Threat analysis, database privacy, and mobile device security
We study various aspects of security related to computer systems. This includes the design of secure systems; the usability, evaluation, and certification of security products; the robustness of digital watermarking algorithms; threat analysis for open networks; and database privacy. In addition, we work on making mobile devices even more secure than they are today.
Bimal Viswanath, Muhammad Ahmad Bashir, Muhammad Bilal Zafar, Simon Bouget, Saikat Guha, Krishna Gummadi, Aniket Kate, and Alan Mislove, Strength in Numbers: Robust Tamper Detection in Crowd Computations, in Proceedings of the ACM Conference on Online Social Networks (COSN), Palo Alto, CA, November 2015.
Stuart Schechter and Joseph Bonneau, Learning Assigned Secrets for Unlocking Mobile Devices, in Symposium On Usable Privacy and Security, USENIX – Advanced Computing Systems Association, 22 July 2015.
Joppe Bos, Craig Costello, Patrick Longa, and Michael Naehrig, Specification of Curve Selection and Supported Curve Parameters in MSR ECCLib, no. MSR-TR-2015-49, 9 June 2015.
Craig Costello and Patrick Longa, FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime, no. MSR-TR-2015-47, 8 June 2015.
- Cryptography Research Group
- Cryptography, Security, and Applied Mathematics
- Internet Services Research Center
- Search Quality and Cyber-Intelligence Lab
- Security and Privacy
- MSR Ethics Review Framework
- Certification of Symbolic Transaction
- Zero-Effort Payments
- Personalised online shopping study
- MSR Elliptic Curve Cryptography Library
- Social Analytics: From Demographics to Psychometrics
- ZQL for Privacy-Preserving Data Processing
- User behaviour on Web forms
- Research Collaboration Conferences for Women
- ECM at Work
- Cipherbase = Encrypt(Database)