Security and Privacy

Threat analysis, database privacy, and mobile device security


We study various aspects of security related to computer systems. This includes the design of secure systems; the usability, evaluation and certification of security products; the robustness of digital watermarking algorithms; threat analysis for open networks; and database privacy. In addition, we work on making mobile devices even more secure than they are today.

 

Publications

Andrew Baumann, Marcus Peinado, and Galen Hunt, Shielding applications from an untrusted cloud with Haven, in 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI '14), USENIX – Advanced Computing Systems Association, October 2014

Blase Ur, Jaeyeon Jung, and Stuart Schechter, Intruders Versus Intrusiveness: Teens’ and Parents’ Perspectives on Home-Entryway Surveillance, in 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2014), Ubicomp, 15 September 2014

Jaeyeon Jung and Matthai Philipose, Courteous Glass, in The UbiComp workshop on usable privacy and security of wearables and domestic ubiquitous devices, ACM – Association for Computing Machinery, 14 September 2014

Dan Liebling and Sören Preibusch, Privacy Considerations for a Pervasive Eye Tracking World, ACM – Association for Computing Machinery, 13 September 2014

Joseph Bonneau and Stuart Schechter, Towards reliable storage of 56-bit secrets in human memory (extended version), no. MSR-TR-2014-95, 20 August 2014

More publications...