Adam Aviv

Photo of Adam Aviv
Title:
Associate Professor
Office:
SEH 5810 | Office Hours: by appointment
Phone:
202-994-6569
Email:
[email protected]
Website:
adamaviv.com

Adam J. Aviv is an Associate Professor of Computer Science at the George Washington University. He has broad research interests in the area of computer- and cyber-security and privacy, including topics such as network security, mobile security, applied cryptography, and usable security and privacy. Most recently, he has focused on topics surrounding human factors in security surrounding mobile devices and authentication, whereby we consider how human choice, perceptions, and actions influence the security of systems. 

 

  • Ph.D. Computer and Information Science, University of Pennsylvania
  • M.S.E. Computer and Information Systems, University of Pennsylvania
  • B.S.E. Computer Science, Columbia University
  • Usable Security and Privacy
  • Computer Security
  • Mobile Authentication and Security
  • Network Security

Sample Publications: 

  • Flynn Wolf, Adam J. Aviv, and Ravi Kuber. “Pretty Close to a Must-Have:” Balancing Usability Desire and Security Concern in Biometric Adoption. To appear in the proceedings of the Conference on Human Factors in Computing Systems (CHI’19). April 2019.
  • Adam J. Aviv, Flynn Wolf, and Ravi Kuber. Comparing Video Based Shoulder Surfing with Live Simulation. In the proceedings of the Annual Computer Security Applications Conference. (ACSAC’18). Dec 2018.
  • Anrin Chakraborti, Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche, Radu Sion. rORAM: Efficient Range ORAM with O(log2 N) Locality. To appear in the proceedings of Symposium on the Network and Distributed Systems Security (NDSS’19). Feb 2019.
  • Adam J. Aviv, John T. Davin, Flynn Wolf, Ravi Kuber. Towards Baselines for Shoulder Surfing on Mobile Authentication. In the proceedings of the Annual Computer Security Applications Conference (ACSAC’17). Dec 2017
  • Adam J. Aviv, Daniel S. Roche, Travis Mayberry. ObliviSync: Practical Oblivious File Back and Synchronization. Symposium on Network and Distributed System Security (NDSS’17). Feb 2017.
  • John Sonchack, Anurag Dubey, Adam J. Aviv, Jonathan M. Smith, Eric Keller: Timing-based reconnaissance and defense in software-defined networks. In the proceedings of the Annual Computer Security Applications Conference (ACSAC’16). Dec 2016.
  • Daniel S. Roche, Adam J. Aviv, and Seung Geol Choi. A Practical Oblivious Map Data Structure with Secure Deletion and History Independence. In the proceedings of the IEEE Security and Privacy Symposium (S&P’16). May 2016
  • John Sonchack, Adam J. Aviv, Eric Keller, and Jonathan M. Smith. Enabling Practical Software Defined Network Security Applications with OFX. In the proceedings of the Network and Distributed Systems Security Symposium (NDSS’16). Feb 2016
  • Adam J. Aviv, Devon Budzitowski, and Ravi Kuber. Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs 4x4 Grid Sizes for Android’s Pattern Unlock. In the proceedings of the Annual Computer Security Applications Conference (ACSAC’15). Dec 2015.
  • Adam J. Aviv and Dane Fichter. Understanding Visual Perceptions of Usability and Security of Android’s Graphical Password Pattern. In the proceedings of the Annual Computer Security Applications Conference (ACSAC’14). Dec 2014