Skip Menu

  • Skip to Search
  • Skip to Main Navigation
  • Skip to Main Content
  • Skip to Featured Content
  • Skip to Footer
Virginia Tech | Invent the Future
College of Engineering
Computer Science
Return to Skip Menu

Search

  • Search within VTCS
 
Return to Skip Menu

Main Navigation

  • About Us
  • People
  • Research
  • Undergraduate
  • Graduate
  • Events and Seminars
  • Alumni
  • Partnering with Industry
  • Northern VA Campus
  • Contact Us
 
 
  • Home
  • User
  • 115
 
Return to Skip Menu

Main Content

danfeng's picture

Danfeng (Daphne) Yao

Assistant Professor

Office: 2222 KWII
Email: danfeng@cs.vt.edu
Phone: (540)231-7787
Website: http://people.cs.vt.edu/~danfeng
Publication statistics: Google Scholar Profile
Office Hours: W: 1:45 - 3:45, 122-B McBryde
  • About
  • Labs
  • Publications
  • Projects
  • Courses
  • Grants
 
Research Interests
  • Center for High End Computing Systems
  • High End Computing and Computational Science
  • Systems and Cybersecurity

Danfeng (Daphne) Yao is an assistant professor in the Department of Computer Science at Virginia Tech, Blacksburg. She received her Computer Science Ph.D. degree from Brown University. Before joining VT, she was a tenure-track assistant professor at Rutgers University Computer Science Department for two years. Her research interests are in network and information security, in particular user-centric security and privacy, social- and human-behavior pattern recognition, insider threats, secure information sharing,  data privacy, and applied cryptography. Danfeng has more than 30 publications on various topics of security and privacy. She received the NSF CAREER Award in 2010 for her work on human-behavior driven malware detection. She won the Best Student Paper Award in ICICS 2006, and the Award for Technological Innovation from Brown in 2006, both for her privacy-preserving identity management work. She also won the Best Paper Award in CollaborateCom '10 for her keystrok security work. Danfeng has one provisional patent filed for her recent bot detection techniques.

Human-Centric Security Laboratory

URL: http://people.cs.vt.edu/~danfeng/
Contact: Danfeng Yao

Our research is focused on cyber security, in particular network and information security, human-behaviors in computer security, user-centric and user-friendly systems, insider threats, secure information sharing, data privacy, and applied cryptography. We are interested in developing sound and quantifiable techniques for ensuring the integrity of computer and network systems, and protect them from advanced malicious software attacks as well as operational and accidental errors.

