Threat analysis, database privacy, and mobile device security
We study various aspects of security related to computer systems. This includes the design of secure systems; the usability, evaluation, and certification of security products; the robustness of digital watermarking algorithms; threat analysis for open networks; and database privacy. In addition, we work on making mobile devices even more secure than they are today.
John Vilk, David Molnar, Benjamin Livshits, Eyal Ofek, Chris Rossbach, Alexander Moshchuk, Helen J. Wang, and Ran Gal, SurroundWeb : Mitigating Privacy Concerns in a 3D Web Browser, IEEE – Institute of Electrical and Electronics Engineers, 18 May 2015.
Craig Costello, Cedric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, and Samee Zahur, Geppetto: Versatile Verifiable Computation, in Proceedings of the IEEE Symposium on Security and Privacy, IEEE – Institute of Electrical and Electronics Engineers, 18 May 2015.
Helen J. Wang, Alexander Moshchuk, Michael Gamon, Mona Haraty, Shamsi Iqbal, Eli T. Brown, Ashish Kapoor, Chris Meek, Eric Chen, Yuan Tian, Jaime Teevan, Mary Czerwinski, and Susan Dumais, The Activity Platform, no. MSR-TR-2015-38, 8 May 2015.
Yuanzhong Xu, Weidong Cui, and Marcus Peinado, Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems, in Proceedings of the 36th IEEE Symposium on Security and Privacy (Oakland), IEEE – Institute of Electrical and Electronics Engineers, May 2015.
- Certification of Symbolic Transaction
- Zero-Effort Payments
- Personalised online shopping study
- MSR Elliptic Curve Cryptography Library
- Social Analytics: From Demographics to Psychometrics
- ZQL for Privacy-Preserving Data Processing
- User behaviour on Web forms
- Research Collaboration Conferences for Women
- ECM at Work
- Cipherbase = Encrypt(Database)