My Students
These are my students; I’m very proud of them!
Current Students
These students are currently working with me. They are both Masters’ and Ph.D. students. Some students who start out in the Ph.D. program change goals as their interests change, and decide to leave with a Master’s. Others start out in the Master’s program, and decide they want to get a Ph.D. And whether the students are in the Master’s program or the Ph.D. program, they are all doing interesting, important work.
- Somdutta Bose, working towards a Ph.D.
- Shiven Mian, working towards an M.S.
- Brian Perry, working towards a Ph.D.
- Thomas Provan, working towards a Ph.D.
- Muwei Zheng, working towards a Ph.D.
- Minghua Zhu, working towards a Ph.D.
Past Students
These students all completed master’s projects, master’s theses, or doctoral dissertations under my supervision.- Ibrahim Ahmad, M.S. (2018)
THESIS TITLE: A Method for Packet Correlation to Improve Snort Rules - Julie Ard, M.S. (2012)
THESIS TITLE: Internet Protocol version Six (IPv6) at UC Davis: Traffic Analysis with a Security Perspective - Arthur Arlt, M.S., University of Heidelberg (2014); second supervisor; chair Prof. Michael Gertz, Universität Heidelberg
THESIS TITLE: Determining Rates of False Positives and Negatives in Fast Flux Botnet Detection - Bhume Bhumiratana, Ph.D. (2009)
THESIS TITLE: Privacy Aware Micro Data Sanitization - S. Terry Brugger, Ph.D. (2009)
THESIS TITLE: The Quantitative Comparison of Computer Networks - Adam Carlson, M.S. (2006)
THESIS TITLE: The Unifying Policy Hierarchy Model - Daniel Chung, M.S. (2015)
THESIS TITLE: Distributed Helios—Defending Online Voting - Lisa Clark, M.S. (2007)
THESIS TITLE: Sanitizing Data to Prevent Disclosing Exact Network Topology - Michael Clifford, Ph.D. (2012)
THESIS TITLE: The Solar Trust Model, Identity, and Anonymity - Daniel Chung, M.S. (2015)
THESIS TITLE: Distributed Helios — Defending Online Voting - Joel Dodson, M.S. (1996)
THESIS TITLE: Specification and Classification of Generic Security Flaws for the Tester’s Assistant Library - Sophie Engle, Ph.D. (2010)
THESIS TITLE: A Policy-Based Vulnerability Analysis Framework - George Fink, Ph.D. (1996)
THESIS TITLE: Discovering Security and Safety Flaws using Property-Based Testing - Nina Gholami, M.S. (2008)
THESIS TITLE: Detecting the TOCTOU Vulnerability: A Hybrid Approach - Andrew Gross, UC San Diego (1997); co-advised with Prof. Réné Cruz, UCSD
THESIS TITLE: Analyzing Computer Intrusions - Eric Haugh, M.S. (2002)
THESIS TITLE: Testing C Programs for Buffer Overflow Vulnerabilities - Sophia Hannah, M.S. (2015)
PROJECT TITLE: Analyzing the Attack Surface of Smart Home Control Systems Apps - Damien Howard, M.S. (2007)
THESIS TITLE: Developing an Attack Tool Database - John Hughes, M.S. (2000)
THESIS TITLE: Conservation of Flow as a Security Mechanism in Network Protocols - Navpreet Kaur, M.S. (2019)
PROJECT TITLE: Effectiveness of Anti-Phishing Extensions - Aaron Kaloti, M.S. (2020)
PROJECT TITLE: Effects of Anonymization on Zeke Packet Analysis - Vincent Law, M.S. (2003)
THESIS TITLE: Vulnerability Database Integration with Intrusion Detection Systems - Patrick LeBlanc, M.S. (2002)
THESIS TITLE: A Property-Based Static Code Analysis - George Lin, M.S. (1995)
THESIS TITLE: Counting Cleartext Passwords - Guillermo Marro, M.S. (2003)
THESIS TITLE: Attacks at the Data Link Layer - Peter Mell, M.S. (1998)
THESIS TITLE: Automatic Policy Satisfaction and Verification for Intranet Wide Defense Systems Using Signature Based Intrusion Detection and Response Systems - Robert Morning, M.S. (2016)
PROJECT TITLE: Pseudo Random Passphrase Generator - B.J. Orvis, M.S. (2009)
THESIS TITLE: A Method for Automatically Generating Rules for a Requires-Provides Security Model of a System - Dixit Paudel, M.S. (2018)
PROJECT TITLE: Re-defining the Insider Threat - David Peterson, M.S. (2002)
THESIS TITLE: A Flexible Containment Mechanism for Executing Untrusted Code - Sean Peisert, Ph.D., UC San Diego (2007); unofficial co-advisor; chair, Prof. Sid Karin, UC San Diego
THESIS TITLE: A Model of Forensic Analysis Using Goal-Oriented Logging - Elliot Proebstel, M.S. (2008)
THESIS TITLE: Characterizing and Improving Distributed Network-based Intrusion Detection Systems (NIDS): Timestamp Synchronization and Sampled Traffic - Tom Ristenpart, M.S. (2005)
THESIS TITLE: Time Stamp Synchronization of Distributed Sensor Logs: Impossibility Results and Approximation Algorithms - Deanna Rogers, M.S. (2004)
THESIS TITLE: Host-level Deception as a Defense against Insiders - Anhad Singh, Ph.D. (2015); co-advised with Prof. Sean Peisert, UC Davis
THESIS TITLE: An Iterative Approach to Examining the Effectiveness of Data Sanitization - Tom Walcott, Ph.D. (2004)
THESIS TITLE: Malfeasance: A Model to Describe Traducement, Libel, Heresy, And Other Traditional Security Policies - Sean Whalen, Ph.D. (2010)
THESIS TITLE: Security Applications of the ε-Machine - Patrick Wheeler, M.S. (2006)
THESIS TITLE: Techniques for Improving the Performance of Signature-Based Network Intrusion Detection Systems - Bolun Zhao, M.S. (2014)
THESIS TITLE: Formalization of Requirements for Online Healthcare Groups - Jingmin Zhou, Ph.D. (2008)
THESIS TITLE: Alert Reduction for Network Intrusion Detection