Ersin Uzun Headshot

Ersin Uzun

Katherine Johnson Endowed Executive Director

ESL Global Cybersecurity Institute
Golisano College of Computing and Information Sciences
Professor

585-475-5142
Office Hours
By Appointment
Office Location
Office Mailing Address
20 Lomb Memorial Dr, GCI 70-1787, Rochester NY 14623

Ersin Uzun

Katherine Johnson Endowed Executive Director

ESL Global Cybersecurity Institute
Golisano College of Computing and Information Sciences
Professor

Bio

Ersin Uzun is the Katherine Johnson Endowed Executive Director of the Global Cybersecurity Institute and a Professor in the Department of Cybersecurity. He received his MS, PhD degrees from the Department of Computer Science at the University of California, Irvine. His research interests include Usable Security/Privacy, Applied Cryptography and IoT/Networking Security. Dr. Uzun has over 100 issued patents and peer-reviewed publications in the fields of networking, security and privacy.

585-475-5142

Personal Links
Areas of Expertise

Select Scholarship

Publications:

SJ Sohrawardi, C Schwartz, E Uzun, M Wright; DeFake: Developing a Usable Tool for Deepfake Awareness and Identification; Human Computer Interaction Consortium 2023

C Ghali, G Tsudik, E Uzun; In Content We Trust: Network-Layer Trust in Content-Centric Networking; IEEE/ACM Transactions on Networking 2019

V Bindschaedler, S Rane, AE Brito, V Rao, E Uzun; Achieving differential privacy in secure multiparty data aggregation protocols on star networks; ACM on Conference on Data and Application Security and Privacy 2017

E Ngai, B Ohlman, G Tsudik, E Uzun, M Wählisch, CA Wood; Can we make a cake and eat it too? A discussion of ICN security and privacy; ACM SIGCOMM Computer Communication Review 2017

C Ghali, G Tsudik, E Uzun, CA Wood; Closing the floodgate with stateless content-centric networking; International Conference on Computer Communication and Networks 2017

M Mosko, E Uzun, CA Wood; Mobile sessions in content-centric networks; IFIP Networking Conference 2017

G Tsudik, E Uzun, CA Wood; Ac3n: Anonymous communication in content-centric networking; IEEE Annual Consumer Communications & Networking Conference 2016

E Ngai, B Ohlman, G Tsudik, E Uzun; Information-centric Networking and Security (Dagstuhl Seminar 16251)  Dagstuhl Reports 2016

C Tschudin, E Uzun, CA Wood; Trust in information-centric networking: From theory to practice; International Conference on Computer Communication and Networks 2016

J Kuriharay, E Uzun, CA Wood; An encryption-based access control framework for content centric networking; IFIP networking conference 2015

C Ghali, G Tsudik, E Uzun, CA Wood; Living in a PIT-less World: A Case against Stateful Forwarding in Content-Centric Networking; The Computing Research Repository abs/1512.07755 2015

S Rane, J Freudiger, AE Brito, E Uzun; Privacy, efficiency & fault tolerance in aggregate computations on massive star networks; IEEE International Workshop on Information Forensics and Security 2015

S Rane, E Uzun; A fuzzy commitment approach to privacy preserving behavioral targeting; ACM MobiCom workshop on Security and privacy 2014

P Mahadevan, E Uzun, S Sevilla, JJ Garcia-Luna-Aceves CCN-krs: A key resolution service for CCN; Proceedings of the 1st ACM Conference on Information-Centric Networking 2014

CA Wood, E Uzun; Flexible end-to-end content security in CCN; IEEE 11th Consumer Communications and Networking Conference 2014

C Ghali, G Tsudik, E Uzun; Needle in a haystack: Mitigating content poisoning in named-data networking; NDSS Workshop on Security of Emerging Networking Technologies 2014

C Ghali, G Tsudik, E Uzun; Network-layer trust in named-data networking; ACM SIGCOMM Computer Communication Review 2014

J Freudiger, S Rane, AE Brito, E Uzun; Privacy preserving data quality assessment for high-fidelity data sharing; ACM Workshop on Information Sharing & Collaboration 2014

I Bilogrevic, J Freudiger, E De Dristofaro, E Uzun; What’s the gist? Privacy-preserving aggregation of user profiles; European Symposium on Research in Computer Security 2014

A Kobsa, R Nithyanand, G Tsudik, E Uzun; Can Jannie verify? Usability of display-equipped RFID tags for security purposes; Journal of computer security 2013

