{"id":20,"date":"2015-03-11T10:17:54","date_gmt":"2015-03-11T14:17:54","guid":{"rendered":"https:\/\/www.bu.edu\/macs\/?page_id=20"},"modified":"2018-02-25T15:24:27","modified_gmt":"2018-02-25T20:24:27","slug":"people","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/macs\/people\/","title":{"rendered":"People"},"content":{"rendered":"<p><a href=\"https:\/\/www.bu.edu\/macs\/people\/#project-lead\">Project Lead<br \/>\n<\/a><a href=\"https:\/\/www.bu.edu\/macs\/people\/#project-director\" style=\"line-height: 1.5;\">Project Director<br \/>\n<\/a><a href=\"https:\/\/www.bu.edu\/macs\/people\/#principal-investigators\">Principal Investigators<br \/>\n<\/a><a href=\"https:\/\/www.bu.edu\/macs\/people\/#post-docs\">Post-Docs<br \/>\n<\/a><a href=\"https:\/\/www.bu.edu\/macs\/people\/#students\">Students<\/a><\/p>\n<hr \/>\n<p><a id=\"project-lead\"><\/a><\/p>\n<h2 class=\"p1\">Project Lead<\/h2>\n<p><img loading=\"lazy\" src=\"http:\/\/www.bu.edu\/hic\/files\/2014\/05\/ran-portrait1.jpg\" alt=\"ran-portrait\" class=\"size-full wp-image-2953 alignleft\" width=\"150\" height=\"200\" \/><\/p>\n<h4 class=\"p1\"><strong>Ran Canetti, Project Lead<\/strong><br \/>\nBoston University<\/h4>\n<p class=\"p1\"><a href=\"http:\/\/www.cs.bu.edu\/~canetti\/\">Ran Canetti<\/a>\u00a0is the lead principal investigator on MACS: A Modular Approach to Cloud Security.\u00a0He is a professor of Computer Science at Boston University and the director of the Center for Reliable Information System and Cyber Security (RISCS).\u00a0Canetti\u2019s research interests span multiple aspects of cryptography and information security, with emphasis on the design, analysis and use of cryptographic protocols. He is a fellow of the International Association for Cryptologic Research and an associate editor of the Journal of Cryptology and Information and Computation.\u00a0Previously, Canetti was a researcher at IBM Watson Research Center, a research scientist at MIT, and a professor at Tel Aviv University. Canetti received his PhD\u00a0from the Weizmann Institute of Science.<br style=\"clear: both;\" \/><br style=\"clear: both;\" \/><\/p>\n<hr \/>\n<p><a id=\"project-director\"><\/a><\/p>\n<h2 class=\"p1\">Project Director<\/h2>\n<p><img loading=\"lazy\" src=\"http:\/\/www.bu.edu\/hic\/files\/2015\/04\/photo-423x636.jpg\" alt=\"photo\" class=\"size-full wp-image-5755 alignleft\" width=\"150\" height=\"210\" \/><\/p>\n<h4><strong>Mayank Varia, Project Research Director<\/strong><br \/>\nBoston University<strong>\u00a0<\/strong><\/h4>\n<p class=\"p1\"><a href=\"http:\/\/www.mvaria.com\/\">Mayank Varia<\/a>\u00a0is the Director for the MACS project. His research interests span theoretical and applied cryptography and their application to problems throughout computer science. Previously, he worked for four years at MIT Lincoln Laboratory, where he designed and evaluated high performance privacy-enhancing data search technology, <a id=\"pi\"><\/a>created information theoretic metrics to quantify privacy, and developed algorithms to capture linguistic provenance automatically. He received a Ph.D. in mathematics from MIT for his work on program obfuscation.<br style=\"clear: both;\" \/><br style=\"clear: both;\" \/><\/p>\n<hr \/>\n<p><a id=\"principal-investigators\"><\/a><\/p>\n<h2>Principal Investigators<\/h2>\n<p><img loading=\"lazy\" src=\"http:\/\/www.bu.edu\/hic\/files\/2012\/01\/JonathanAppavoo.jpg\" alt=\"Jonathan Appavoo\" class=\" wp-image-920 alignleft\" width=\"150\" height=\"200\" \/><\/p>\n<h4 class=\"p1\"><strong>Jonathan Appavoo<\/strong><br \/>\nBoston University<\/h4>\n<p><a href=\"http:\/\/www.cs.bu.edu\/~jappavoo\/jappavoo.github.com\/index.html\">Jonathan Appavoo<\/a> is an Assistant Professor of Computer Science at Boston University.