Paolina Centonze, Ph.D.
Associate Professor of Computer Science
Cyber Security Coordinator
- Office:
- Murphy Center, Room 113H
- Phone:
- (914) 633-2562 (914) 633-2562
- Email:
- pcentonze@iona.edu
Degrees:
- Ph.D. in Mathematics, New York University (NYU)
- MS, Computer Science, New York University (NYU)
- BS, Computer Science, St. John's University
Dr. Paolina Centonze teaches courses in software security, web security, mobile security, cloud security, big data security and program analysis for security. Her research interests include language-based security, mobile computing and cyber security.
Paolina Centonze, Ph.D., is an associate professor in the Computer Science Department at Iona University, New Rochelle, New York, conducting research in the area of cybersecurity. She is the Managing Director of the Cybersecurity Program at Iona University, which she created in 2011. This program has been approved by the New York State Education Department. Prof. Centonze has also been responsible for the National Centers of Academic Excellence in Cyber Operations (CAE-CO) designation, a National Security Agency (NSA) accreditation for the BS and BA degrees in Computer Science with a Concentration in Cybersecurity. In addition to teaching and conducting research, she is responsible for cybersecurity course design and development, program accreditation, student advisement, student research activities, collaboration with external institutions, and coordination with other programs and departments across the University.
Prof. Centonze received her Ph.D. in Mathematics and M.S. degree in Computer Science from New York University in 2008 and 2005, respectively, and her B.S. degree Summa Cum Laude from St. John’s University, New York in 2003.
Prof. Centonze’s expertise in Cybersecurity has roots in the industry too as she was a Research Staff Member at the IBM Thomas J. Watson Research Center in Yorktown Heights, New York (2005-2010). She was also an Adjunct Professor of Computer Science at Fordham University, New York (2015-2016).
Prof. Centonze is the author of 24 scientific journal articles and conference papers, and the inventor of 14 patents in the area of Cybersecurity, all filed and granted by the US Patent and Trademark Office.
- Ph.D. in Mathematics with a minor in Computer Science, New York University, 2008
- Ph.D. thesis: An Algebra for Access Control
- Master of Science Degree in Computer Science, New York University, 2005
- M.S. degree thesis: Static Analysis for J2EE Role-Based Access Control Policy Validation
- Recipient of merit-based scholarship comprehensive of full-tuition remission
- Bachelor of Science Degree Summa cum Laude in Computer Science with a Minor in Mathematics, St. John’s University, New York, May 2003
- GPA: 3.98
- Full, merit-based scholarship and full-tuition remission
Iona University, Computer Science Department
08/11 – Now, Managing Director, Cybersecurity Program
08/18 – Now, Associate Professor, Tenured
08/12 – 08/18, Assistant Professor, Tenure Track
New York University
05/10 - 08/10, Adjunct Professor, Computer Science Department
IBM Research
05/05 - 04/10, Research Staff Member, Department of Cybersecurity, IBM Thomas J. Watson Research Center, Yorktown Heights, NY
New York University, Computer Science Department
07/03 - 05/05
- Graduate Research Assistant and Teaching Assistant at New York University
- Member of the IBM T. J. Watson Research Center and New York University joint team constructing mathematical models of programs using IBM Research’s Watson Libraries for Analysis (WALA) static analysis engine for automatic detection of security vulnerabilities in code
