: "img/people/preston_moore2.jpg"
316316
interests: "Secure software engineering, automated testing, systems security"
317317
publications:
318-
- name: "ISSRE 2019"
319-
link: "http://ssl.engineering.nyu.edu/papers/moore_crashsim_issre2019.pdf"
318+
320319
- name: "ICSOFT 2022"
321-
link: ""
320+
link: "http://ssl.engineering.nyu.edu/papers/port_icsoft_2022.pdf"
322321
- name: "CCSCNE 2022"
323-
link: ""
322+
link: "http://ssl.engineering.nyu.edu/papers/shuffle_ccsne_2022.pdf"
323+
- name: "ISSRE 2019"
324+
link: "http://ssl.engineering.nyu.edu/papers/moore_crashsim_issre2019.pdf"
324325
- &dan_gopstein
325326
name: "Dan Gopstein"
326327
anchor: dan_gopstein
@@ -847,7 +848,6 @@ projects:
847848
- *santiago_torres
848849
- *lukas_puhringer
849850
- *aditya_sirish
850-
- *ashish_das
851851
- *yuanrui_chen
852852
- *isha_dave
853853
- *kristel_fung
@@ -945,12 +945,12 @@ projects:
945945
products: "We are in stealth mode! If you want to be contacted when we
946946
publicly release, please send an email to <a href=\"mailto:[email protected]\">[email protected]</a>."
947947
people:
948-
- *yiwen_li
949948
- *nick_renner
950949
- *jonathan_singer
951950
- *kaitlyn_liu
952951
- *caglar_dogan
953952
- *devansh_patel
953+
- *yiwen_li
954954
- *justin_cappos
955955
- name: "Brendan Dolan-Gavitt"
956956
link: "http://engineering.nyu.edu/people/brendan-dolan-gavitt"
@@ -1088,7 +1088,6 @@ projects:
10881088
tags:
10891089
- *software_engineering
10901090

1091-
10921091
- &netcheck
10931092
name: "NetCheck"
10941093
anchor: "netcheck"
@@ -1183,6 +1182,32 @@ publications:
11831182
### DO NOT FORGET TO ADD YOUR NEW TAG &XXXXXX TO THE ENTRIES AT THE BOTTOM ###
11841183
### IF YOU FORGET, YOUR ENTRIES WILL NOT SHOW UP ON THE SITE! ###
11851184

1185+
- &moore_port_icsoft_2022
1186+
anchor: moore_port_icsoft_2022
1187+
title: "Needles in a Haystack: Using PORT to Catch Bad Behaviors within Application Recordings"
1188+
authors:
1189+
- name: "P. Moore, T. Wies, M. Waldman, P. Frankl, J. Cappos"
1190+
project: *crashsimulator
1191+
booktitle: "2022 International Conference on Software Technologies (ICSOFT 2022)"
1192+
year: ""
1193+
pages: ""
1194+
publisher: ""
1195+
link: "/papers/moore_port_icsoft_2022.pdf"
1196+
abstract: "Earlier work has proven that information extracted from recordings of an application’s activity can be tremendously valuable. However, given the many requests that pass between applications and external entities, it has been difficult to isolate the handful of patterns that indicate the potential for failure. In this paper, we propose a method that harnesses proven event processing techniques to find those problematic patterns. The key addi- tion is PORT, a new domain specific language which, when combined with its event stream recognition and transformation engine, enables users to extract patterns in system call recordings and other streams, and then rewrite input activity on the fly. The former task can spot activity that indicates a bug, while the latter produces a modified stream for use in more active testing. We evaluated PORT’s capabilities in several ways, starting with recreating the mutators and checkers utilized by an earlier work called SEA to modify and replay the results of system calls. Our re-implementations achieved the same efficacy using fewer lines of code. We also illustrated PORT’s extensibility by adding support for detecting malicious USB commands within recorded traffic."
1197+
1198+
- &moore_shuffle_ccsne_2022
1199+
anchor: moore_shuffle_ccsne_2022
1200+
title: "Cybersecurity Shuffle: Using Card Magic to Teach Introductory Cybersecurity Topics"
1201+
authors:
1202+
- name: "P. Moore, J. Cappos"
1203+
project: *crashsimulator
1204+
booktitle: "2022 Consortium for Computer Science Education Northeast (CCSNE 2022)"
1205+
year: ""
1206+
pages: ""
1207+
publisher: ""
1208+
link: "/papers/moore_shuffle_ccsne_2022.pdf"
1209+
abstract: "One of the main challenges in designing lessons for an introductory information security class is how to present new technical concepts in a manner comprehensible to students with widely different backgrounds. A non-traditional approach can help students engage with the material and master these unfamiliar ideas. We have devised a series of lessons that teach important information security topics, such as social engineering, side-channel attacks, and attacks on randomness using card magic. Each lesson centers around a card trick that allows the instructor to simulate the described attack in a way that makes sense, even for those who have no prior technical background. In this paper, we describe our experience using these lessons to teach cybersecurity topics to high school students with limited computer science knowledge. Students were assessed be- fore and after the demonstration to gauge their mastery of the material, and, while we had a very limited set of responses, the results show an improvement on post-test scores. Furthermore, several indicators affirm the students enjoyed the lessons and remained engaged throughout the session."
1210+
11861211
- &gopstein_thinking_fse20
11871212
anchor: gopstein_thinking_fse20
11881213
title: "Thinking Aloud About Confusing Code: A Qualitative Investigation of Program Comprehension and Atoms of Confusion"

0 commit comments

Comments
 (0)