Jonathan Voris

Adjunct Assistant Professor
Postdoctoral Research Scientist
Columbia University
Department of Computer Science
530 West 120th Street
CEPSR Room 612
New York, NY 10027
jvoris at cs dot columbia dot edu

PGP KeyPGP Public Key

Jon isn't here at the moment. He's probably off running one of those experiments he seems to find so interesting. I'm just a web server, but fortunately Jon instructed me to provide the following information to anyone who might come looking for him.

Jon currently has appointments as an adjunct assistant professor and a postdoctoral research scientist at Columbia University. He received his Ph.D. from the Department of Computer Science and Engineering at Polytechnic Institute of NYU in Brooklyn, New York. His doctoral studies were funded by a Graduate Assistance in Areas of National Need fellowship.

He graduated with a Bachelor's Degree in Computer Science from Stevens Institute of Technology in 2006 and obtained a Computer Science Master's Degree from Stevens in 2007. Prior to his academic career, Jon worked as a Software Engineer and Network Manager for companies in the New York metropolitan area.


Research

Jon is interested in improving security and privacy, particularly that of wireless, ubiquitous, and embedded systems. Jon is especially fascinated by RFID technology. He also investigates ways to improve the usability of mobile devices. Jon has recently been studying techniques to combat insider threats as part of the DARPA Active Authentication project. In a nutshell, Jon's research objective is to make the next generation of computers safer and easier to use to allow people to benefit from their full potential.

Jon works in Columbia University's Intrusion Detection Systems Lab with Professor Salvatore Stolfo.


Teaching

Jon has served as an Instructor for the following courses:

Columbia University:
COMS W4701 - Artificial Intelligence [Fall 2013]
Introduction to Programming in C - High School Summer Program [Summer 2013]
Introduction to Programming in C - High School Summer Program [Summer 2012]

He also taught students as a Teaching Assistant for these classes:

Columbia University:
COMS W4701 - Artificial Intelligence [Spring 2013]

Polytechnic Institute of NYU:
CS 6813 - Information Security and Privacy [Fall 2010]
CS 6813 - Information Security and Privacy [Fall 2008]

Stevens Institute of Technology:
CS 284 - Data Structures and Algorithms I [Spring 2006]
CS 115 - Introduction to Computer Science [Fall 2005]
CS 105 - Introduction to Scientific Computing [Fall 2004]


Publications and Presentations

Journal Papers:

  1. Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks
    Tzipora Halevi, Haoyu Li, Di Ma, Nitesh Saxena, Jonathan Voris, and Tuo Xiang. IEEE Transactions on Emerging Topics In Computing (TETC), 2013.

  2. Data Remanence Effects on Memory Based Entropy Collection for RFID Systems
    Nitesh Saxena and Jonathan Voris. International Journal of Information Security (IJIS), 2011.

Conference Proceedings:

  1. An Investigation of the Usability of a Game for Secure Wireless Device Association
    Alexander Gallego, Nitesh Saxena, and Jonathan Voris. 6th International Conference on Computer Games, Multimedia, and Allied Technologies (CGAT), 2013.

  2. Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing
    Alexander Gallego, Nitesh Saxena, and Jonathan Voris. 17th International Conference on Financial Cryptography and Data Security (FC), 2013.

  3. Exploring Mobile Proxies for Better Password Authentication
    Nitesh Saxena and Jonathan Voris. 14th International Conference on Information and Communications Security (ICICS), 2012.

  4. Sensing-Enabled Defenses to RFID Unauthorized Reading and Relay Attacks without Changing the Usage Model
    Tzipora Halevi, Sein Lin, Di Ma, Anudath Prasad, Nitesh Saxena, Jonathan Voris, and Tuo Xiang. 10th IEEE International Conference on Pervasive Computing and Communication (PerCom), 2012.

  5. Playful Security: A Computer Game for Secure Wireless Device Pairing
    Alexander Gallego, Nitesh Saxena, and Jonathan Voris. 16th International Conference on Computer Games (CGAMES), 2011.

  6. Accelerometers and Randomness: Perfect Together
    Jonathan Voris, Nitesh Saxena, and Tzipora Halevi. 4th ACM Conference on Wireless Network Security (WiSec), 2011.

