Salvatore J. Stolfo - US grants
Affiliations: | Computer Science | Columbia University, New York, NY |
Area:
Computer Security, Intrusion and Anomaly Detection, Embedded Device Security, Data Mining/machine LearningWe are testing a new system for linking grants to scientists.
The funding information displayed below comes from the NIH Research Portfolio Online Reporting Tools and the NSF Award Database.The grant data on this page is limited to grants awarded in the United States and is thus partial. It can nonetheless be used to understand how funding patterns influence mentorship networks and vice-versa, which has deep implications on how research is done.
You can help! If you notice any innacuracies, please sign in and mark grants as correct or incorrect matches.
High-probability grants
According to our matching algorithm, Salvatore J. Stolfo is the likely recipient of the following grants.Years | Recipients | Code | Title / Keywords | Matching score |
---|---|---|---|---|
1994 — 1996 | Stolfo, Salvatore | N/AActivity Code Description: No activity code was retrieved: click on the grant title for more information |
Scalable Parallel and Distributed Expert Database Systems @ Columbia University 9313847 Stolfo We study solutions to the performance bottleneck in expert databases using the PARADISER 10 distributed rule processing environment as our testbed. We purpose an approach that combines statically computed restrictions on the rules of a rule program for partitioning the workload of rule evaluation among an arbitrary number of rule program replicas evaluated at distinct processing sites, and dynamic load balancing protocols that update and reorganize the distribution of workload by modifying the restrictions at runtime. (Rules are not redistributed.) Our techniques utilize one form of "meta-data", namely, statistics gathered on the attribute values and size of relations of the underlying database (e.g., number of distinct values of an attribute, number of tuples in a relation etc.) in the algorithms that compute the restrictions on the rules. We analyze the dynamic load balancing protocols in terms of efficiency and scalability criteria, which provide guidance on the expected behavior of the protocols with increasing database size. The proposed research falls into three main categories: (a) workload distribution paradigms among processing sites to ameliorate the performance degradation resulting from scaling up of database size, (b) a suite of load balancing protocols for dynamic "logical" reorganization of the underlying database, and their scaling characteristics, and , (c) experimental validation in the PARADISER expert database environment, using a suite of benchmark rule programs. A fully operational and transferable rule processing environment will be constructed that embodies these results. |
0.915 |
2002 — 2004 | Stolfo, Salvatore Johnson, Eric (co-PI) [⬀] Johnson, Eric (co-PI) [⬀] |
N/AActivity Code Description: No activity code was retrieved: click on the grant title for more information |
Sger: Mitigating Access Risks of Browsing Government Date and Websites by Secure Private Portals @ Columbia University EIA-0140304 -Salvatore Stolfo-Columbia University-SGER: Mitigating Access Risks of Browsing Government Data and Websites by Secure Private Portals |
0.915 |
2004 — 2006 | Stolfo, Salvatore | N/AActivity Code Description: No activity code was retrieved: click on the grant title for more information |
Email Mining Toolkit Supporting Law Enforcement Forensic Analyses @ Columbia University This proposal presents research, development, deployment and testing of data-mining and machine learning-based technology for email and instant messaging data, including attached documents and files, and allowing for a broad range of applications for criminal investigation (both evidence gathering and evidence analysis) by law enforcement agencies. This tool can be applied to email and/or account misuse, user behavior-based analyses such as detecting criminal groups using email and Instant Messaging accounts |
0.915 |
2005 — 2006 | Stolfo, Salvatore | N/AActivity Code Description: No activity code was retrieved: click on the grant title for more information |
Workshop On Resilient Financial Information Systems @ Columbia University This workshop will expose to the research community a set of research needs identified by the U.S. Treasury Department as both high priority and medium to high research risk. Topics to be presented include: securing software environments including COTS software, technology to defend against insider cyber attacks, high reliability biometric identification systems, pattern recognition for asset movement, data replication technology, and technology to prevent or recover from widespread identity theft. Researchers with activities relevant to these areas will be identified and invited to participate in the workshop. The Treasury Department will coordinate participation of appropriate members of the financial community. The expected results of the workshop include improved opportunities for effective research and technology transfer that will mitigate some of the problems faced by the Treasury Department and the U.S. financial infrastructure overall. During the workshop, reports and briefings will also be produced. |
0.915 |
2006 — 2011 | Stolfo, Salvatore Kaiser, Gail (co-PI) [⬀] Keromytis, Angelos [⬀] |
N/AActivity Code Description: No activity code was retrieved: click on the grant title for more information |
Ct-T: Enabling Collaborative Self-Healing Software Systems @ Columbia University Angelos Keromytis |
0.915 |
2009 — 2010 | Stolfo, Salvatore | N/AActivity Code Description: No activity code was retrieved: click on the grant title for more information |
National Cyber Defense Initiative Financial Services Workshop @ Columbia University This workshop is concerned with extraordinary attacks mounted by nation-state adversaries for strategic gain. Recent events demonstrate the vulnerability of banking from cascaded effects, such as the sub-prime lending disaster. Banks have done reasonably well in protecting themselves from sophisticated criminals; losses have been growing, but are tolerable. It is expected that banking will continue to be effective against ordinary cyber attacks as part of the cost of doing business. A workshop will be held to develop set of representative worst-case strategic cyber attack scenarios and the options the nation may need to mitigate the effects of those scenarios. Key issues that will be addressed, include: worst case scenarios; factors contributing most to dame; long and shot term steps to reduce risk, early recognition of attacks; way to speed recovery; and ways to thwart attack. A summary of the report will be made publicly available online. |
0.915 |
2009 — 2012 | Stolfo, Salvatore | N/AActivity Code Description: No activity code was retrieved: click on the grant title for more information |
Measuring the Security Posture of Large Financial Enterprises: An Eager Proposal to Nsf Ccf @ Columbia University To develop computer security as a science and engineering discipline, metrics need to be defined to evaluate the safety and security of alternative system designs. Security policies are often specified by large organizations but there are no direct means to evaluate how well these policies are followed by human users. The proposed project explores fundamental means of measuring the security posture of large enterprises. Risk management and risk mitigation requires measurement to assess alternative outcomes in any decision process. The project is intended to devise metrics and measurement methods, and test and evaluate these in a real institution, to evaluate how human users behave in a security context. Financial institutions in particular require significant controls over the handling of confidential financial information and employees must adhere to these policies to protect assets, which are subject to continual adversarial attack by thieves and fraudsters. Hence, financial institutions are the primary focus of the measurement work. The technical means of measuring user actions that may violate security policy is performed in a non-intrusive manner. The measurement system uses specially crafted decoy documents and email messages that signal when they have been opened or copied by a user in violation of policy. The project will develop collaborations with financial experts to devise risk models associated with users of information technology within large enterprises. This line of work extends traditional research in computer security by opening up a new area focused on the human aspect of security. |
0.915 |