- Timothy Strowbridge, Paolina Centonze. 3D Printing Security: Using UUID-based Text Watermarking to Secure GCODE Files. International Journal of Cyber-Security and Digital Forensics (IJCSDF), Vol. 11, No. 2, 2023, pp. 11-19
- Jason Meza, Paolina Centonze. Blueprint Key: A Tool for a Novel Layer of XML Encryption. International Journal of Cyber-Security and Digital Forensics (IJCSDF), Vol. 9, No. 2, 2023, pp. 102-112
- Ileana Palesi, Paolina Centonze. Comparative Malware Testing Analyses for Android Mobile Apps. International Journal of Cyber-Security and Digital Forensics (IJCSDF), Vol. 9, No. 1, 2023, pp. 55-70
- Paolina Centonze. Security and Privacy Frameworks for Access Control of Big Data Systems. Full research paper. In the Proceedings of the 5th International Conference on Artificial Intelligence and Security (ICAIS 2019), New York University, New York, USA. July 26-28, 2019
- Paolina Centonze. Security and Privacy Frameworks for Access Control of Big Data Systems. In the Proceedings of the Computers, Materials & Continua Journal (CMC), Vol. 59, No. 2, pp. 361-374, 2019
- Michael Nelson, Paolina Centonze. GPS Spoofing for Android and iOS Mobile Systems. The Fourteenth International Conference on Internet Monitoring and Protection (ICIMP), Nice, France, 2019
- Chelsea Ramsingh, Paolina Centonze. Program Analysis for Database Injections. International Journal of Computers and Technology (IJCT). ISSN-2277-3061, Vol. 16, No. 6, pages 6977-6987, September 2017
- Stephen Rodriguez, Paolina Centonze. Multi-Layered Dynamic Encryption Security Scheme for Cloud Data Storage. International Journal of Computers and Technology (IJCT). ISSN-2277-3061, Vol. 16, No. 3, pages 6233-6239, June 2017.
- Stephen Rodriguez, Paolina Centonze. Dynamic Encryption Key Security Scheme (DEKSS) for Mobile and Cloud Systems. Proceedings of the Fourth IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft), Buenos Aires, Argentina, May 2017
- Paolina Centonze. Cloud Auditing and Compliance. Peer-reviewed Book Chapter, included in the Book: Security, Privacy, and Digital Forensics in the Cloud and Big Data Era, Editors: Lei Chen and Hassan Takabi, John Wiley and Sons (USA) and HEP (China), November 2017
- Walter Squires, Paolina Centonze. Cross-platform Access-rights Analysis of Mobile Applications. Proceedings of the 3rd IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft 2016), Austin, Texas, May 201.
- Marco Pistoia, Omer Tripp, Paolina Centonze, Pietro Ferrara. Detection, Correction and Visualization of Security Vulnerabilities in Mobile Apps. Proceedings of the Third International Workshop on Mobile Development Lifecycle (MobileDeLi), Pittsburgh, PA, October 2015
- Paolina Centonze, Marco Pistoia, Omer Tripp. Access-rights Analysis in the Presence of Subjects. Proceedings of the 29th European Conference on Object-Oriented Programming (ECOOP), Prague, Czech Republic, July 2015
- Marco Pistoia, Omer Tripp, Paolina Centonze, Joseph W. Ligman. Labyrinth: Mobile Data-leakage Detection with Visually Configurable Confidentiality Sources. Proceedings of the 16th IEEE International Conference on Mobile Data Management (MDM), Pittsburgh, PA, June 2015
- Omer Tripp, Marco Pistoia, Paolina Centonze. Application and User-Sensitive Privacy Enforcement in Mobile Systems. Proceeding of the Second ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft), Florence, Italy, May 2015
- Karthik Sourirajan, Paolina Centonze, Mary Helander, Kaan Katircioglu. Carbon Management in Assembly Manufacturing Logistics. IBM Journal on Research and Development, Yorktown Heights, NY, Vol. 53, No. 3, 2009
