Security and Privacy

Threat analysis, database privacy, and mobile device security


We study various aspects of security related to computer systems. This includes the design of secure systems; the usability, evaluation and certification of security products; the robustness of digital watermarking algorithms; threat analysis for open networks; and database privacy. In addition, we work on making mobile devices even more secure than they are today.

 

Publications

Andrew Baumann, Marcus Peinado, and Galen Hunt, Shielding applications from an untrusted cloud with Haven, in 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI '14), USENIX – Advanced Computing Systems Association, October 2014

Dan Liebling and Sören Preibusch, Privacy Considerations for a Pervasive Eye Tracking World, ACM – Association for Computing Machinery, 13 September 2014

Joseph Bonneau and Stuart Schechter, Towards reliable storage of 56-bit secrets in human memory (extended version), no. MSR-TR-2014-95, 20 August 2014

Joseph Bonneau and Stuart Schechter, Towards reliable storage of 56-bit secrets in human memory, in Proceedings of the 23rd USENIX Security Symposium, USENIX, 20 August 2014

Dinei Florencio, Cormac Herley, and Paul C. van Oorschot, Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts, in Usenix Security, Choose..., August 2014

More publications...