\u00a0 His research focus is on architectures for scalable, elastic systems that enable large-scale on-demand computing.\u00a0 Prior to Joining BU in 2009, Jonathan was a Research Staff Member at IBM Research in New York.\u00a0 He graduated with his PhD in 2006 from the University of Toronto under the supervision of Professor Michael Stumm.<br style=\"clear: both;\" \/><br style=\"clear: both;\" \/><\/p>\n<p><img loading=\"lazy\" src=\"http:\/\/www.bu.edu\/hic\/files\/2014\/05\/Portrait-2009-Azer-Bestavros-770x1024.jpg\" alt=\"Azer Bestavros\" class=\"wp-image-2175 alignleft\" width=\"150\" height=\"200\" \/><\/p>\n<h4 class=\"p1\"><strong>Azer Bestavros<\/strong><br \/>\nBoston University<\/h4>\n<p><a href=\"http:\/\/azer.bestavros.net\/\">Azer Bestavros<\/a>\u00a0is a professor and the former chair of the Computer Science Department at Boston University, which he joined in 1991 after completing his PhD at Harvard University. His research contributions in the broad areas of networking and distributed systems include pioneering the web push content distribution model; seminal work on Internet traffic characterization; game-theoretic approaches to cloud resource management; and safety certification of networked systems and software. This work yielded 17 PhD theses, six issued patents, three start-ups, and hundreds of refereed papers that are cited over 13,000 times. He is the founding director of the BU Hariri Institute for Computing, which was set up to \u201ccreate and sustain a community of scholars who believe in the transformative potential of computational perspectives in research and education.\u201d He serves as a member of the Research, Education, and Outreach Committee of t<a id=\"Srini-Devadas\"><\/a>he MGHPCC, and as a board member of the Cloud Computing Caucus, a nonprofit, nonpartisan coalition of industry and key government stakeholders. \u00a0He has received a number of distinguished service awards and best papers awards, most notably the ACM Sigmetrics Inaugural Test of Time Award.<br style=\"clear: both;\" \/><br style=\"clear: both;\" \/><\/p>\n<h3 class=\"p3\"><img loading=\"lazy\" src=\"http:\/\/www.bu.edu\/hic\/files\/2014\/05\/Srini_Devadas_ACSC.jpg\" alt=\"Srini_Devadas_ACSC\" class=\"size-full wp-image-2956 alignleft\" width=\"150\" height=\"199\" \/><\/h3>\n<h4 class=\"p1\"><strong>Srini Devadas<\/strong><br \/>\nMassachusetts Institute of Technology<\/h4>\n<p class=\"p3\"><a href=\"http:\/\/www.csail.mit.edu\/user\/792\">Srini Devadas<\/a>\u00a0is the Webster Professor of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology (MIT). He received his MS and PhD from the University of California, Berkeley in 1986 and 1988, respectively. He joined MIT in 1988 and served as Associate Head of the Department of Electrical Engineering and Computer Science, with responsibility for Computer Science, from 2005 to 2011.<\/p>\n<p>Devadas\u2019 research interests span Computer-Aided Design (CAD), computer security and computer architecture and he has received significant awards from each discipline. In CAD, his work on logic synthesis and power estimation resulted in several best paper awards at the Design Automation Conference and in IEEE Transactions. Devadas was elected a Fellow of the IEEE in 1999 for contributions to design automation. He received the IEEE Computer Society Technical Achievement Award in 2014 for inventing Physical Unclonable Functions and single-chip secure processor architectures. Devadas\u2019 work on hardware information flow tracking published in the 2004 ASPLOS received the <a id=\"Marten-van-Dijk\"><\/a>ASPLOS Most Influential Paper Award in 2014. His papers on analytical cache modeling and Aegis, a single-chip secure processor were included as influential papers in \u201c25 Years of the International Conference on Supercomputing.