Share on Facebook Tweet on Twitter Share on LinkedIn Share by email
Security and Privacy

Threat analysis, database privacy, and mobile device security

We study various aspects of security related to computer systems. This includes the design of secure systems; the usability, evaluation, and certification of security products; the robustness of digital watermarking algorithms; threat analysis for open networks; and database privacy. In addition, we work on making mobile devices even more secure than they are today.



Arvind Arasu, Ken Eguro, Manas Joglekar, Raghav Kaushik, Donald Kossmann, and Ravi Ramamurthy, Transaction Processing on Confidential Data using Cipherbase, in 31st IEEE International Conference on Data Engineering (ICDE), April 2015

Lucas Silva Figueiredo, Benjamin Livshits, David Molnar, and Margus Veanes, PrePose: Security and Privacy for Gesture-Based Programming, no. MSR-TR-2014-146, 14 November 2014

Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, and Geoffrey M. Voelker, Characterizing Large-Scale Click Fraud in ZeroAccess, in Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS), ACM – Association for Computing Machinery, 2 November 2014

John Vilk, David Molnar, Eyal Ofek, Chris Rossbach, Benjamin Livshits, Alexander Moshchuk, Helen J. Wang, and Ran Gal, SurroundWeb : Mitigating Privacy Concerns in a 3D Web Browser, no. MSR-TR-2014-147, November 2014

More publications ...