2013
Elish, K., Y. Deng, D. Yao, and D. Kafura, "Device-Based Isolation for Securing Cryptographic Keys", Third International Symposium on Internet of Ubiquitous and Pervasive Things (IUPT 2013), Halifax, Nova Scotia, Canada, June 25-28, 2013.
  • Tagged
  • XML
  • BibTex
  • Google Scholar
Xu, K., D. Yao, and B. G. Ryder, "System Anomaly Detection with Program Analysis and Machine Learning Assistance, poster", IEEE Security and Privacy Conference, 2013.
  • Tagged
  • XML
  • BibTex
  • Google Scholar
Elish, K., D. Yao, B. G. Ryder, and X. Jiang, "User-Intention Based Android Malware Detection, poster", USENIX Security Symposium, 08/2013.
  • Tagged
  • XML
  • BibTex
  • Google Scholar
2012
Almohri, H., D. Yao, and D. Kafura, "Identifying Native Applications With High Assurance", CODASPY'12, San Antonio, TX, February, 2012. Abstract
  • Tagged
  • XML
  • BibTex
  • Google Scholar
Elish, K. O., D. Yao, and B. G. Ryder, "User-centric Dependence Analysis for Identifying Malicious Mobile Apps", Mobile Security Technologies Workshop (MoST12) , 2012.
  • Tagged
  • XML
  • BibTex
  • Google Scholar
2011
Butler, P., K. Xu, and D. Yao, "Quantitatively Analyzing Stealthy Communication Channels", International Conference on Applied Cryptography and Network Security (ACNS), Malaga Spain, Lecture Notes in Computer Science. Springer., 06/2011.
  • Tagged
  • XML
  • BibTex
  • Google Scholar
Wang, Y., Z. Zhang, D. Yao, B. Qu, and L. Guo, "Inferring Protocol-State Machine from Network Traces: A Probabilistic Description Method", International Conference on Applied Cryptography and Network Security (ACNS), Malaga, Spain., Springer., 06/2011.
  • Tagged
  • XML
  • BibTex
  • Google Scholar
2010
Chang, C. - C., B. Thompson, H. Wang, and D. Yao, "Towards Publishing Recommendation Data With Predictive Anonymization", ACM Symposium on Information, Computer \& Communication Security (AsiaCCS), Beijing China, ACM Press, 04/2010.
  • Tagged
  • XML
  • BibTex
  • Google Scholar
Zhang, L., C. - C. Chang, and D. Yao, Applied Cryptography for Cyber Security and Defense:Applied Cryptography in Infrastructure-Free Wireless Networks, : IGI Global, 2010.
  • Tagged
  • XML
  • BibTex
  • Google Scholar
Stefan, D., and D. Yao, "Keystroke-Dynamics Authentication Against Synthetic Forgeries", International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 11/2010.
  • Tagged
  • XML
  • BibTex
  • Google Scholar
Yang, Q., D. Yao, K. Muller, and J. Garnett, "Using a Trust Inference Model for Flexible and Controlled Information Sharing During Crises", Journal of Contingencies and Crisis Management, vol. 18, no. 4, 12/2010.
  • Tagged
  • XML
  • BibTex
  • Google Scholar
Ramstetter, J. R., Y. Yang, and D. Yao, "Applications and Security of Next-Generation User-Centric Wireless Systems.", Future Internet, Special Issue on Security for Next Generation Wireless and Decentralized Systems., vol. 2, pp. 109-211, 2010.
  • Tagged
  • XML
  • BibTex
  • Google Scholar
Stefan, D., C. Wu, D. Yao, and G. Xu, "Knowing Where Your Input is From: Kernel-Level Provenance Verification", 8th International Conference on Applied Cryptography and Network Security (ACNS), Beijing China, pp. 71-87, 06/2010.
  • Tagged
  • XML
  • BibTex
  • Google Scholar
Tamassia, R., D. Yao, and W. H. Winsborough, "Independently-Verifiable Decentralized Role-Based Delegation", IEEE Transactions on Systems, Man, and Cybernetics (SMC), Part A., vol. 40, no. 6, 11/2010.
  • Tagged
  • XML
  • BibTex
  • Google Scholar
2009
Xiong, H., P. Malhortra, D. Stefan, C. Wu, and D. Yao, "User-Assisted Host-Based Detection of Outbound Malware Traffic", Proceedings of International Conference on Information and Communications Security (ICICS), Beijing China, 12/2009.
  • Tagged
  • XML
  • BibTex
  • Google Scholar
Yao, D., and R. Tamassia, "Compact and Anonymous Role-Based Authorization Chain", ACM Transactions on Information and System Security, vol. 12, issue 3, pp. 1 - 27, 01/2009.
  • Tagged
  • XML
  • BibTex
  • Google Scholar
Vyas, N. H., A. Squicciarini, C. - C. Chang, and D. Yao, "Towards Automatic Privacy Management in Web 2.0 with Semantic Analysis on Annotations.", International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Washington, DC, 11/2009.
  • Tagged
  • XML
  • BibTex
  • Google Scholar
Babic, A., H. Xiong, D. Yao, and L. Iftode, "Building Robust Authentication Systems With Activity-Based Personal Questions", ACM Workshop on Assurable & Usable Security Configuration (SafeConfig), Chicago, IL, 11/2009.
  • Tagged
  • XML
  • BibTex
  • Google Scholar
Zarandioon, S., D. Yao, and V. Ganapathy, "Privacy-aware Identity Management for Client-side Mashup Applications", the Fifth ACM Workshop on Digital Identity Management (DIM)., Chicago, IL, 11/2009.
  • Tagged
  • XML
  • BibTex
  • Google Scholar
Thompson, B., D. Yao, S. Haber, W. G. Horne, and T. Sander, "Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases", the 9th Privacy Enhancing Technologies Symposium (PETS), Seatte, WA, 08/2009.
  • Tagged
  • XML
  • BibTex
  • Google Scholar
Chumash, T., and D. Yao, "Detection and Prevention of Insider Threats in Database Driven Web Services", The Third IFIP WG 11.11 International Conference on Trust Management (IFIPTM), West Lafayette, IN, pp. 117-132, 06/2009.
  • Tagged
  • XML
  • BibTex
  • Google Scholar
Thompson, B., and D. Yao, "Union-Split Clustering Algorithm and Social Network Anonymization", ACM Symposium on Information, Computer & Communication Security (ASIACCS), Sydney, Australia, 03/2009.
  • Tagged
  • XML
  • BibTex
  • Google Scholar
Yao, D., N. Fazio, Y. Dodis, and A. Lysyanskaya, "Forward-Secure Hierarchical IBE with Applications to Broadcast Encryption Schemes", Identity-Based Cryptography: IOS Press, 2009.
  • Tagged
  • XML
  • BibTex
  • Google Scholar

Please see projects at: http://people.cs.vt.edu/~danfeng

3000 Level Courses

  • CS3114: Data Structures & Algorithms

4000 Level Courses

  • CS4264: Principles of Computer Security

6000 Level Courses

  • CS6204: Advanced Topics in Systems

CAREER: Human-Behavior Driven Malware Detection

Granting Institution: National Science Foundation
Amount: $529,998

Center of Excellence for Command, Control and Interoperability

Granting Institution: Department of Homeland Security
Amount:

CT - ISG: ROME: Robust Measurement in Sensor Networks

Granting Institution: National Science Foundation
Amount: $400,000

Detection of Data Exfiltration in Enterprise Environments

Granting Institution: Ball State University
Amount: $38,643

Exploring Personalized Security with Novel Learning Techniques for Host-Based Anomaly Detection

Granting Institution: USARO
Amount: $50,000

Novel Games for Analyzing Cyber-Security Behaviors: An Interdisciplinary Approach

Granting Institution: Institute for Critical Technology and Applied Science (ICTAS)
Amount: $60,000

Real-Time Anomaly Detection and Quantitative Assurance for Securing Systems

Granting Institution: ONR
Amount: $449,997

REU Supplement: Human-Behavior Driven malware Detection

Granting Institution: National Science Foundation
Amount: $16,000

Secure and Flexible Information Sharing for Crisis Communication in Pervasive Computing Environments

Granting Institution: Rutgers University
Amount: $50,000

The Rutgers University Research Initiative on Cybersecurity Economics

Granting Institution: Rutgers University
Amount: $60,000

 
 
  • Log in /Administration
  • Intranet
  • Contact Us
  • Maps & Directions
  • Giving to CS
  • Privacy Statement
  • Principles of Community
  • Accessibility

© 2007 Virginia Polytechnic Institute and State University