Security and Privacy

Threat analysis, database privacy, and mobile device security

We study various aspects of security related to computer systems. This includes the design of secure systems; the usability, evaluation and certification of security products; the robustness of digital watermarking algorithms; threat analysis for open networks; and database privacy. In addition, we work on making mobile devices even more secure than they are today.



Shayak Sen, Saikat Guha, Anupam Dutta, Sriram Rajamani, Janice Tsai, and Jeannette Wing, Bootstrapping Privacy Compliance in Big Data Systems, in Proceedings of the 35th IEEE Symposium on Security & Privacy (Oakland), San Jose, CA, May 2014

James Mickens, Pivot: Fast, Synchronous Mashup Isolation Using Generator Chains, in Proceedings of the IEEE Symposium on Security and Privacy, IEEE, May 2014

Tolga Acar, Cedric Fournet, and Dan shumow, Cryptographically Verified Design and Implementation of a Distributed Key Manager, no. MSR-TR-2014-48, 15 April 2014

Patrick Longa and Francesco Sica, Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication (Full version), in Journal of Cryptology, Springer, April 2014

Tolga Acar and Lan Nguyen, High Assurance Policy-Based Key Management at Low Cost, no. MSR-TR-2014-49, April 2014

More publications...