Security and Privacy

Threat analysis, database privacy, and mobile device security

We study various aspects of security related to computer systems. This includes the design of secure systems; the usability, evaluation and certification of security products; the robustness of digital watermarking algorithms; threat analysis for open networks; and database privacy. In addition, we work on making mobile devices even more secure than they are today.



Dinei Florencio ˆ, Cormac Herley, and Paul C. van Oorschot, An Administrator’s Guide to Internet Password Research, in Usenix LISA, USENIX – Advanced Computing Systems Association, November 2014

Andrew Baumann, Marcus Peinado, and Galen Hunt, Shielding applications from an untrusted cloud with Haven, in 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI '14), USENIX – Advanced Computing Systems Association, October 2014

Blase Ur, Jaeyeon Jung, and Stuart Schechter, Intruders Versus Intrusiveness: Teens’ and Parents’ Perspectives on Home-Entryway Surveillance, in 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2014), Ubicomp, 15 September 2014

Jaeyeon Jung and Matthai Philipose, Courteous Glass, in The UbiComp workshop on usable privacy and security of wearables and domestic ubiquitous devices, ACM – Association for Computing Machinery, 14 September 2014

Dan Liebling and Sören Preibusch, Privacy Considerations for a Pervasive Eye Tracking World, ACM – Association for Computing Machinery, 13 September 2014

More publications...