Security and Privacy

Threat analysis, database privacy, and mobile device security


We study various aspects of security related to computer systems. This includes the design of secure systems; the usability, evaluation and certification of security products; the robustness of digital watermarking algorithms; threat analysis for open networks; and database privacy. In addition, we work on making mobile devices even more secure than they are today.

 

Publications

Dinei Florencio ˆ, Cormac Herley, and Paul C. van Oorschot, An Administrator’s Guide to Internet Password Research, in Usenix LISA, USENIX – Advanced Computing Systems Association, November 2014

Andrew Baumann, Marcus Peinado, and Galen Hunt, Shielding applications from an untrusted cloud with Haven, in 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI '14), USENIX – Advanced Computing Systems Association, 6 October 2014

Chris Hawblitzel, Jon Howell, Jacob R. Lorch, Arjun Narayan, Bryan Parno, Danfeng Zhang, and Brian Zill, Ironclad Apps: End-to-End Security via Automated Full-System Verification, in USENIX Symposium on Operating Systems Design and Implementation (OSDI), USENIX – Advanced Computing Systems Association, 6 October 2014

Kirsten Eisentrager, Sean Hallgren, and Kristin Lauter, Weak Instances of PLWE, in Selected Areas in Cryptography 2014, Springer, 30 September 2014

Blase Ur, Jaeyeon Jung, and Stuart Schechter, Intruders Versus Intrusiveness: Teens’ and Parents’ Perspectives on Home-Entryway Surveillance, in 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2014), Ubicomp, 15 September 2014

More publications...