Steve Chapin

Steve Chapin

Associate Professor

Electrical Engineering & Computer Science

Degree(s):

  • Ph. D.

Research Interests:

  • Computer security
  • Operating and distributed systems
  • Networking
  • Cloud computing
  • Smart grid security

Current Research:

Dr. Chapin’s research can be broadly described as building secure systems. His work spans applied areas (operating system kernel security, program monitoring, web application security) and formal methods, system modeling, and automated theorem proving. He is currently working to develop tools and processes for constructing software systems with verifiable assurance properties. One example of this work is the Provable Assurance Properties Of Operating System Environments (PAPOOSE) project, which is developing microkernel operating systems for research and educational use. Another example is the Smart, Secure EV Charging project, which is designing next-generation charging and discharging protocols for electric vehicles in the deregulated smart grid.

Teaching Interests:

  • Operating systems
  • Networking
  • Security
  • Cryptography
  • Systems assurance

Select Publications:

K. Jayaraman, V. Ganesh, M. V. Tripunitara, M. C. Rinard, and S. J. Chapin, “Automatic Error Finding in Access-Control Policies,” ACM Conference on Computer and Communications Security 2011, pp. 163–174.

P. G. Talaga and S. J. Chapin, “Towards a Guaranteed (X)HTML Compliant Dynamic Web Application,” WEBIST (Selected Papers) 2011, Lecture Notes in Business Information Processing 101 Springer, 2012, ISBN 978-3-642-28081-8, pp.103–115.

K. Jayaraman, G. Lewandowski, P. G. Talaga, and S. J. Chapin, “Enforcing Request Integrity in Web Applications,” DBSec 2010, pp. 225–240.

K. Jayaraman, W. Du, B. Rajagopalan, and S. J. Chapin, “Escudo: A fine-grained protection model for web browsers,” 2010 International Conference on Distributed Computing Systems (ICDCS), 2010, pp. 231–240.

H. Xu and S. J. Chapin, “Address-Space Layout Randomization Using Code Islands,” Journal of Computer Security, Vol. 17, No. 3, 2009