Share on Facebook Tweet on Twitter Share on LinkedIn Share by email
Security and Privacy

Threat analysis, database privacy, and mobile device security

We study various aspects of security related to computer systems. This includes the design of secure systems; the usability, evaluation, and certification of security products; the robustness of digital watermarking algorithms; threat analysis for open networks; and database privacy. In addition, we work on making mobile devices even more secure than they are today.


Bimal Viswanath, Muhammad Ahmad Bashir, Muhammad Bilal Zafar, Simon Bouget, Saikat Guha, Krishna Gummadi, Aniket Kate, and Alan Mislove, Strength in Numbers: Robust Tamper Detection in Crowd Computations, in Proceedings of the ACM Conference on Online Social Networks (COSN), Palo Alto, CA, November 2015.

Greg Zaverucha, Stronger Password-Based Encryption Using All-or-Nothing Transforms, no. MSR-TR-2015-63, 5 August 2015.

Xiaofeng Zheng, Jian Jiang, Jinjin Liang, Haixin Duan, Shuo Chen, Tao Wang, and Nicholas Weaver, Cookies Lack Integrity: Real-World Implications , in Proceedings of the USENIX Security Symposium, USENIX – Advanced Computing Systems Association, August 2015.

Stuart Schechter and Joseph Bonneau, Learning Assigned Secrets for Unlocking Mobile Devices, in Symposium On Usable Privacy and Security, USENIX – Advanced Computing Systems Association, 22 July 2015.

More publications ...