\u201d<br style=\"clear: both;\" \/><br style=\"clear: both;\" \/><\/p>\n<h3 class=\"p1\"><img loading=\"lazy\" src=\"http:\/\/www.bu.edu\/hic\/files\/2014\/05\/img_3072b_med_hr.jpeg\" alt=\"img_3072b_med_hr\" class=\"size-full wp-image-2948 alignleft\" width=\"150\" height=\"199\" \/><\/h3>\n<h4 class=\"p1\"><strong>Marten van Dijk<\/strong><br \/>\nUniversity of Connecticut<\/h4>\n<p class=\"p3\"><a href=\"http:\/\/www.ee.uconn.edu\/faculty-staff-students\/faculty\/marten-van-dijk\">Marten van Dijk<\/a>\u00a0has over 10 years research experience in system security both in academia and industry. He worked for two and a half years at RSA Laboratories in cybersecurity. Prior to RSA he was a research scientist at MIT CSAIL working collaboratively with Professor Srini Devadas with an emphasis on processor architectures that offer strong security guarantees; most notably, this collaboration led to the design of Aegis, the first single-chip secure processor that verifies integrity and freshness of external memory. This also led to the\u00a0 introduction of the first circuit realizations of Physical Unclonable Functions (PUFs) resulting in a commercialization by Verayo and Intrinsic-ID. His work received the NYU-Poly AT&amp;T Best Applied Security Paper Award, 3rd place, 2012, and the ACSAC\u201902 outstanding student paper award. Prior to working in system security he was a research scientist at the digital signal processing group at Philips Research, where he became the lead inventor of the error correcting codes used in <a id=\"Sharon-Goldberg\"><\/a>Blu-ray disc. He received a Ph.D. in Mathematics, a M.S. in Mathematics, and a M.S. in Computer Science from Eindhoven University of Technology.<br style=\"clear: both;\" \/><br style=\"clear: both;\" \/><\/p>\n<h3 class=\"p1\"><img loading=\"lazy\" src=\"http:\/\/www.bu.edu\/hic\/files\/2014\/05\/Sharon_small-423x636.jpg\" alt=\"Sharon_small-423x636\" class=\"size-full wp-image-2974 alignleft\" width=\"150\" height=\"199\" \/><\/h3>\n<h4 class=\"p1\"><strong>Sharon Goldberg<\/strong><br \/>\nBoston University<\/h4>\n<p class=\"p1\"><a href=\"http:\/\/www.cs.bu.edu\/~goldbe\/\">Sharon Goldberg<\/a> pursues research at the nexus of security, cryptography, and networking.\u00a0She received her Ph.D. from Princeton University in 2009, and her B.A.Sc. from the University of Toronto in 2003, has worked as a researcher at IBM, Cisco, and Microsoft, and as an engineer at Bell Canada and Hydro One Networks; and has served on working groups of the Federal Communications Commission (FCC) and the Internet Engineering Task Force (IETF); and most recently was awarded the IETF\/IRTF Applied Networking Research Prize for 2014. \u00a0In February 2014,\u00a0Sharon was selected as one of <a id=\"Shafi-Goldwasser\"><\/a>126\u00a0Alfred P. Sloan scholars.\u00a0Sharon joined the BU Computer Science Department in 2010 and was named a Hariri Junior Fellow in 2012.