Nick Feamster, assistant professor in the School of Computer Science and the Georgia Tech Information Security Center in the College of Computing, has been recognized as two of the nation’s top young scientists with a Presidential Early Career Award for Scientists and Engineers (PECASE). The ceremony was held Dec. 19 at the White House.
The PECASE program recognizes outstanding scientists and engineers who, early in their careers, show exceptional potential for leadership at the frontiers of knowledge. This Presidential Award is the highest honor bestowed by the U.S. government on scientists and engineers beginning their careers.
“I’m delighted that the achievements and extraordinary potential of these two exceptional faculty members are being recognized by the National Science Foundation and by the President of the United States,” said Interim President Gary Schuster. “This is outstanding news for them—a PECASE award and the accompanying support can have a lasting positive effect on a research career.
Nick Feamster is a professor in the Department of Computer Science at Princeton University. Before joining the faculty at Princeton, he was a professor in the School of Computer Science at Georgia Tech. He received his Ph.D. in Computer science from MIT in 2005, and his S.B. and M.Eng. degrees in Electrical Engineering and Computer Science from MIT in 2000 and 2001, respectively. His research focuses on many aspects of computer networking and networked systems, including the design, measurement, and analysis of network routing protocols, network operations and security, and anonymous communication systems. In December 2008, he received the Presidential Early Career Award for Scientists and Engineers (PECASE) for his contributions to cybersecurity, notably spam filtering. His honors include the Technology Review 35 "Top Young Innovators Under 35" award, a Sloan Research Fellowship, the NSF CAREER award, the IBM Faculty Fellowship, and award papers at SIGCOMM 2006 (network-level behavior of spammers), the NSDI 2005 conference (fault detection in router configuration), Usenix Security 2002 (circumventing web censorship using Infranet), and Usenix Security 2001 (web cookie analysis).