C Bian, Z Zhu, A Afanasyev, E Uzun, L Zhang; Deploying key management on NDN testbed; UCLA, Peking University and PARC, Tech Report 2013

E Uzun, P Gasti, G Tsudik, L Zhang; DoS & DDoS in Named Data Networking Computer Communications and Networks 2013

A Afanasyev, P Mahadevan, I Moiseenko, E Uzun, L Zhang; Interest flooding attack and countermeasures in Named Data Networking; IFIP Networking Conference 2013

A Chaabane, E De Cristofaro, MA Kaafar, E Uzun; Privacy in content-oriented networking: Threats and countermeasures; ACM SIGCOMM Computer Communication Review 2013

S DiBenedetto, P Gasti, G Tsudik, E Uzun; ANDaNA: Anonymous named data networking application; The Network and Distributed System Security Symposium 2012

S Barber, X Boyen, E Shi, E Uzun; Bitter to better—how to make bitcoin a better currency; International conference on financial cryptography and data security 2012

V Jacobson et al.; Custodian-based information sharing; IEEE Communications Magazine 2012

K Partridge, MA Pathak, E Uzun, C Wang; Picoda: Privacy-preserving smart coupon delivery architecture; The 5th Workshop on Hot Topics in Privacy Enhancing Technologies 2012

R Chow, E Uzun, AA Cárdenas, Z Song, S Lee; Enhancing cyber-physical security through data patterns; Workshop on Foundations of Dependable and Secure Cyber-Physical Systems 2011

E Uzun, N Saxena, A Kumar; Pairing devices for social interactions: a comparative usability evaluation; SIGCHI Conference on Human Factors in Computing Systems 2011

A Kobsa, R Nithyanand, G Tsudik, E Uzun; Usability of display-equipped rfid tags for security purposes; European Symposium on Research in Computer Security 2011

R Nithyanand, G Tsudik, E Uzun; User-aided reader revocation in PKI-based RFID systems; Journal of Computer Security 2011

R Nithyanand, N Saxena, G Tsudik, E Uzun; Groupthink: Usability of secure group association for wireless devices; ACM international conference on Ubiquitous computing 2010

R Nithyanand, G Tsudik, E Uzun; Readers behaving badly; European Symposium on Research in Computer Security 2010

M Wilhelm, I Martinovic, E Uzun, JB Schmitt; SUDOKU: Secure and usable deployment of keys on wireless sensors; IEEE workshop on secure network protocols 2010

A Kumar, N Saxena, G Tsudik, E Uzun; A comparative study of secure device pairing methods; Pervasive and Mobile Computing 2009

A Kumar, N Saxena, E Uzun; Alice meets bob: A comparative usability study of wireless device pairing methods for a two-user setting; Computing Research Repository 2009

A Kumar, N Saxena, G Tsudik, E Uzun; Caveat eptor: A comparative study of secure device pairing methods; IEEE International Conference on Pervasive Computing and Communications 2009

M Cagalj, N Saxena, E Uzun; On the usability of secure association of wireless devices based on distance bounding; International Conference on Cryptology and Network Security 2009

C Soriente, G Tsudik, E Uzun; Secure pairing of interface constrained devices International Journal of Security and Networks 4 (1-2) 2009

C Soriente, G Tsudik, E Uzun; BEDA: Button-enabled device association; Security for Spontaneous Interaction Workshop 2007

K Kostiainen, E Uzun, N Asokan, P Ginzboorg; Framework for comparative usability testing of distributed applications; Security User Studies: Methodologies and Best Practices Workshop 2007

E Uzun, K Karvonen, N Asokan; Usability analysis of secure pairing methods International Conference on Financial Cryptography and Data Security 2007

MT Goodrich, M Sirivianos, J Solis, G Tsudik, E Uzun; Loud and clear: Human verifiable authentication based on audio; IEEE International Conference on Distributed Computing Systems 2006

AA Selcuk, E Uzun, MR Pariente; A reputation based trust management system for P2P networks; IEEE International Symposium on Cluster Computing and the Grid 2004

Patents:

The list of 100+ patents can be found here .

Currently Teaching

CSEC-759
3 Credits
This course explores current topics in Computing Security. It is intended as a place holder course for faculty to experiment new course offerings in Computing Security undergraduate program. Course specific details change with respect to each specific focal area proposed by faculty.

In the News