We are excited to report that Noemi Glaeser (Computer Science Senior) has been named a 2019 NSF Graduate Research Fellow. Also, William Edwards (Computer Science Senior) was selected for an Honorable Mention in this prestigious graduate fellowship competition. The National Science Foundation has awarded 2,050 three-year Graduate Research Fellowships of approximately $138,000 each to outstanding college and university students for the year 2019. Since 1952, NSF has provided fellowships to individuals selected early in their graduate careers based on their demonstrated potential for significant achievements in science and engineering.
UofSC’s 2019 NSF Graduate Research Fellowship Winners and Honorable Mentions One UofSC undergraduate student, two graduate students, and seven alumni have been awarded 2019 National Science Foundation (NSF) Graduate Research Fellowships (GRF). Current South Carolina senior Noemi Glaeser, graduate students Kaitlyn Pilarzyk and Luke Wilde, and alumni Vincent Esposito, Abigail Herschman, Colman Moore, Shrusti Patel, Adrian Perez, Samantha Stewart, and Heather Struckman have all been named NSF GRF Fellows. Two other current students, William Edwards and Sarah Zajovits, as well as three alumni, Justin DuRant, Jonathan Keefe, and Elizabeth Rizor were selected for Honorable Mentions in this prestigious graduate fellowship competition. The National Science Foundation has awarded 2,050 three-year Graduate Research Fellowships of approximately $138,000 each to outstanding college and university students for the year 2019. Since 1952, NSF has provided fellowships to individuals selected early in their graduate careers based on their demonstrated potential for significant achievements in science and engineering.
The winning team for 2019 Backers and Hackers is Nathan Pavlovsky and Sadegh Sadeghi Tabas (Backer) for their app LineSkip, an app that allows users to bypass long frustrating lines at popular social events like bars, nightclubs, exhibits, museums, sporting events, and other attractions. Users will be able to purchase tickets for a given one-hour time slot and pay for the privilege of cutting the line. Backers and Hackers is a completely student-run initiative organized by the Entrepreneurship Club and the College of Engineering and Computing at USC. The program brings together Columbia’s entrepreneurial community and USC’s mobile app development students to transform app ideas into reality.
Second place went to Russell Burckhalter, Kendrick Dubose, Zac Miller for their app HotSpot, which is an event parking app that lets everyday people rent out their driveways near events like football stadiums to event goers. Event goers can reserve and purchase spots ahead of time, making parking a positive and simple experience instead of a possible nightmare.
Third place to Allen Sanamandra, Ishita Thumati , Sumith K S, Prasad Puttaswamy, Roshan Joseph, Venkat Kotha for their app DailyCook, a mobile app based startup idea which helps individuals interested in cooking to sell their food. The app also provides a platform for food donation thus helping people to find free food around them. Backers&Hackers are co-organized by CSCE546, a mobile app development course at the Department of Computer Science & Engineering. The apps are developed as the final projects for the course. We are always looking for clients/backers and app ideas as final projects for next year's course. If you want an app built for you, for free, or want to collaborate with app development, please contact Dr. Hu (jianjunh A.T sc.edu).
This year the students in the Senior Capstone course developed 34 apps either for industrial clients, for USC members, or for themselves. The technologies used were:
Mobile application ("app") repackaging is a severe threat to the flourishing mobile market and numerous users. 97% of the top paid Android apps and 87% of the iOS ones have been repackaged. Besides, it is one of the most common ways of propagating mobile malware. Existing countermeasures mostly detect repackaging based on app similarity measurement, which tends to be imprecise when obfuscations are applied to repackaged apps. Moreover, they rely on a centralized party, typically the hosting app store, to perform the detection, but many alternative app stores fail to commit proper effort to piracy detection. This research aims at an effective defense against app repackaging, and will result in substantial progress in tackling malware propagated via repackaged apps. It will help mitigate attacks such as ransomware or DDoS launched from repackaged apps. It will also help reduce the massive monetary loss of legitimate app developers. Industrial collaborations ensure rapidly translate scientific discovery and technical knowledge into beneficial commercial products. Educational resources from this project, including course modules on mobile security and malware detection, will be disseminated through a dedicated web site. This research will foster new research and education opportunities at University of South Carolina. Students from underrepresented groups will participate in the project. This research is to explore a decentralized scheme that adds repackaging detection capability into the app to be protected, such that the host devices are made use of to conduct detection when the app is running. The main challenge is how to protect the repackaging detection code from attacks. The team of research proposes a novel malware-inspired approach to handling the important mobile app repackaging problem. The team will explore a creative use of logic bombs, which are regularly used in malware: the trigger conditions are constructed to exploit the differences between the attacker and users (in terms of hardware, sensor values, and inputs), such that a bomb that lies dormant on the attacker side will be activated on the user side. The repackaging detection code, which is packed as the bomb payload, is executed only if the bomb is activated. (2) Unlike many conventional software tampering detection techniques that try to conceal the detection code, by leveraging various methods used in malware this design is non-stealthy, which means that the detection code is not hidden, yet still resilient to attacks. (3) The proposed system also aims to detect code tampering, which occurs when malicious code is inserted and hence implies extraordinary dangers. (4) The decentralized repackaging/tampering detection is proposed to be used for crowdsourced malware information collection to fight against malware propagation. (5) Finally, the team is to address how to prevent the proposed techniques from being abused by malware authors.
Dr. Jason O’Kane has received a grant award from the National Science Foundation for his research project titled "Planning Coordinated Event Observation for Structured Narratives ". This research studies how to direct a team of robots to obtain video footage to produce clips that trace a dramatic story arc. It is an examination of how such systems might achieve goals that people consider to be abstract or high-level. The video below explains some of their work, or read the article Could robots make a documentary about a 5K race?