<br style=\"clear: both;\" \/><br style=\"clear: both;\" \/><\/p>\n<h3 class=\"p1\"><img loading=\"lazy\" src=\"http:\/\/www.bu.edu\/hic\/files\/2014\/05\/Shafi-1-BW.jpg\" alt=\"Shafi-1 BW\" class=\"size-full wp-image-2954 alignleft\" width=\"150\" height=\"199\" \/><\/h3>\n<h4 class=\"p1\"><strong>Shafi Goldwasser<\/strong><br \/>\nMassachusetts Institute of Technology<\/h4>\n<p class=\"p3\"><a href=\"http:\/\/www.csail.mit.edu\/user\/733\">Shafi Goldwasser<\/a>\u00a0is the RSA Professor of Electrical Engineering and Computer Science at MIT. She is also a professor of Computer Science and Applied Mathematics at the Weizmann Institute of Science in Israel. Goldwasser received a BS degree in Applied Mathematics from Carnegie Mellon University in 1979, and MS and PhD degrees in Computer Science from the University of California, Berkeley, in 1984.<\/p>\n<p>Goldwasser was the recipient of the G\u00f6del Prize in 1993, and another in 2001, for her work on interactive proofs and connections to approximation. She was awarded the ACM Grace Murray Hopper award, the RSA award in mathematics, the <a id=\"Frans-Kaashoek\"><\/a>ACM Athena award for women in computer science, the Benjamin Franklin Medal in Computer and Cognitive Science, the IEEE Emanuel R. Piore award, and the ACM Turing Award for 2012. She is a member of the AAAS, NAS, and NAE.<br style=\"clear: both;\" \/><br style=\"clear: both;\" \/><\/p>\n<h4 class=\"p1\"><img loading=\"lazy\" src=\"http:\/\/www.bu.edu\/hic\/files\/2014\/05\/Domathon_Frans_WEB-4.jpg\" alt=\"Domathon_Frans_WEB-4\" class=\"size-full wp-image-2947 alignleft\" width=\"150\" height=\"200\" \/><\/h4>\n<h4><strong>Frans Kaashoek<\/strong><br \/>\nMassachusetts Institute of Technology<\/h4>\n<p><a href=\"http:\/\/www.csail.mit.edu\/user\/1525\">Frans Kaashoek\u00a0<\/a>is a professor at MIT, where he co-leads the parallel and\u00a0distributed operating systems group (http:\/\/www.pdos.csail.mit.edu\/). Kaashoek is a\u00a0member of the National Academy of Engineering and the American Academy of Arts\u00a0and Sciences, the recipient of the ACM SIGOPS Mark Weiser award and the 2010\u00a0ACM-Infosys Foundation award. He is cofounder of Sightpath, Inc. and Mazu\u00a0Networks, Inc.<br style=\"clear: both;\" \/><br style=\"clear: both;\" \/><\/p>\n<h3 class=\"p1\"><img loading=\"lazy\" src=\"http:\/\/www.bu.edu\/hic\/files\/2014\/05\/Kollios.jpg\" alt=\"Kollios\" class=\"size-full wp-image-2959 alignleft\" width=\"150\" height=\"200\" \/><\/h3>\n<h4 class=\"p1\"><strong>George Kollios<\/strong><br \/>\nBoston University<\/h4>\n<p class=\"p1\"><a href=\"http:\/\/www.cs.bu.edu\/fac\/gkollios\">George Kollios<\/a>\u00a0is a professor in the\u00a0\u00a0Computer Science Department\u00a0at\u00a0Boston University\u00a0in Boston, Massachusetts. He received his Diploma in Electrical and Computer Engineering in 1995 from the\u00a0National Technical University of Athens,\u00a0Greece and the M.Sc.\u00a0 and Ph.D. degree in Computer Science from\u00a0Polytechnic University, New York in\u00a0 1998 and 2000 respectively. His research interests include temporal and spatio-temporal indexing, data mining, database security, multimedia indexing, and approximation algorithms for large scale data management problems. <a id=\"Daniel-Wichs\"><\/a>His research has been supported by\u00a0<a href=\"http:\/\/www.nsf.gov\/\">NSF<\/a>, including an NSF CAREER Award, and IARPA. He is a member of ACM and IEEE Computer Society.<br style=\"clear: both;\" \/><br style=\"clear: both;\" \/><\/p>\n<h3 class=\"p1\"><a href=\"http:\/\/www.bu.edu\/hic\/files\/2014\/05\/12-5872-MATHSTATS-1831.jpg\"><img loading=\"lazy\" src=\"http:\/\/www.bu.edu\/hic\/files\/2014\/05\/12-5872-MATHSTATS-1831.jpg\" alt=\"MATHSTATS\" class=\" wp-image-3041 alignleft\" width=\"150\" height=\"200\" \/><\/a><\/h3>\n<h4 class=\"p1\"><strong>Orran Krieger<\/strong><br \/>\nBoston University<\/h4>\n<p><a href=\"http:\/\/www.bu.edu\/cci\/okrieg\/\">Orran Krieger<\/a> founded the Center for Cloud Innovation in the Spring of 2013. He is a Resident Fellow of the <a target=\"_blank\" title=\"Hariri Institute\" href=\"http:\/\/bu.edu\/hic\">Hariri Institute<\/a> and a Professor of the Practice at the Department of Electrical and Computer Engineering\u00a0at Boston University. Current projects include the <a target=\"_blank\" title=\"Massachusetts Open Cloud\" href=\"http:\/\/www.bu.edu\/cci\/files\/2012\/11\/MOC.pdf\">Massachusetts Open Cloud<\/a>, and EbbRT, a new operating system for cloud computing.