University of Florida

Dr. Kevin Butler

Professor, Director of the Florida Institute for Cybersecurity (FICS) Research, Computer & Information Science & Engineering (CISE)


Brendan David-John, Diane Hosfelt, Kevin Butler, and Eakta Jain. A Privacy-Preserving Approach to Streaming Eye-Tracking Data. IEEE Transactions on Visualization and Computer Graphics, March 2021 (early access). 11 pages. Best paper nominee at IEEE VR 2021.


Farhaan Fowze, Dave Tian, Grant Hernandez, Kevin Butler, and Tuba Yavuz. ProXray: Protocol Model Learning and Guided Firmware AnalysisIEEE Transactions on Software Engineering, August 2019. Accepted for publication. Selected for Journal-First presentation at ICSE’20.

Grant Hernandez, Dave (Jing) Tian, Farhaan Fowze, Tuba Yavuz, Patrick Traynor, and Kevin Butler. Toward Automated Firmware Analysis in the IoT Era. IEEE Security and Privacy, 17(5), pages 38-46, Sept/Oct 2019.

Joseph Choi and Kevin Butler. Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities. Security and Communication Networks, 2019, Article ID 1368905, 28 pages, April 2019.


Benjamin Mood and Kevin Butler. PAL: A Pseudo Assembly Language for Optimizing Secure Function Evaluation in Mobile Devices. Journal of Information Security and Applications, 40, pg. 78-91, Jun. 2018.


Patrick Traynor, Kevin Butler, Jasmine Bowers, and Bradley Reaves. FinTechSec: Addressing the Security Challenges of Digital Financial Services. IEEE Security and Privacy, 15(5), pg. 85-89, Sept./Oct. 2017.

Dave (Jing) Tian, Kevin R. B. Butler, Joseph Choi, Patrick D. McDaniel, and Padma Krishnaswamy. Securing ARP/NDP From the Ground Up. IEEE Transactions on Information Forensics and Security, 12(0), pg. 2131-2143, September 2017.

Adam Bates, Dave (Jing) Tian, Grant Hernandez, Thomas Moyer, Kevin R. B. Butler, and Trent Jaeger. Taming the Costs of Trustworthy Provenance through Policy Reduction. ACM Transactions on Internet Technology, 17(4), Article 34, September 2017.

Dr. Ekta Jain

Associate Professor, CISE


Is the Avatar Scared? Pupil as a Perceptual Cue, Dong, Yuzhu and Joerg, Sophie and Jain, Eakta, Computer Animation and Virtual Worlds. 2022;e2040


Online Hazard Recognition Training: A Comparative Case Study of Static Images, Cinemagraphs, and Videos, Eiris, Ricardo and Jain, Eakta and Gheisari, Masoud and Wehle, Andrew, ASCE Journal of Construction Engineering and Management, 147(8): 04021082

Fast Foveating Cameras for Dense Adaptive Resolution, Tilmon, B., Jain, E., Ferrari, S., & Koppal, S. J. (2021). IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. PP.

A Privacy-Preserving Approach to Streaming Eye-Tracking Data, David-John, Brendan and Hosfelt, Diane and Butler, Kevin and Jain, Eakta, IEEE Transactions on Visualization and Computer Graphics (TVCG 2021) Special Issue on IEEE VR. (p1-p12) Best Paper Nominee.


Benchmark of Four Methods for Generating 360° Saliency Maps from Eye Tracking Data, John, Brendan and Le Meur, Olivier and Jain, Eakta, International Journal of Semantic Computing 13.03


Creating Segments and Effects on Comics by Clustering Gaze Data, Thirunarayanan, Ishwarya and Khetarpal, Khimya and Koppal, Sanjeev and Le Meur, Olivier and Shea, John and Jain, Eakta, ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM).

Dr. Patrick Traynor

Professor, John H. and Mary Lou Dasburg Preeminent Chair in Engineering, Associate Chair for Research, CISE


P. Traynor, K. Butler, J. Bowers, B. Reaves. FinTechSec: Addressing the Security Challenges of Digital Financial Services, IEEE S&P Magazine, 15:5, p. 85-89, 2017. 

