本文转自Warald博文,作者:Warald (iamxiaoning@gmail.com http://iamxiaoning1980.spaces.live.com)
近年来留学美国申请计算机专业网络安全方向的学生逐年增加,本文主要为学生们整理了一份网络安全圈中的prof的list,方便学生了解一下圈内都有啥人。入选的prof都是主攻security或有这方面大项目的教授们,而不是偶尔去security打打酱油的那些。如果有遗漏了啥,或者别的同学对某个教授有内部消息的话,欢迎补充。
HC-专攻security的教授
Busy-大牛,但现在当官了,或者在搞别的玩意。
CMU卡内基梅陇大学
好多教授居然都不在faculty list里。只有通过cylab站点才能找到,十分诡异。
Lorrie Faith Cranor (HC)
Privacy, usable privacy andsecurity software, computers and society, technology policy, voting
Greg Ganger
http://www.ece.cmu.edu/~ganger/
Operating systems, security,storage/file systems, networking, and distributed systems
Peter Lee (busy)
http://www-2.cs.cmu.edu/~petel/
Programming languages,compilers, proof-carrying code, educational technology, network security,operating systems
Frank Pfenning
Programming languages, logic,type theory, automated deduction, security
Jeannette M. Wing (HC)
http://www-2.cs.cmu.edu/~wing/
Trustworthy computing, security, privacy, formal methods,distributed and concurrent systems, programming languages, softwareengineering.
Bruce MacDowell Maggs (AJ)
Adjunct Professor, Computer Science Department, CarnegieMellon
Professor, Department of Computer Science, Duke University
Vice President, Research Akamai Technologies
Hui Zhang (busy)
http://www-2.cs.cmu.edu/~hzhang/
ADRIAN PERRIG
http://www.ece.cmu.edu/~adrian/
David Brumley (HC)
http://www.ece.cmu.edu/~dbrumley/index.html
bug finding, program analysis, etc
http://www.cylab.cmu.edu/research/projects/current/index.html
Berkeley加州伯克利分校
Anthony D. Joseph (missing?)
http://bnrg.cs.berkeley.edu/~adj/
OperatingSystems Networking (OSNT)
Security(SEC)
Computer and Network Security; Distributed systems; Mobilecomputing; Wireless networking; Software engineering, and operating systems
Vern Paxson (HC)
botnet master ;p
Dawn Song (HC)
http://www.cs.berkeley.edu/~dawnsong/
Computer security, privacy, and applied cryptography,including security and privacy issues in systems, software, networking, anddatabases. Analysis of and defense against malicious code. Using programanalysis, algorithms design, and machine learning for security and privacy.
Doug Tygar (busy)
http://www.cs.berkeley.edu/~tygar/
Privacy, computer security, electronic commerce
David Wagner (HC)
http://www.cs.berkeley.edu/~daw/
Computer security, especially security of large-scalesystems and networks. Applications of static and dynamic program analysis tocomputer security. I am currently working on software security, electronic voting, and other topics.
MIT麻省理工大学
http://www.eecs.mit.edu/sup-faculty.html
Srini Devadas (HC?)
http://people.csail.mit.edu/devadas/
Computer-aided design. Computer security. Computerarchitecture.
Ronald L. Rivest (HC)
http://people.csail.mit.edu/rivest/
Cryptography. Computer/network security. Algorithms. Votingtechnology.
check out his last name!
Nickolai Zeldovich (HC)
http://people.csail.mit.edu/nickolai/
Building practical secure systems. Operating systems,hardware design, networking, and distributing systems. Programming languagesand tools, security analysis and verification.