\u00a0 His previous work includes vCloud at VMware, and leading the Advanced Operating Systems Research Department at IBM.<br style=\"clear: both;\" \/><br style=\"clear: both;\" \/><\/p>\n<h4 class=\"p3\"><img loading=\"lazy\" src=\"http:\/\/www.bu.edu\/hic\/files\/2014\/05\/mountain_me.jpg\" alt=\"mountain_me\" class=\"size-full wp-image-2950 alignleft\" width=\"150\" height=\"200\" \/><strong>Daniel Wichs<\/strong><br \/>\nNortheastern University<\/h4>\n<p><a href=\"http:\/\/www.ccs.neu.edu\/people\/faculty\/wichs\/\">Daniel Wichs<\/a>, a professor at Northeastern University, focuses on modern cryptography, and his research interests also include computer and network security. His recent research relates to leakage resilience cryptography, which involves preventing hackers from gaining useful information from devices. He is also examining the security and integrity of data stored on the cloud rather than a private computer or network. Before joining the Northeastern faculty, <a id=\"Vinod-Vaikuntanathan\"><\/a>Professor Wichs earned his PhD in Computer Science at New York University in 2011 and was awarded a postdoctoral fellowship at the IBM Research T.J. Watson Center.<br style=\"clear: both;\" \/><br style=\"clear: both;\" \/><\/p>\n<h3 class=\"p3\"><img loading=\"lazy\" src=\"http:\/\/www.bu.edu\/hic\/files\/2014\/06\/vinod-pic.jpg\" alt=\"vinod-pic\" class=\"size-full wp-image-3204 alignleft\" width=\"150\" height=\"199\" \/><\/h3>\n<h4 class=\"p3\"><strong>Vinod Vaikuntanathan<\/strong><br \/>\nMassachusetts Institute of Technology<\/h4>\n<p><a href=\"http:\/\/people.csail.mit.edu\/vinodv\/\">Vinod Vaikuntanathan<\/a> is a Steven and Renee Finn Career Development\u00a0Assistant Professor of Computer Science at MIT. His main research\u00a0interest is in the theory and practice of Cryptography. He has played\u00a0a prominent role in the development of lattice-based cryptography,\u00a0building advanced cryptographic primitives using integer lattices;\u00a0leakage-resilient cryptography, defining and developing algorithms\u00a0resilient against adversarial information leakage; and more recently,\u00a0on the theory and practice of computing on encrypted data,\u00a0constructing powerful objects such as fully homomorphic encryption and\u00a0functional encryption. Professor Vaikuntanathan\u00a0is a recipient of the 2008 IBM Josef\u00a0Raviv Postdoctoral Fellowship, the 2009 George M. <a id=\"Nickolai-Zeldovich\"><\/a>Sprowls Award for\u00a0the best MIT Ph.D. thesis in Computer Science, the 2013 Alfred P.\u00a0Sloan Research Fellowship, a 2014 NSF CAREER award and a 2014\u00a0Microsoft Research Faculty Fellowship.