- Anshul Sheopuri, Jose Gomes, Sai Zeng, Paolina Centonze, Ioana Boier-Martin. A Heuristic to Enable Auditing Decisions in Travel and Entertainment Expense Management. In Poster Proceedings of the Third Annual Machine Learning Symposium. The New York Academy of Sciences, New York, NY, October 2008
- Paolina Centonze. An Algebra for Access Control. Ph.D. Dissertation. New York University (NYU), Department of Mathematics, May 2008
- Paolina Centonze, Robert J. Flynn, Marco Pistoia. Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), Miami Beach, FL, December 2007
- Paolina Centonze, Gleb Naumovich, Stephen J. Fink, Marco Pistoia. Role-Based Access Control Consistency Validation. In Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2006), Portland, ME, July 2006
- Gleb Naumovich and Paolina Centonze. Static Analysis of Role-Based Access Control in J2EE Applications. ACM SIGSOFT Software Engineering Notes, 29(5):1-10, September 2004. Also in Proceedings of the Workshop on Testing, Analysis and Verification of Web Services (TAV-WEB 2004), co-located with ISSTA 2004, Boston, MA, July 2004
- Paolina Centonze. Static Analysis for J2EE Role-Based Access Control Policy Validation. Master of Science Research Thesis. New York University, Department of Computer Science, New York, NY, May 2005
- Paolina Centonze, Marco Pistoia, Lawrence Koved. Extracting Security Role Requirements From Enterprise Applications. Security and Privacy Technology Conference, IBM T.J. Watson Research Center, Hawthorne, NY, May 2004
- Paolina Centonze, Gleb Naumovich, Stephen J. Fink, Marco Pistoia. Role-Based Access Control Consistency Validation. IBM Research Report, RC23876 (W0602-110), Yorktown Heights, NY, February 2006
- John Millar and Paolina Centonze. Examples of Using NTRU Cryptosystems in Modern Developments for 5G Authentication. Proceedings of the 37th Annual Computer Security Applications Conference (ACSAC 2021), Work In Progress (WiP) track, December 2021
- Paolina Centonze. Security Flows in Apache Dig Data System. Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC), San Juan, Puerto Rico, December 2018
- Joshua Gitter and Paolina Centonze. Comparative Analyses and New Solutions to Reduce SQL Injections. Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC), San Juan, Puerto Rico, December 2018
- Chelsea Ramsingh and Paolina Centonze. Program Analysis for Database Injections. Proceedings of the 4th National Science Foundation (NSF) Women in Cybersecurity (WiCyS) Conference, Tucson, AZ, March 2017
- Paolina Centonze. Cyber Threats Attacks, Challenges and Analyses in the Dig Data Era. Full Day Professional Tutorial. Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC), Orlando, FL, December 2017
- John Rocco and Paolina Centonze. Static Detection of Integrity and Confidentiality in Mobile Applications. Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC 2016), Work in Progress (WiP) track. Los Angeles, CA, December 2016
- Stephen Rodriguez and Paolina Centonze. Dynamic Encryption Strategy (DEKSS): A New Security Model for Securing Customer Data with Cloud Services. Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC 2016), Working In Progress (WiP) track. Los Angeles, CA, December 2016
- Paolina Centonze. Program Analysis and Machine Learning to Improve Security and Privacy. Tutorial Proceedings of the 32nd Annual Computer Security Applications Conference (ACSAC 2016), Los Angeles, CA, December 2016
- Paolina Centonze. Security and Privacy Analysis for Next Generation Malware. Tutorial Proceedings of the 31st Annual Computer Security Applications Conference (ACSAC 2015), Los Angeles, CA. December 2015
- Paolina Centonze. Cloud Security and Privacy. Peer-reviewed Conference Tutorial. Tutorial Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC 2014), New Orleans, LA, December 2014