B. Reaves, J. Bowers, N. Scaife, A. Bates, A. Bharatiya, P. Traynor, and K. Butler. Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World, ACM Transactions on Privacy and Seurity (TOPS), 2017.

H. Carter and P. Traynor. OPFE: Outsourcing Computation for Private Function Evaluation, International Journal of Information and Computer Security (IJICS), 2017.

S. Heuser, B. Reaves, P. Kumar Pendyala, H. Carter, A. Dmitrienko, W. Enck, N. Kiyavash, A. Sadeghi, and P. Traynor. Phonion: Practical Protection of Metadata in Telephony Networks, Proceedings on Privacy Enhancing Technologies (PoPETs), 2017.


B. Reaves, J. Bowers, S. A. Gorski III, O. Anise, R. Bobhate, R. Cho, H. Das, S. Hussain, H. Karachiwala, N. Scaife, B. Wright, K. Butler, W. Enck, and P. Traynor. *droid: Assessment and Evaluation of Android Application Analysis Tools, ACM Computing Surveys (CSUR), 2016. 

C. Amrutkar, Y. Kim and P. Traynor, Detecting Mobile Malicious Webpages in Real Time, IEEE Transactions on Mobile Computing (TMC), To appear 2016.

H. Carter, B. Mood, P. Traynor and K. Butler, Outsourcing Secure Two-Party Computation as a Black Box, Journal of Security and Communication Networks (SCN), To Appear 2016.

H. Carter, B. Mood, P. Traynor, and K. Butler. Secure Outsourced Garbled Circuit Evaluation for Mobile Devices. Journal of Computer Security (JCS), 24(2):137-180, 2016.

Indiana University, Bloomington

Dr. Kurt Hugenberg

Professor, (UI), Department of Psychological & Brain Sciences


  • Almaraz, S. M., Hugenberg, K. & Young, S. G. (2018). Perceiving sophisticated minds influences perceptual individuation. Personality and Social Psychology Bulletin, 44, 143-157.


  • Cassidy, B. S., Krendl, A. C., Stanko, K. A., Rydell, R. J., Hugenberg, K., & Young, S. G. (2017). Configural face processing impacts race disparities in humanization and trust. Journal of Experimental Social Psychology, 73, 111-124.
  • Deska, J. D., & Hugenberg, K. . (2017). The face-mind link: Why we see minds behind faces, and how others’ minds change how we see their faces. Social & Personality Psychology Compass, 11, e12361.
  • Kawakami, K., Amodio, D. M., & Hugenberg, K. (2017). Intergroup perception and cognition: An integrative framework for understanding the causes and consequences of social categorization. In J. M. Olson (Ed.), Advances in Experimental Social Psychology, Vol. 55, pp. 1-80.
  • Lloyd, E. P., Hugenberg, K., McConnell, A. R., Kunstman, J. W., & Deska, J. C. (2017). Black and White lies: Race-based biases in deception judgments. Psychological Science, 28, 1125-1136.
  • Wilson, J. P., Hugenberg, K., & Rule, N. (2017). Racial bias in judgments of Physical size and formidability: From size to threat. Journal of Personality and Social Psychology, 113, 59-80.

Dr. Apu Kapadia

Professor, Director & Chair, Cybersecurity Risk Program, Indiana University Bloomington (UI), Luddy School of Informatics, Computing & Engineering


Max Planck Institute

Dr. Elissa Redmiles

Consultant, Faculty Member & Research Group Leader, Max Planck Institute for Software Systems




University of Washington

Dr. Yoshi Kohno

Professor, University of Washington (UW), Paul G. Allen School of Computer Science & Engineering


Dr. Franzi Roesner

Associate Professor, UW, Paul G. Allen School of Computer Science & Engineering, Co-director of the Security & Research Privacy Lab