Stanford斯坦福大学
http://cs.stanford.edu/research/faculty
http://forum.stanford.edu/research/profiles.php
Dan Boneh (HC)
http://crypto.stanford.edu/~dabo/
applied cryptography, network security
Dawson Engle (HC)
http://www.stanford.edu/~engler/
Source code analysis; software quality and security
Monica S. Lam (missing??)
http://suif.stanford.edu/~lam/
compilers, program analysis, operating systems, security,computer architecture, high-performance computing
John C. Mitchell (HC)
http://theory.stanford.edu/people/jcm/
computer security: access control, network protocols,privacy, software systems, web security
Cornell康奈尔大学
JOSEPH Y. HALPERN
http://www.cs.cornell.edu/home/halpern/
distributed computing, AI, security, and game theory
Andrew Myers (HC?)
http://www.cs.cornell.edu/andru/
It is too hard to build trustworthy software systems usingconventional systems APIs. I work on higher-level, language-based abstractionsfor programming that better address important cross-cutting concerns: security,extensibility, persistence, distribution.
Rafael Pass
http://www.cs.cornell.edu/~rafael/
Cryptography and its interplay with Computational Complexityand Game Theory.
Fred B. Schneider (HC??)
http://www.cs.cornell.edu/fbs/index.htm
My research is intended to support the construction ofconcurrent and distributed systems for high-integrity and mission-criticalsettings. Fault-tolerance and security are critical in such settings.
UIUC伊利诺伊香槟分校
Nikita Borisov (HC)
http://www.hatswitch.org/~nikita/
computer security and privacy, especially as applied tolarge-scale distributed systems
Carl Gunter
http://cs.illinois.edu/people/faculty/carl-gunter
programming languages, formal analysis of networks andsecurity, and privacy
Sam King (HC)
http://www.cs.uiuc.edu/homes/kingst/Home.html
security, OS, virtual machines
Roy H. Campbell
http://www.iti.illinois.edu/people/researchers/roy-h-campbell
engineering and construction techniques of complex systemsoftware
University of Washington华盛顿大学
David Wetherall
http://djw.cs.washington.edu/index.htm
Networks, wireless, ubiquitous computing, security
Steven D. Gribble (HC)
http://www.cs.washington.edu/homes/gribble/index.html
Operating systems, distributed systems, scalable systems,browser architecture, system security
Tadayoshi Kohno (Yoshi Kohno) (HC)
http://www.cs.washington.edu/homes/yoshi/
Computer security and privacy
Henry M. Levy (HC)
http://www.cs.washington.edu/homes/levy/
Operating systems, architecture, security, internetmeasurement
Princeton普林斯顿大学
Andrew W. Appel (HC)
http://www.cs.princeton.edu/~appel/
computer security, compilers, programming languagesemantics, machine-checked proofs, and election technology
Edward W.Felten (HC)
http://www.cs.princeton.edu/~felten/
computer security and privacy, and public policy issuesrelating to information technology
Michael J. Freedman
http://www.cs.princeton.edu/~mfreed/
distributed systems, security, and networking
U Texas德州大学
Yin Zhang (HC)
http://userweb.cs.utexas.edu/users/yzhang/
networkmanagement, networkmeasurement, networksecurity, wirelessoptimization, overlayrouting and multihoming, and datastream computation
Fred Chang (?)
http://userweb.cs.utexas.edu/~chang/
He is the former Director of Research at the NationalSecurity Agency.
Mike Dahlin (HC)
http://userweb.cs.utexas.edu/users/dahlin/
Internet- and large-scale services, fault tolerance,security, operating systems, distributed systems, and file systems.
Mohamed G. Gouda (HC)
http://userweb.cs.utexas.edu/users/gouda/
Programming Methodology, Concurrent and DistributedComputing, Fault-tolerant Computing, Secure Computing, Network Protocols,Sensor Networks, Formal Methods.
Simon S. Lam
http://userweb.cs.utexas.edu/users/lam/
Vitaly Shmatikov (HC)
http://userweb.cs.utexas.edu/users/shmat/
computer security and privacy, formal methods for analysisof secure systems and network protocols
Michael Walfish (HC?)
http://userweb.cs.utexas.edu/users/mwalfish/
Brent Waters (HC)
http://userweb.cs.utexas.edu/users/bwaters/
cryptography and network security
(编辑:Ada)