Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse
Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee
USENIX Security 2023
I am a Ph.D. student in Computer Science at the University of Wisconsin—Madison working with Professor Rahul Chatterjee. My goal is to design and build reliable and secure systems that enhance privacy and user experience. My primary research interests include usable security, authentication, and digital privacy. I am interested in exploring other security areas such as cloud computing security, and cryptography.
I earned my Bachelor's and Master's degrees in Computer Science also at UW-Madison. Besides my studies, I co-founded and worked on several startups, including Takweya. I have also worked as a freelance graphic and UI designer for seven years, and I still occasionally design for fun.
Please email me if you are interested in working with me. (Email found above)
• Our paper got accepted to SIGCSE TS 2023.
Advisor: Rahul Chatterjee
Area: Computer security and privacy
Advisor: Rahul Chatterjee
Area: Computer security and privacy
Minor in Mathematics.
Relevant Coursework:
Computer Engineering; Machine Organization & Programming; Data Structures; Algorithms; Artificial Intelligence; Cryptography; Combinatorics; Operating Systems; Information Security; Software Engineering; Theory and Design of Programming Languages; Topics in Security and Privacy.
There are abundant technologies that help abusers engage in domestic violence. Research should evaluate these technologies and understand how helpful the web is for victims.
Project 1: We investigate the spyware applications available in Google's Play Store and Apple's App Store. Our work focuses on understanding the distribution of these applications across different countries and languages.
Project 2: Previous studies show that there are thousands of applications and resources that can help abusers engage in IPV (intimate partner violence). However, we do not know whether the web is helpful for victims as it is for abusers. We look at the resources available for victims and assess the complexity of search queries needed to retrieve these resources.
I am interested in exploring more security research such as systems security, web security, authentication and verification systems, etc.
Many students can graduate without taking any security courses. Therefore, there is a need to evaluate how to secure our current computer science courses and integrate security topics into the required courses.
We evaluated the Computer Systems course offered by 16 of the top CS programs in the US by analyzing the types of vulnerable functions students and instructors use in the course. We further assessed the lecture notes and the textbooks used by these universities. In the 760 thousand lines of C/C++ code we collected, we found thousands of extremely dangerous functions that can lead to serious security issues. We also found that most universities and textbooks do not warn students of these vulnerable functions.; even worse, some keep using them even after warning about them. We are evaluating existing tools to integrate security into the grading system to ensure that students will learn about vulnerable functions.
USENIX Security 2023
SIGCSE TS 2023
PETS 2022
SIGCSE TS 2022
SIGCSE TS 2021
ACM ICER 2020 (Acceptance Rate: 23%)