<br style=\"clear: both;\" \/><br style=\"clear: both;\" \/><\/p>\n<h2 class=\"p3\"><img loading=\"lazy\" src=\"http:\/\/www.bu.edu\/hic\/files\/2014\/05\/nz-msr.jpg\" alt=\"nz-msr\" class=\"size-full wp-image-2951 alignleft\" width=\"150\" height=\"200\" \/><\/h2>\n<h4 class=\"p3\"><strong>Nickolai Zeldovich III<\/strong><br \/>\nMassachusetts Institute of Technology<\/h4>\n<p class=\"p3\"><a href=\"http:\/\/www.csail.mit.edu\/user\/1705\">Nickolai Zeldovich<\/a> is an associate professor at MIT\u2019s department of Electrical Engineering and Computer Science, and a member of the Computer Science and Artificial Intelligence Laboratory. His research interests are in building practical secure systems, from operating systems and hardware to programming languages and security analysis tools. He received his PhD from Stanford University in 2008, where he developed HiStar, an operating system designed to minimize the amount of trusted code by controlling information flow. In 2005, he co-founded MokaFive, a company focused on improving desktop management and mobility using x86 virtualization.\u00a0Professor Zeldovich received a Sloan fellowship in 2010, an NSF CAREER award in 2011, the MIT EECS Spira teaching award in 2013, and the MIT Edgerton Faculty Achievement award 2014.<\/p>\n<hr \/>\n<p><a id=\"post-docs\"><\/a><\/p>\n<h2><strong>Post-Docs<\/strong><\/h2>\n<ul>\n<li><strong>Nir Bitansky<\/strong> (2015-), working with\u00a0Shafi Goldwasser, Vinod Vaikuntanathan<\/li>\n<li><strong>Yossi Gilad<\/strong> (2015-), <span>working with\u00a0<\/span>Sharon Goldberg, Nickolai Zeldovich<\/li>\n<li><strong>Jason Hennessey<\/strong> (2014-), <span>working with\u00a0<\/span>Orran Krieger<\/li>\n<li><strong>Georgios Kellaris<\/strong> (2015-), <span>working with\u00a0<\/span>George Kollios<\/li>\n<li><strong>Ranjit Kumaresan<\/strong> (2015-), <span>working with<\/span>\u00a0Shafi Goldwasser, Vinod Vaikuntanathan<\/li>\n<li><strong>Silas Richelson<\/strong> (2015-), <span>working with<\/span>\u00a0Ran Canetti, Vinod Vaikuntanathan<\/li>\n<li><strong>Ron Rothblum<\/strong> (2015-), <span>working with<\/span>\u00a0Shafi Goldwasser, Vinod Vaikuntanathan<\/li>\n<li><strong>Alessandra Scafuro<\/strong> (2014-2016, now at NC State), <span>worked with<\/span>\u00a0Ran Canetti, Daniel Wichs<\/li>\n<li><strong>Malte Schwarzkopf<\/strong> (2015-), <span>working with<\/span>\u00a0Azer Bestavros, Frans Kaashoek, Nickolai Zeldovich<\/li>\n<li><strong>Mark Zhandry<\/strong> (2015-2016, now at Princeton), <span>worked with<\/span>\u00a0Shafi Goldwasser, Vinod Vaikuntanathan<\/li>\n<li><strong>Haibin Zhang<\/strong>\u00a0(2016-), <span>working with<\/span>\u00a0Marten van Dijk<\/li>\n<\/ul>\n<hr \/>\n<p><a id=\"students\"><\/a><\/p>\n<h2><strong>Students\u00a0(current and former)<\/strong><\/h2>\n<p><strong>Graduate students<\/strong><\/p>\n<ul>\n<li><strong>Julian Bangert<\/strong>, advisor: Nickolai Zeldovich<\/li>\n<li><strong>Itay Berman<\/strong>, advisor: Vinod Vaikuntanathan<\/li>\n<li><strong>James Cadden<\/strong>, advisor: Jonathan Appavoo<\/li>\n<li><strong>Cheng Chan<\/strong>, advisors: Shafi Goldwasser, Vinod Vaikuntanathan<\/li>\n<li><strong>Haogang Chen<\/strong>, advisors: Frans Kaashoek, Nickolai Zeldovich<\/li>\n<li><strong>Yilei Chen<\/strong>,\u00a0advisor: Ran Canetti<\/li>\n<li><strong>Aloni Cohen<\/strong>, advisors: Shafi Goldwasser, Vinod Vaikuntanathan<\/li>\n<li><strong>Victor Costan<\/strong>, advisor: Srini Devadas<\/li>\n<li><strong>Akshay Degwekar<\/strong>, advisor: Vinod Vaikuntanathan<\/li>\n<li><strong>Han Dong<\/strong>, advisor: Jonathan Appavoo<\/li>\n<li><strong>Christopher W. Fletcher<\/strong>, advisor: Srini Devadas<\/li>\n<li><strong>Wil Koch<\/strong>, advisors: Azer Bestavros, Marten van Dijk<\/li>\n<li><strong>Akshay Degwekar<\/strong>,\u00a0advisor: Vinod Vaikuntanathan<\/li>\n<li><strong>Christopher Fletcher<\/strong>, advisors: Srini Devadas, Marten van Dijk<\/li>\n<li><strong>Jon Gjengset<\/strong>, advisor: Nickolai Zeldovich<\/li>\n<li><strong>Sergey Gorbunov<\/strong>,\u00a0\u00a0advisor: Vinod