skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Jois, Tushar M"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. The persistent under-representation of students from groups historically underrepresented in Computer Science and Engineering (CS&E) programs presents a significant challenge to achieving diversity within the field. A workforce with diverse experiences and perspectives is essential for creating innovations that serve all mem- bers of society. Existing documented eorts to broaden diversity in CS&E are time-intensive (multi-week programs) and do not quan- tify attraction to graduate studies. This paper aims to bridge that gap by presenting and evaluating a detailed design for a one-day workshop that includes presentations from research professors, hands-on cybersecurity demos, a panel discussion with current and recent graduate students in CS&E, and a participation survey. By engaging students historically under- represented in CS&E in the topic of graduate school, we aim to increase the diversity of students who apply to and attend graduate school, and ultimately enter the workforce through industry or through the professoriate, thus making the field more diverse and representative of varied perspectives. We held the aforementioned workshop at a Hispanic-Serving Institution in April 2024. The event successfully attracted members of historically under-represented groups. Our survey results show that 78% of the participants agreed or strongly agreed that the event increased their interest in graduate school, 72% were more likely to seek further information about attending graduate school, and 67% of the participants had an increased interest in CS&E research. Our experience shows that one-day events focused on engaging students in the topic of graduate school in CS&E can positively impact attendee’s interest in graduate school and provide valuable information about the application process and graduate school experience. 
    more » « less
    Free, publicly-accessible full text available February 12, 2026
  2. With 'smart' technology becoming more prevalent in homes, computing is increasingly embedded into everyday life. The benefits are well-advertised, but the risks associated with these technologies are not as clearly articulated. We aim to address this gap by educating community members on some of these risks, and providing actionable advice to mitigate risks. To this end, we describe our efforts to design and implement a hands-on workshop for the public on smart-home security and privacy. Our workshop curriculum centers on the smart-home device lifecycle: obtaining, installing, using, and removing devices in a home. For each phase of the lifecycle, we present possible vulnerabilities along with preventative measures relevant to a general audience. We integrate a hands-on activity for participants to put best-practices into action throughout the presentation. We ran our workshop at a science museum in June 2023, and we used participant surveys to evaluate the effectiveness of our curriculum. Prior to the workshop, 38.8% of survey responses did not meet learning objectives, 22.4% partially met them, and 38.8% fully met them. After the workshop, only 9.2% of responses did not meet learning objectives, while 29.6% partially met them and 61.2% fully met them. Our experience shows that consumer-focused workshops can aid in bridging information gaps and are a promising form of outreach. 
    more » « less
  3. Abstract Mobile devices have become an indispensable component of modern life. Their high storage capacity gives these devices the capability to store vast amounts of sensitive personal data, which makes them a high-value target: these devices are routinely stolen by criminals for data theft, and are increasingly viewed by law enforcement agencies as a valuable source of forensic data. Over the past several years, providers have deployed a number of advanced cryptographic features intended to protect data on mobile devices, even in the strong setting where an attacker has physical access to a device. Many of these techniques draw from the research literature, but have been adapted to this entirely new problem setting. This involves a number of novel challenges, which are incompletely addressed in the literature. In this work, we outline those challenges, and systematize the known approaches to securing user data against extraction attacks. Our work proposes a methodology that researchers can use to analyze cryptographic data confidentiality for mobile devices. We evaluate the existing literature for securing devices against data extraction adversaries with powerful capabilities including access to devices and to the cloud services they rely on. We then analyze existing mobile device confidentiality measures to identify research areas that have not received proper attention from the community and represent opportunities for future research. 
    more » « less