Threat analysis, database privacy, and mobile device security
We study various aspects of security related to computer systems. This includes the design of secure systems; the usability, evaluation, and certification of security products; the robustness of digital watermarking algorithms; threat analysis for open networks; and database privacy. In addition, we work on making mobile devices even more secure than they are today.
Craig Costello, Cedric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, and Samee Zahur, Geppetto: Versatile Verifiable Computation, in Proceedings of the IEEE Symposium on Security and Privacy, IEEE – Institute of Electrical and Electronics Engineers, 18 May 2015.
Eric Chen, Shuo Chen, Shaz Qadeer, and Rui Wang, Securing Multiparty Online Services via Certification of Symbolic Transactions, in Proceedings of the IEEE Symposium on Security and Privacy (Oakland), IEEE – Institute of Electrical and Electronics Engineers, May 2015.
Christopher Theisen, Kim Herzig, Patrick Morrison, Brendan Murphy, and Laurie Williams, Approximating Attack Surfaces with Stack Traces, in Companion Proceedings of the 37th International Conference on Software Engineering, IEEE – Institute of Electrical and Electronics Engineers, May 2015.
Patrick Morrison, Kim Herzig, Brendan Murphy, and Laurie Williams, Challenges with Applying Vulnerability Prediction Models, in Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, ACM – Association for Computing Machinery, April 2015.
- Zero-Effort Payments
- Personalised online shopping study
- MSR Elliptic Curve Cryptography Library
- Social Analytics: From Demographics to Psychometrics
- ZQL for Privacy-Preserving Data Processing
- User behaviour on Web forms
- Research Collaboration Conferences for Women
- ECM at Work
- Cipherbase = Encrypt(Database)
- Elliptic Curve Cryptography