|We study various aspects of security related to computer systems. This includes the design of secure systems; the usability, evaluation and certification of security products; the robustness of digital watermarking algorithms; threat analysis for open networks; and database privacy. In addition, we work on making mobile devices even more secure than they are today.|
- XCG Lab Security and Cryptography GroupsThe XCG Lab Security and Cryptography teams do development, applied research, and theoretical research in the fields of systems security and cryptography. These teams include the Cryptography Research team, the Security & Cryptography team, and the Systems Incubation team.
- Social Analytics: From Demographics to PsychometricsWe investigate how people's behaviour online can be characterized in terms of psychometric measurements such as the Big-5 personality traits openness, conscientiousness, extraversion, agreeableness, and neuroticism as well as general intelligence and satisfaction-with-life. We investigate patterns of Facebook usage, website preferences, query logs, and Facebook Likes and look for interesting correlations which can be used to predict users behaviours, preferences or characteristics.
- EmbassiesEmbassies is a new model of client-side application delivery that keeps the client code minimal and secure, while pushing almost all functionality into the vendor-supplied applications. The code in this project implements the system described in the NSDI 2013 paper.
- ZQL for Privacy-Preserving Data ProcessingZQL is a language and compiler that allows for client side compuations to be compiled with appropriate cryptographic checks to provide privacy and integrity.
Jon Howell, Bryan Parno, and John R. Douceur, How to Run POSIX Apps in a Minimal Picoprocess, in Proceedings of the USENIX Annual Technical Conference, USENIX, June 2013
Bryan Parno, Craig Gentry, Jon Howell, and Mariana Raykova, Pinocchio: Nearly Practical Verifiable Computation, in Proceedings of the IEEE Symposium on Security and Privacy, IEEE, 21 May 2013
Zhou Li, Sumayah Alrwais, Yinglian Xie, Fang Yu, and Xiaofeng Wang, Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures, in IEEE Symposium on Security and Privacy, 2013, to appear, IEEE, 19 May 2013
Junxian Huang, Yinglian Xie, Fang Yu, Qifa Ke, Martin Abadi, Eliot Gillum, and Z. Morley Mao, SocialWatch: Detection of Online Service Abuse via Large-Scale Social Graphs, in 8th ACM Symposium on Information, Computer and Communications Security (AsiaCCS), to appear, ACM, 7 May 2013
Rosario Gennaro, Craig Gentry, Bryan Parno, and Mariana Raykova, Quadratic Span Programs and Succinct NIZKs without PCPs, in Proceedings of the IACR Eurocrypt Conference, International Association for Cryptologic Research, May 2013