- System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies. Granted as Patents No. US-9836608-B2 (December 2017), US-9607154-B2 (March 2017), US-20170039375-A1 (February 2017), US-20150089637-A1 (March 2015), US-8572727-B2 (October 2013) and US-20110126282-A1 (May 2011)
- Method and system for run-time dynamic and interactive identification software authorization requirements and privileged code locations, and for validation of other software program analysis results. Granted as Patents No. US-9449190-B2 (September 2016), US-20090007223-A1 (January 2009) and US-20070261124-A1 (November 2007)
- Static analysis for verification of software program access to secure resources for computer systems. Granted as Patents No. US-8793800-B2 (July 2014) and US-8683599-B2 (March 2014)
- Carbon management for sourcing and logistics. Granted as Patents No. US-8606621-B2 (December 2013), US-20130117061-A1 (May 2013), US-20130013367-A1 (October 2013), US-8346595-B2 (January 2013) and US-20100131316-A1 (May 2010)
- Automatic optimization of string allocations in a computer program. Granted as Patent No. US-8473899-B2 (June 2013)
- Static analysis for verification of software program access to secure resources for computer systems. Granted as Patents No. US-8381242-B2 (February 2013), US-20130031622-A1 (January 2013), US-20120331547-A1 (December 2012) and US-20120023553-A1 (January 2012)
- Unchanged Object Management. Granted as Patents No. US-20120331445-A1 (December 2012) and US-20120089962-A1 (April 2012)
- System and method for the automatic identification of subject-executed code and subject-granted access rights. Granted as Patents No. US-8332939-B2 (December 2012) and US-20080201693-A1 (August 2008)
- System and method for the automatic evaluation of existing security policies and automatic creation of new security policies. Granted as Patents No. US-8230477-B2 (July 2012) and US-20080201760-A1 (August 2008)
- System and method for the automatic verification of privilege-asserting and subject-executed code. Granted as Patents No, US-8006233-B2 (August 2011) and US-20080201688-A1 (August 2008)
- Automatic Optimization of String Allocations in a Computer Program. Granted as Patent No. US-20110145785-A1 (June 2011)
- Apparatus, System, Method and Computer Program Product for Analysis of Fraud in Transaction Data. Granted as Patent No. US-20080109272-A1 (May 2008)
- Method and system for the creation of service clients. Granted as Patent No. US-20070260737-A1 (November 2007)
- System, apparatus, and method for identifying authorization requirements in component-based systems. Granted as Patent No. US-20050262487-A1 (November 2005)
Date | Achievement |
---|---|
August 2018 |
|
May 2016 |
|
April 2015 |
|
2004-2012 |
|
Sep 2010; Dec 2008; Apr 2007 |
|
Jul 2006 |
|
May 2005 |
|
June 2004 |
|
May 2004 |
|
June 2003 |
|
May 2003, Aug. 2002, and May 2001 |
|
Mar. 2003 |
|
Aug. 2001-May 2003 |
|
Apr. 2001 |
|
Oct. 2000 |
|
Oct. 2000 |
|
May 2000 and Dec. 1999 |
|
Prof. Paolina Centonze has been the Managing Director of the Cybersecurity Program in the Computer Science Department at Iona University since 2011. In her role, Prof. Centonze directs the design and development of the Concentration in Cybersecurity programs: BA, BS, MS and 5-year BS/MS and BA/MS degrees. Under Prof. Centonze’s supervision, these programs have been approved by the New York State Education Department. Prof. Centonze has also been responsible for the National Centers of Academic Excellence in Cyber Operations (CAE-CO) designation, a National Security Agency (NSA) accreditation for the BS and BA degrees in Computer Science with a Concentration in Cybersecurity.