Vaikuntanathan<\/li>\n<li><strong>Syed Kamran Haider<\/strong>, advisor: Marten van Dijk<\/li>\n<li><strong>Justin Holmgren<\/strong>, advisor: Vinod Vaikuntanathan<\/li>\n<li><strong>Jelle van den Hooff<\/strong>, advisor: Frans Kaashoek<\/li>\n<li><strong>Zahra Jafargholi<\/strong>, advisor: Daniel Wichs<\/li>\n<li><strong>Chenglu Jin<\/strong><span>, advisor: Marten van Dijk<\/span><\/li>\n<li><strong>Alex Konradi<\/strong>, advisor: Frans Kaashoek<\/li>\n<li><strong>Albert Kwon<\/strong>,\u00a0advisors: Srini Devadas, Marten van Dijk<\/li>\n<li><strong>David Lazar<\/strong>, advisor: Nickolai Zeldovich<\/li>\n<li><strong>Ilia Lebedev<\/strong>,\u00a0advisor: Srini Devadas<\/li>\n<li><strong>Tianren Liu<\/strong>,\u00a0advisor: Vinod Vaikuntanathan<\/li>\n<li><strong>Hoda Maleki<\/strong><span>, advisor: Marten van Dijk<\/span><\/li>\n<li><strong>Aanchal Malhotra<\/strong>, advisor: Sharon Goldberg<\/li>\n<li><strong>Xianrui Meng<\/strong>, advisor: George Kollios<\/li>\n<li><strong>Omer Paneth<\/strong>, advisor: Ran Canetti<\/li>\n<li><strong>Sunoo Park<\/strong>, advisor: Shafi Goldwasser<\/li>\n<li><strong>Oxana Poburinnaya<\/strong>,\u00a0advisor: Ran Canetti<\/li>\n<li><strong>Reza Rahaeimehr<\/strong>, advisor: Marten van Dijk<\/li>\n<li><strong>Ling Ren<\/strong>,\u00a0advisors: Srini Devadas, Marten van Dijk<\/li>\n<li><strong>Dan Schatzberg<\/strong>, advisor: Jonathan Appavoo<\/li>\n<li><strong>Sahil Tikale<\/strong>, advisor: Orran Krieger<\/li>\n<li><strong>Saeed Valizadeh<\/strong><span>, advisor: Marten van Dijk<\/span><\/li>\n<li><strong>Prashant Vasudevan<\/strong>,\u00a0advisor: Vinod Vaikuntanathan<\/li>\n<li><strong>Nikolaj Volgushev<\/strong>, advisor: Azer Bestavros<\/li>\n<li><strong>Frank Wang<\/strong>, advisor: Nickolai Zeldovich<\/li>\n<\/ul>\n<p><strong>Undergraduate students<\/strong><\/p>\n<ul>\n<li><strong>Issac E. Cohen<\/strong>, advisor: Sharon Goldberg<\/li>\n<li><strong>Yanni Coroneos<\/strong>, advisor: Frans Kaashoek<\/li>\n<li><strong>Andres Erbsen<\/strong>, advisors: Frans Kaashoek, Nickolai Zeldovich<\/li>\n<li><strong>Kyle Hogan<\/strong>, advisors: Ran Canetti, Mayank Varia<\/li>\n<li><strong>Daniel Ziegler<\/strong>,\u00a0<span>advisors: Frans Kaashoek, Nickolai Zeldovich<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Project Lead Project Director Principal Investigators Post-Docs Students Project Lead Ran Canetti, Project Lead Boston University Ran Canetti\u00a0is the lead principal investigator on MACS: A Modular Approach to Cloud Security.\u00a0He is a professor of Computer Science at Boston University and the director of the Center for Reliable Information System and Cyber Security (RISCS).\u00a0Canetti\u2019s research interests [&hellip;]<\/p>\n","protected":false},"author":10066,"featured_media":0,"parent":0,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"page-templates\/no-sidebars.php","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/macs\/wp-json\/wp\/v2\/pages\/20"}],"collection":[{"href":"https:\/\/www.bu.edu\/macs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/macs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/macs\/wp-json\/wp\/v2\/users\/10066"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/macs\/wp-json\/wp\/v2\/comments?post=20"}],"version-history":[{"count":50,"href":"https:\/\/www.bu.edu\/macs\/wp-json\/wp\/v2\/pages\/20\/revisions"}],"predecessor-version":[{"id":670,"href":"https:\/\/www.bu.edu\/macs\/wp-json\/wp\/v2\/pages\/20\/revisions\/670"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/macs\/wp-json\/wp\/v2\/media?parent=20"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}