A Research Framework and Initial Study of Browser Security for the Visually Impaired

A Research Framework and Initial Study of Browser Security for the Visually Impaired

Continue reading »

New website

So I've got a new website

Continue reading »

Quoted in Washington Post

Speaking on Cyber Partisans

Continue reading »

NICE K12 Cybersecurity Education Conference

Speaking on ARGs

Continue reading »

On Stablecoins: Stability Mechanisms and Use Cases for Real People. In: Proceedings of the Third International Symposium on Foundations and Applications of Blockchain, 2020

Cryptocurrency for everyone

Continue reading »

Fakesbook: A social networking platform for teaching security and privacy concepts to secondary school students. In: Proceedings of the ACM Technical Symposium on Computing Science Education (SIGCSE), 2019

Teaching Privacy with Social Network

Continue reading »

Cybersecurity Policy Fellow at New America

Cybersecurity Fellow

Continue reading »

Cal Poly wins NSA GenCyber Teacher Training Award

GenCyber

Continue reading »

Authenticity, Ethicality, and Motivation: A Formal Evaluation of a 10-week Computer Security Alternate Reality Game for CS Undergraduates. In: Proceedings of the USENIX Advances in Security Education Workshop (ASE), 2018.

Evaluting ARGs in the Classroom

Continue reading »

CENIC Panel Cybersecurity Workforce Development in R&E Environments

A conversation on developing the cybersecuirty workforce

Continue reading »

Introducing Privacy to Undergraduate Computing Students. In: Proceedings of the Consortium for Computing in the Colleges Southwest Region Conference, 2018

Privacy for CS Undergrads

Continue reading »

Mixed approaches to CS0: Exploring topic and pedagogy variance after six years of CS0. In: Proceedings of the ACM Technical Symposium on Computing Science Education (SIGCSE), 2018.

Mixed Approaches to CS0

Continue reading »

New CS Education Papers

New CS Education Papers

Continue reading »

In the News

I was featured in a few recent news articles

Continue reading »

UCL Academic Centre of Excellence in Cybersecurity Research lecture

Speaking at the UCL Academic Centre of Excellence in Cybersecurity Research lecture series

Continue reading »

Visualisation of Security via Gameplay

Creating a video demonstrating the value of visualizing security issues through game play

Continue reading »

The Outcomes of Cybersecurity Competitions and Implications for Underrepresented Populations. IEEE Security & Privacy, 14(6), pp. 90-95, November-December 2016

Cybersecurity Competitions

Continue reading »

EPIC Summer Camp 2016

Participating in the Engineeing Possibilities in College Summer Camp 2016

Continue reading »

Audio Recording of my Kennedy Library Data Studio Talk

Audio recording of my 2016 Data Studio Talk

Continue reading »

NSF SaTC Award for K-12 Cybersecurity Education

NSF for EPIC

Continue reading »

Fulbright Scholar

I've been selected to be US-UK Cybersecurity Fulbright Scholar!

Continue reading »

Talking about Talking about Cybersecurity Games. USENIX ;login:, 41(1), pp. 36-39, Spring 2016

Talking about Talking about Cybersecurity Games

Continue reading »

USENIX Enigma Talk

There's video of my USENIX Enigma 2016

Continue reading »

Speaking at USENIX Enigma

USENIX Enigma 2016

Continue reading »

New TableTop Security website

Our project has a new website

Continue reading »

USENIX ASE 2016

A new workshop for Security Education

Continue reading »

This is Not a Game: Early Observations on Using Alternate Reality Games for Teaching Security Concepts to First-Year Undergraduates. In: Proceedings of the Workshop on Cyber Security Experimentation and Test. 2015.

This is Not a Game: Early Observations on Using Alternate Reality Games for Teaching Security Concepts to First-Year Undergraduates

Continue reading »

3GSE 2015

Creating the USENIX Summit on games for security education

Continue reading »

ARGs for security education at CSET15

Speaking at USENIX CSET 2015

Continue reading »

A Research Framework and Initial Study of Browser Security for the Visually Impaired. In: Proceedings of the Workshop on Inclusive Privacy and Security. 2015.

A Research Framework and Initial Study of Browser Security for the Visually Impaired

Continue reading »

Browser security for the visually impaired

Speaking at SOUPS/WIPS 2015

Continue reading »

Cybersecurity track at EPIC 2015

EPIC 2015

Continue reading »

DEFY: A Deniable, Encrypted File System for Log-Structured Storage. In: Proceedings of the Network and Distributed System Security Symposium. 2015.

DEFY: A Deniable, Encrypted File System for Log-Structured Storage

Continue reading »

NDSS 2015

Our deniable, encrypted file system at NDSS15

Continue reading »

Google CS Engagement Award

I got a Google CS Engagement Award

Continue reading »

Valuing Security by Getting [d0x3d!]: Experiences with a network security board game. In: Proceedings of the Workshop on Cyber Security Experimentation and Test (CSET), 2013.

Valuing Security by Getting [d0x3d!]: Experiences with a network security board game

Continue reading »

Security through Play. IEEE Security & Privacy, 11(3), pp. 64-67, May-June 2013

Security through Play

Continue reading »

Geolocating Data in the Cloud. In: Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2013.

Geolocating Data in the Cloud

Continue reading »

Securing Electronic Medical Records Using Attribute-Based Encryption On Mobile Devices. In: Proceedings of the ACM CCS Workshop on Security and Privacy in Mobile Devices, 2011.

Securing Electronic Medical Records Using Attribute-Based Encryption On Mobile Devices

Continue reading »

Remote Data Checking Using Provable Data Possession. ACM Transactions on Information and System Security, 14(1) May 2011.

Remote Data Checking Using Provable Data Possession

Continue reading »

Security Constructs for Regulatory-Compliant Storage. Communications of the ACM. 53(1), January 2010.

Security Constructs for Regulatory-Compliant Storage

Continue reading »

Provable Data Possession at Untrusted Stores. In: Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2007.

Provable Data Possession at Untrusted Stores

Continue reading »

Design and Implementation of Verifiable Audit Trails for a Versioning File System. In: Proceedings of the USENIX Conference on File and Storage Technologies (FAST), 2007.

Design and Implementation of Verifiable Audit Trails for a Versioning File System

Continue reading »

Secure Deletion for a Versioning File System. In: Proceedings of the USENIX Conference on File and Storage Technologies (FAST), 2005.

Secure Deletion for a Versioning File System

Continue reading »

Ext3cow: A Time-Shifting File System for Regulatory Compliance. ACM Transactions on Storage. 1(2), May 2005.

Ext3cow: A Time-Shifting File System for Regulatory Compliance

Continue reading »