Below is the list of the new courses that Prof. Centonze designed, developed, taught and kept updated over the years as part of the Cybersecurity concentration programs:
- CS 455 Cybersecurity Operations
- CS 456 Web and Mobile Application Security
- CS 475 (undergraduate) and CS 777 (graduate): Computer Networks & Networking Programming
- CS 477 (undergraduate) and CS 779 (graduate): Networks Security
- CS 474 (undergraduate) and CS 775 (graduate): Mobile Application Security
- CS 315 (undergraduate) and CS 615 (graduate): Software Security
- CS 472 (undergraduate) and CS 771 (graduate): Web Application Security
- CS 409 (undergraduate) and CS 709 (graduate): Cryptography
- CS 422 (undergraduate) and CS 798 (graduate): Database Security
- CS 412 (undergraduate) and CS 712 (graduate): Program Analysis for Security
- CS 413 (undergraduate) and CS 713 (graduate): Cloud Security and Privacy
In the areas of Computer Science, Cybersecurity and Software Engineering, Dr. Centonze teaches the following courses regularly (at least once a year) at Iona University, New Rochelle, N.Y.:
- CS 143 (undergraduate): Introduction to Cybersecurity. Core University course: accessible to students at the entire University for any major and part of the core requirements
- CS 481 (undergraduate): Software Project Development: Design
- CS 482 (undergraduate): Software Project Development: Implementation
- CS 474 (undergraduate) and CS 775 (graduate): Mobile Application Security
- CS 315 (undergraduate) and CS 615 (graduate): Software Security
- CS 201 (undergraduate) and CS 500 (graduate): Computer Science I
- CS 202 (undergraduate): Computer Science II
- CS 474 (undergraduate) and CS 775 (graduate): Mobile Application Security
- CS 472 (undergraduate) and CS 771 (graduate): Web Application Security
- CS 412 (undergraduate) and CS 712 (graduate): Program Analysis for Security
- CS 413 (undergraduate) and CS 713 (graduate): Cloud Security and Privacy
- CS 143 (undergraduate): Introduction to Cyber Security as a Core College course
- CS 140 (undergraduate): Computers, Technology and Society
- CS 140 (undergraduate, Learning Community): Computers, Technology and Society. Course integrated with other arts and science courses and taught in collaboration with other faculty members from different departments
- CS 140 (undergraduate, Distance Learning): Computers, Technology and Society. Online course
Additionally, Dr. Centonze has been an Adjunct Professor at other universities, and designed, developed, updated and taught the following courses:
- CISC 6800 (graduate): Malware Analytics, Computer and Information Science Department, Fordham University, New York, 2015 and 2016
- CS 9053 (graduate): Introduction to Java, New York University, Fall 2010 semester
- CS 9163 (graduate): Application Security, New York University, Fall 2010 semester
While a graduate student, Dr. Centonze was the teaching assistant for the following courses: Linear Algebra, Theory of Computation, Algorithms I and II, Software Engineering, and Databases, New York University (NYU), 2003-2005
Prof. Centonze has been often asked to review the work of her peers in the industry and academia, particularly in the areas of Mobile Computing and Cybersecurity:
- Program Committee Memberof Industry Track ofthe 25th IEEE International Conference on Software Testing, Verification and Validation (ICST), Porto, Portugal, October 24-28, 2020
- Program Committee Member of the Research Technical Track ofthe 16th International Wireless Communications & Mobile Computing Conference (IWCMC 2020),Limassol, Cyprus, June 15-19, 2020
- Program Committee Member of the Professional Tutorial Track of the 35th Annual Computer Security Applications Conference (ACSAC), San Juan, Puerto Rico, USA. December 3-7, 2019
- Program Committee Member of the Research Technical Track, in the 4th International Symposium on Mobile Internet Security (MobiSec 2019), Taichung, Taiwan, October 17–19, 2019
- Program Committee Memberof theTools Demos and Mobile Apps and of the Technical Papers Track of the 7th ACM/IEEE International Conference on Mobile Software Engineering and Systems (MOBILESoft), Montréal, Canada, May 25-26, 2019
- Program Committee Member of the Research Technical Track of the 15th International Wireless Communications & Mobile Computing Conference (IWCMC 2019), Tangier, Morocco, June 2019