  7. Vibrate-to-Unlock: Mobile Phone Assisted User Authentication to Multiple Personal RFID Tags
    Nitesh Saxena, M. Borhan Uddin, Jonathan Voris, and N. Asokan. 9th IEEE International Conference on Pervasive Computing and Communications (PerCom), 2011.

  8. Universal Device Pairing using an Auxiliary Device
    Nitesh Saxena, M. Borhan Uddin, and Jonathan Voris. 4th Symposium on Usable Privacy and Security (SOUPS), 2008.

Workshop Proceedings:

  1. Lost in Translation: Improving Decoy Documents via Automated Translation
    Jonathan Voris, Nathaniel Boggs, and Salvatore Stolfo. 1st IEEE Workshop on Research for Insider Threat (WRIT) co-located with the 33rd IEEE Symposium on Security and Privacy (SSP), 2012.

  2. Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model
    Nitesh Saxena and Jonathan Voris. 6th Workshop on RFID Security and Privacy (RFIDSec), 2010.

  3. Accelerometer Based Random Number Generation on RFID Tags
    Nitesh Saxena and Jonathan Voris. 1st Workshop on Wirelessly Powered Sensor Networks and Computational RFID (WISP Summit) co-located with the 7th ACM Conference on Embedded Networked Sensor Systems (SenSys), 2009.

  4. We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags
    Nitesh Saxena and Jonathan Voris. 5th Workshop on RFID Security and Privacy (RFIDSec), 2009.

  5. Pairing Devices with Good Quality Output Interfaces
    Nitesh Saxena and Jonathan Voris. 1st International Workshop on Wireless Security and Privacy (WiSP) co-located with the 28th International Conference on Distributed Computing Systems (ICDCS), 2008.

  6. Performance Evaluation of a Privacy-Preserving Policy Reconciliation Protocol
    Jonathan Voris, Sotiris Ioannidis, Susanne Wetzel, and Ulrike Meyer. 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), 2007.

Book Chapters:

  1. Bait and Snitch: Defending Computer Systems with Decoys
    Jonathan Voris, Jill Jermyn, Angelos Keromytis, and Salvatore Stolfo. Cyber Infrastructure Protection, Volume 3, Strategic Studies Institute (SSI), 2014.

Presentations:

  1. Bait and Snitch: Using Deception to Defend Computer Systems
    Jonathan Voris, Angelos Keromytis, and Salvatore Stolfo. 13th Biannual New York Security and Privacy Day (S&P Day), 2013.

  2. Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing
    Alexander Gallego, Nitesh Saxena, and Jonathan Voris. 17th International Conference on Financial Cryptography and Data Security (FC), 2013.

  3. Exploring Mobile Proxies for Better Password Authentication
    Nitesh Saxena and Jonathan Voris. 14th International Conference on Information and Communications Security (ICICS), 2012.

  4. Lost in Translation: Improving Decoy Documents via Automated Translation
    Jonathan Voris, Nathaniel Boggs, and Salvatore Stolfo. 1st IEEE Workshop on Research for Insider Threat (WRIT) co-located with the 33rd IEEE Symposium on Security and Privacy (SSP), 2012.

  5. Print Me If You Dare: Firmware Modification Attacks and the Rise of Printer Malware
    Ang Cui and Salvatore Stolfo. 28th Chaos Communication Congress (28C3), 2011.

  6. Playful Security: A Computer Game for Secure Wireless Device Pairing
    Alexander Gallego, Nitesh Saxena, and Jonathan Voris. 16th International Conference on Computer Games (CGAMES), 2011.

  7. Accelerometers and Randomness: Perfect Together
    Jonathan Voris, Nitesh Saxena, and Tzipora Halevi. 4th ACM Conference on Wireless Network Security (WiSec), 2011.

  8. Vibrate-to-Unlock: Mobile Phone Assisted User Authentication to Multiple Personal RFID Tags
    Nitesh Saxena, M. Borhan Uddin, Jonathan Voris, and N. Asokan. 9th IEEE International Conference on Pervasive Computing and Communications (PerCom), 2011.

  9. Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model
    Nitesh Saxena and Jonathan Voris. 6th Workshop on RFID Security and Privacy (RFIDSec), 2010.