- Program Committee member of the Tool Demos and Mobile Apps Track and Technical Papers Track of the 5th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft), Gothenburg, Sweden, May 27-June 3, 2018
- Co-Chair of the Tools Demos and Mobile Apps Trackof the 4th ACM/IEEE International Conference on Mobile Software Engineering and Systems (MOBILESoft), Buenos Aires, Argentina, May 22-23, 2017
- Program Committee member of the Main Track of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft), Buenos Aires, Argentina, May 22-23, 2017
- Co-Chair of the Work In Progress (WiP) Track, Poster Track, and Professional Tutorial Track of the 33rd Annual Computer Security Applications Conference (ACSAC), Orlando, Florida, USA. December 4-8, 2017
- Reviewer of book chapter Combining Static and Dynamic Analysis and Machine Learning for Automatic Detection of Security Vulnerabilities in Mobile Apps,included in book Mobile Application Development, Usability, and Security,EditorSougata Mukherjea, IGI Global, 2016
- Reviewer of book chapter Confidentiality of Data in the Cloud: Conflicts Between Security and Cost, included in book Security, Privacy, and Digital Forensics in the Cloud and Big Data Era, editors Lei Chen and Hassan Takabi, John Wiley and Sons (USA) and HEP (China), 2016
- Reviewer of the book chapter: Risk Management and Disaster Recovery in the Cloud. Itwill be included in the Book: Security, Privacy, and Digital Forensics in the Cloud and Big Data Era, editors Lei Chen and Hassan Takabi, to be published by John Wiley and Sons (USA) and HEP (China), November 2016
- Program Committee Member of the 1st International Workshop on Mobile Development, co-located with SPLASH 2016 ACM SIGPLAN conference, Amsterdam, Netherlands,October 30 – November 4, 2016
- Program Committee Member of the Tutorial Track of the 32nd Annual Computer Security Applications Conference (ACSAC 2015), Los Angeles, California. December 5-9, 2016
- Program Committee Member of the 3rd ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft), Austin, TX, May 16-17, 2016
- Program Committee Member of the 9th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2014), Uppsala, Sweden, July 2014
- Associate Program Committee Member of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), Austria, Vienna, July 2014
- Associate Reviewer for the IBM Journal on Research and Development (an IEEE Journal), Volume 57, Issue 6, November/December 2013
- Reviewer of the book Enterprise Java Security, Addison-Wesley, Boston, MA, February 2004
- Michael Brand, Paolina Centonze. A Novel Method For Mitigation Of XML External Entity Attacks. Honors Master Thesis and Poster Presentation at the 14th Annual Iona Scholars Day, April 2023. Thesis advisor
- Stephen Rodriguez, Paolina Centonze. Dynamic Encryption Key Scheming Strategy (DEKSS): A New Security Model for Securing Customer Data within Cloud Services. Master Thesis in Computer Science, Iona University, Spring 2017. Thesis Advisor
- Chelsea Ramsingh, Paolina Centonze. Program Analysis for SQL Injections. Master Thesis in Computer Science, Iona University, Spring 2017. Thesis Advisor
- Walter Squires, Paolina Centonze. Mobile Security Analysis for Android and iOS. Peer-reviewed poster presentation to the 7th Annual Iona Scholars Day, presentation at the 2nd Annual Science Symposium, sponsored by Iona University and ConEdison, Inc., and Honors Undergraduate Thesis, Iona University, April 2016. Thesis Advisor
- Michael Brown, Paolina Centonze. A Contemporary Comparison of Comprehensive Perimeter and Authentication Techniques for Hadoop and Big Data. Master Thesis in Computer Science, peer-reviewed poster presentation at the 7th Annual Iona Scholars Day, and the 2nd Annual Science Symposium sponsored by Iona University and ConEdison, Inc., Iona University, April 2016. Thesis Advisor
- Monica Suleiman, Paolina Centonze. Ensuring Confidentiality of Personal Health Records in Cloud Services by Using Access Control. Peer-reviewed poster presentation at the Seventh Annual Iona Scholars Day, and Master Thesis in Computer Science, Iona University. Thesis Advisor
- Monica Suleiman, Paolina Centonze. Ensuring Confidentiality of Personal Health Records in Cloud Services by Using of Access Control. The 2nd Annual Science Symposium, sponsored by Iona University and ConEdison, Inc., Iona University, April 2016
- Vanessa Santana, Paolina Centonze, Security Study and Comparative Analysis of Mobile Programming Languages and Their Security Mechanisms. Peer-reviewed poster presentation to the 7th Annual Iona Scholars Day and Master Thesis in Computer Science, Iona University, April 2016. Thesis Advisor
- Walter Squires, Paolina Centonze. Deep Analysis of Mobile Applications. Honors Master Thesis Defense. February 2016. Iona University. Thesis Advisor
- Walter Squires, Paolina Centonze. Program Analysis for Android Mobile Applications. Peer-reviewed poster presentation at the 6th Annual Iona Scholars Day, Iona University, April 2015
- Walter Squires, Paolina Centonze. Permission Analysis for Android Applications. Presented at the 1st Science Symposium, Iona University, March 2015
- Kester Guischard, Paolina Centonze. Security Analysis to Identify iOS Overprivileged Applications. Peer-reviewed poster presentation at the 6th Annual Iona Scholars Day, April 2015 and at the 1st Science Symposium, Iona University, March 2015
- Paolina Centonze. Cybersecurity Skills Required for Academic Programs. Proceedings of the 5th NSF National Women in Cybersecurity (WiCyS) Conference, Chicago, IL on March 23-24th, 2018
- Paolina Centonze. Analysis of WikiCentral. Poster Presentation. IBM Academy of Technology (AoT). IBM T. J. Watson Research Center, New York, June 2009
- Paolina Centonze. The Mathematical Theory of Partially Ordered Sets and Lattices and Its Applicability to Computer Science. Seminar Series, IBM Thomas J. Watson Research Center, New York, May-September 2007 (for a total of 12 seminars)
- Paolina Centonze. Access Control Explorer (ACE). University Seminar. Department of Computer and Information Science, New York University, New York, NY, October 2007
- Paolina Centonze. Static Analysis for Role-Based Access Control Policy Validation. University Seminar, University of Maryland, Electrical and Computer Engineering Department, College Park, MD, USA, March 2007
- Paolina Centonze. Static Analysis for Role-Based Access Control Policy Validation. University Seminar, Programming Languages Research Group (PROLANGS), Rutgers University, Piscataway, NJ, USA, February 2007
- Paolina Centonze. Role-Based Access Control Consistency Validation. University Seminar., Stevens Institute of Technology, Computer Science Department, Hoboken, NJ, USA, May 2006
- Paolina Centonze. An Algebra for Access Control. University Seminar, New York University, Department of Computer and Information Science, March 2006
- Paolina Centonze. Using Static Program Analysis for Stack-Inspection- and Role-Based Access Control Systems Security. University Seminar, École Normale Supérieure, Paris, France, October 2005
- Paolina Centonze. Automatic Verification of the Security Principle of Complete Mediation Using Static Analysis. Industry Seminar. IBM T.J. Watson Research Center, New York, August 2005
- Paolina Centonze. Using Program Analysis to Extend J2EE Access Control from Methods to Data. Invited Industry Seminar. IBM T. J. Watson Research Center, Hawthorne, NY, September 2004
- Paolina Centonze. Static Analysis of Role-Based Access Control in J2EE Applications. Workshop Presentation. ACM TAV-WEB Workshop co-located with ISSTA Conference, Boston, MA, July 2004
- Paolina Centonze. J2SE and J2EE Security. University Seminar. New York University, September 2003
- Featured on News 12 in a story on international "Ransom-ware" cyber attack. Iona University, New Rochelle, N.Y. May 2017.
- Featured in the Winter 2016 issue, Iona University Magazine. Faculty Focus Interview. January 2016.
- Theory of Computation, Algorithms, Abstract Interpretation, Program Analysis, Compilers
- Language-Based Security, Cybersecurity, Mobile Security Analysis, Cloud Security and Privacy/Big Data
- Malware Analysis
- Machine Learning for Security
- Programming languages: Java, Python, PHP, JavaScript, SQL, Pascal, Fortran.
- Mobile applications (iOS and Android) and their security implications
- Databases: IBM DB2, JDBC, SQL, Alphablox
- Web design and implementation: HTML, XML, CSS, Java, JavaScript, JSON, AJAX, Flash
- Operating systems: Windows, UNIX, MacOS
- Applications: LaTeX, Microsoft Office
Dual citizenship: American and Italian
- English
- Italian (native)