  10. Accelerometer Based Random Number Generation on RFID Tags
    Nitesh Saxena and Jonathan Voris. 1st Workshop on Wirelessly Powered Sensor Networks and Computational RFID (WISP Summit) co-located with the 7th ACM Conference on Embedded Networked Sensor Systems (SenSys), 2009.

  11. We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags
    Nitesh Saxena and Jonathan Voris. 5th Workshop on RFID Security and Privacy (RFIDSec), 2009.

  12. Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population
    Shai Halevi, Tzipora Halevi, and Nitesh Saxena. 5th Workshop on RFID Security and Privacy (RFIDSec), 2009.

  13. User-Assisted Secure Association of Wireless Devices
    Jonathan Voris, Nitesh Saxena, Ambarish Karole, Ramnath Prasad, M. Borhan Uddin, Stanislaw Jarecki, Gene Tsudik, Ersin Uzun, and N. Asokan. 5th Wireless Internet Center for Advanced Technology (WICAT) Research Review, 2009.

  14. Universal Device Pairing using an Auxiliary Device
    Nitesh Saxena, M. Borhan Uddin, and Jonathan Voris. 4th Symposium on Usable Privacy and Security (SOUPS), 2008.

  15. Performance Evaluation of a Privacy-Preserving Policy Reconciliation Protocol
    Jonathan Voris, Sotiris Ioannidis, Susanne Wetzel, and Ulrike Meyer. 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), 2007.

Posters:

  1. Big Fake Data: Differentiating Masqueraders from Legitimate Users using Decoy Technology
    Jonathan Voris, Jill Jermyn, Nathaniel Boggs, Angelos Keromytis, and Salvatore Stolfo. Columbia University Institute for Data Sciences and Engineering (IDSE) Inaugural Symposium, 2013.

  2. Security Through Entertainment: Experiences Using a Memory Game for Secure Device Pairing
    Alexander Gallego, Nitesh Saxena, and Jonathan Voris. 3rd Annual Center for Advanced Technology in Telecommunications (CATT) Research Review, 2010.

  3. Security Through Entertainment: Experiences Using a Memory Game for Secure Device Pairing
    Alexander Gallego, Nitesh Saxena, and Jonathan Voris. 6th Symposium on Usable Privacy and Security (SOUPS), 2010.

  4. We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags
    Nitesh Saxena and Jonathan Voris. 8th Biannual New York Security and Privacy Day (S&P Day), 2009.

  5. Treat ’Em Like Other Devices: User Authentication of Multiple Personal RFID Tags
    Nitesh Saxena, M. Borhan Uddin, and Jonathan Voris. 8th Biannual New York Security and Privacy Day (S&P Day), 2009.

  6. We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags
    Nitesh Saxena and Jonathan Voris. 6th Annual Polytechnic Institute of NYU Cyber Security Awareness Week (CSAW), 2009.

  7. We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags
    Nitesh Saxena and Jonathan Voris. 2nd Annual Center for Advanced Technology in Telecommunications (CATT) Research Review, 2009.

  8. Treat ’Em Like Other Devices: User Authentication of Multiple Personal RFID Tags
    Nitesh Saxena, M. Borhan Uddin, and Jonathan Voris. 5th Symposium on Usable Privacy and Security (SOUPS), 2009.

  9. Towards a Universal Device Pairing Scheme
    Ramnath Prasad, Nitesh Saxena, M. Borhan Uddin, and Jonathan Voris. 3rd Semiannual Wireless Internet Center for Advanced Technology (WICAT) Research Review, 2008.

  10. Secure Device Pairing using Human Comparable Patterns
    Ramnath Prasad, Nitesh Saxena, and Jonathan Voris. 4th Annual Polytechnic Institute of NYU Cyber Security Awareness Week (CSAW), 2007.

  11. Secure Device Pairing using "Human-Comparable" Patterns
    Ramnath Prasad, Nitesh Saxena, and Jonathan Voris. Center for Advanced Technology in Telecommunications (CATT) 25th Anniversary, 2007.

  12. Performance Evaluation of a Privacy-Preserving Policy Reconciliation Protocol
    Jonathan Voris, Sotiris Ioannidis, Susanne Wetzel, and Ulrike Meyer. 4th Biannual New York Security and Privacy Day (S&P Day), 2007.


Miscellaneous

Jon also: