Skip to main content

Research Projects

2013

An Experiment in Hiring Discrimination via Online Social Networks
Research Area: Privacy Protection
Researcher s: Alessandro Acquisti, Christina Fong

Are There Evolutionary Roots To Privacy Concerns?
Research Area: Privacy Protection
Researcher s: Alessandro Acquisti, Laura Brandimarte, Jeff Hancock

Automatic Facial Landmarking
Research Area: Security of Cyber-Physical Systems
Researcher : Marios Savvides

Behavior-based Mobility Research
Research Area: Mobility
Researcher s: Patrick Tague, Joy Zhang

Biometrics Identification on Robots and Unmanned Aerial Vehicles (UAVs)
Research Area: Security of Cyber-Physical Systems
Researcher : Marios Savvides

Compositional Security
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Formal Methods | Software Security
Researcher s: Anupam Datta, Limin Jia, Amit Vasudevan, Sagar Chaki

Comprehensive Security & Privacy for Next Generation Mobile Networks
Research Area: Mobility | Privacy Protection | Next Generation Secure and Available Networks
Researcher : Patrick Tague

Context-Aware Scalable Authentication: Using passive multi-factor sensing to facilitate authentication
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researcher : Jason Hong

Continuous Authentication
Research Area: Security of Cyber-Physical Systems
Cross Cutting Thrusts: Usable Privacy and Security
Researcher : Marios Savvides

Cross-Layer Self-Configuration for Secure and Resilient Networking
Research Area: Next Generation Secure and Available Networks
Cross Cutting Thrusts: Next Generation Threat Prediction and Response
Researcher : Patrick Tague

CrowdScanning: Using Crowdsourcing and Static Analysis to understand the Privacy Issues in Smartphone Apps
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Jason Hong, Norman Sadeh

Cyber-Security Threats to Industrial Control Systems
Research Area: Trustworthy Computing Platforms and Devices | Security of Cyber-Physical Systems
Researcher s: Virgil Gligor, Soo Bum Lee

Deterrence via Intermittent Auditing
Research Area: Next Generation Secure and Available Networks
Researcher s: Anupam Datta, Virgil Gligor

Evaluating and Controlling Personal Privacy in Smart Environments
Research Area: Secure Home Computing
Researcher s: Patrick Tague, Anthony Rowe

Gort: An analysis tool for understanding the privacy and security behaviors of smartphone apps
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher : Jason Hong

Inference-Based Adaptation Techniques for Next Generation Jamming and Anti-Jamming Capabilities
Research Area: Next Generation Secure and Available Networks
Cross Cutting Thrusts: Next Generation Threat Prediction and Response | Threat Analysis and Modeling
Researcher : Patrick Tague

Information and Influence Propagation in Social Networks
Research Area: Next Generation Secure and Available Networks
Researcher s: Virgil Gligor, Osman Yagan

Long Range Iris Acquisition and Recognition
Research Area: Security of Cyber-Physical Systems
Researcher : Marios Savvides

Mobile Platform Security
Research Area: Mobility
Cross Cutting Thrusts: Software Security | Formal Methods
Researcher s: Lujo Bauer, Limin Jia

Next Generation Available Internet
Research Area: Trustworthy Computing Platforms and Devices | Next Generation Secure and Available Networks
Researcher s: Virgil Gligor, Adrian Perrig, Soo Bum Lee

Online Crime Economics: Modeling Advertising and Retail Operations
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications | Threat Analysis and Modeling
Researcher : Nicolas Christin

Password-Composition Policies and the Security and Usability of Passwords
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Lujo Bauer, Nicolas Christin, Lorrie Cranor

Passwords
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Lujo Bauer, Lorrie Cranor, Nicolas Christin

Physiological Activity Recognition System (PARS)
Research Area: Mobility
Researcher : Pei Zhang

Privacy, Audit and Accountability
Research Area: Privacy Protection
Researcher s: Anupam Datta, Limin Jia

Privacy notice and choice in practice
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher : Lorrie Cranor

Robust, optimal design of interdependent, multi-layer, and multiplex networks
Research Area: Next Generation Secure and Available Networks
Researcher : Osman Yagan

Robust Connectivity in the Presence of Insecure and Unreliable Links in Ad-Hoc Networks
Research Area: Next Generation Secure and Available Networks
Researcher s: Virgil Gligor, Osman Yagan

SafeSlinger: Easy-to-Use and Secure Public-Key Exchange
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security | Cryptography
Researcher s: Michael Farb, Adrian Perrig, Jonathan McCune, Tiffany Hyun-Jin Kim, Yue-Hsun Lin

Secure digital home
Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Lujo Bauer, Greg Ganger, Lorrie Cranor

Secure Software Development and Operation
Cross Cutting Thrusts: Software Security | Formal Methods
Researcher s: David Brumley, Maverick Woo, Manuel Egele

Security Behavior Observatory
Research Area: Secure Home Computing | Privacy Protection
Cross Cutting Thrusts: Software Security | Usable Privacy and Security | Threat Analysis and Modeling
Researcher s: Alessandro Acquisti, Nicolas Christin, Lorrie Cranor, Rahul Telang

Soft-Biometrics
Research Area: Security of Cyber-Physical Systems
Researcher : Marios Savvides

Spartacus
Research Area: Mobility
Researcher : Pei Zhang

Studying the Android Malware Ecosystem
Research Area: Mobility
Cross Cutting Thrusts: Software Security
Researcher : Nicolas Christin

Trust Establishment in Interactive Human Protocols Over the Internet
Research Area: Trustworthy Computing Platforms and Devices
Researcher s: Virgil Gligor, Adrian Perrig, Tiffany Hyun-Jin Kim

Trustworthy Computing Platforms and Devices
Research Area: Trustworthy Computing Platforms and Devices
Researcher s: Virgil Gligor, Anupam Datta, Adrian Perrig, Amit Vasudevan, Limin Jia

Usable Cyber Trust Indicators
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher : Lorrie Cranor

Using Personalized Face Composites for Visceral Targeting
Research Area: Privacy Protection
Researcher s: Alessandro Acquisti, Ralph Gross, Sonam Samat, Eyal Pe'er

Verifiable Properties of Computations Outsourced to the Cloud
Cross Cutting Thrusts: Cryptography
Researcher s: Virgil Gligor, Anupam Datta, Amit Vasudevan

2012

Accountable Mobile Computing Framework Based on User Behavior Modeling
Research Area: Secure Home Computing | Mobility | Privacy Protection | Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Next Generation Threat Prediction and Response | Threat Analysis and Modeling
Researcher s: Martin Griss, Anind Dey, Joy Zhang

Adaptive Beamforming for Anti-Jamming and Assured Network Communications
Research Area: Next Generation Secure and Available Networks
Researcher s: Patrick Tague, Jason Lohn, Derek Linden

Adaptive Strategies for Cross-Layer Jamming and Anti-Jamming
Research Area: Next Generation Secure and Available Networks
Cross Cutting Thrusts: Threat Analysis and Modeling | Next Generation Threat Prediction and Response
Researcher : Patrick Tague

Adding Artificial Intelligence to Facial Matching Using Soft-Biometric Attributes
Research Area: Security of Cyber-Physical Systems
Researcher : Marios Savvides

Advancing Logic-Based Access Control
Research Area: Secure Home Computing
Cross Cutting Thrusts: Formal Methods | Usable Privacy and Security
Researcher : Lujo Bauer

Android App Scanner
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Jason Hong, Janne Lindqvist

A Static Approach to Operating System Security IV
Research Area: Trustworthy Computing Platforms and Devices
Researcher : Karl Crary

Cloud Computing: Establishing Shared Utility, Informing Assured Cloud Computing Research
Research Area: Survivable Distributed Systems
Researcher s: Greg Ganger, Priya Narasimhan, Chuck Cranor, Garth Gibson, Julio Lopez, David O'Hallaron

Data Confidentiality, Privacy, and Security
Research Area: Privacy Protection
Cross Cutting Thrusts: Cryptography
Researcher : Stephen Fienberg

Efficient, Secure Encryption Implementations
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Cryptography
Researcher : Ken Mai

Efficient and Effective High Speed Network Logging for Digital Forensics
Research Area: Next Generation Secure and Available Networks
Researcher : Dave Andersen

Efficiently Securing Non-Volatile Storage in Portable Systems
Research Area: Mobility | Trustworthy Computing Platforms and Devices | Secure Home Computing
Researcher : Ken Mai

Empirical Analysis of Data Breach Litigation
Research Area: Privacy Protection
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications
Researcher s: Alessandro Acquisti, Sasha Romanosky

Evaluating and Improving Browser Encryption
Cross Cutting Thrusts: Software Security | Usable Privacy and Security
Researcher s: Collin Jackson, Lin-Shung Huang, Eric Chen

Evolutionary Roots of Privacy and Security Concerns
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher : Alessandro Acquisti

Expanding Firewall Misconfiguration Detection Based on Dynamic Routing Analysis for Large Network
Research Area: Next Generation Secure and Available Networks
Researcher : Hyong Kim

Formalizing and Enforcing Privacy
Research Area: Privacy Protection
Cross Cutting Thrusts: Formal Methods
Researcher s: Anupam Datta, Limin Jia, Jeremiah Blocki, Zeliha Dilsun Kaynar, Divya Sharma, Arunesh Sinha, Michael Tschantz

Impact of Online Social Networks on Hiring Practices
Research Area: Privacy Protection
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications
Researcher s: Alessandro Acquisti, Christina Fong

Improving the Security and Usability of Text Passwords
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Lorrie Cranor, Lujo Bauer, Nicolas Christin

Inherently Trojan-Resistant Integrated Circuit Architectures
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Cryptography
Researcher : Ken Mai

Long Range Stand-off Iris Recognition
Research Area: Security of Cyber-Physical Systems
Researcher : Marios Savvides

Mixed Effects Models for Predicting Anomaly-Detector Error Rates
Research Area: Security of Cyber-Physical Systems
Researcher : Roy Maxion

Next-Generation Binary Analysis Techniques and Platform
Cross Cutting Thrusts: Software Security | Formal Methods
Researcher : David Brumley

Path Inference in Data Center Networks
Research Area: Next Generation Secure and Available Networks
Researcher : Hyong Kim

Privacy and the Illusion of Control
Research Area: Privacy Protection
Researcher s: Alessandro Acquisti, Laura Brandimarte, George Lowenstein

Privacy Decision-Making
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Lorrie Cranor, Alessandro Acquisti

Recognition of Challenging Ocular Images
Research Area: Security of Cyber-Physical Systems
Researcher : Vijayakumar Bhagavatula

Reconciling Privacy and Usability by Learning Default Privacy Policies
Research Area: Privacy Protection | Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researcher : Norman Sadeh

Robust, Secure, Efficient Cyber-Physical Systems
Research Area: Security of Cyber-Physical Systems
Cross Cutting Thrusts: Threat Analysis and Modeling
Researcher : Norman Sadeh

SCION: Scalability, Control, and Isolation On Next-Generation Networks
Research Area: Trustworthy Computing Platforms and Devices | Next Generation Secure and Available Networks
Researcher s: Adrian Perrig, Dave Andersen, Virgil Gligor, Soo Bum Lee

Secure, Reliable, Efficient Physical Unclonable Functions
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Cryptography
Researcher : Ken Mai

Secure Concurrent Distributed Programming
Cross Cutting Thrusts: Software Security | Formal Methods
Researcher : Frank Pfenning

Secure Home Storage
Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Lujo Bauer, Lorrie Cranor, Greg Ganger

Security for Cloud Clients with Rich Controlled Sharing
Researcher s: Virgil Gligor, Adrian Perrig, James Newsome, Jonathan McCune, Collin Jackson, Eric Chen

Security Issues in Information Naming
Research Area: Secure Home Computing | Survivable Distributed Systems
Cross Cutting Thrusts: Next Generation Threat Prediction and Response
Researcher : Srinivasan Seshan

Simplifying Logins with Web Ticket
Research Area: Privacy Protection | Security of Cyber-Physical Systems
Researcher s: Jason Hong, Eiji Hayashi

Smart Meters and Their Impact on Residential Privacy
Research Area: Security of Cyber-Physical Systems | Privacy Protection
Researcher : Anthony Rowe

Soft Biometrics from Emerging Media
Research Area: Security of Cyber-Physical Systems
Researcher s: Yang Cai, Mel Siegel, Brian Zeleznik, Rich Noland, Alex Nicoll

Software-Based Attestation for Peripherals
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security | Threat Analysis and Modeling
Researcher s: Adrian Perrig, Jonathan McCune

Techniques for Compositional Security: Foundations, Mechanized Reasoning and Applications
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Formal Methods | Software Security
Researcher s: Anupam Datta, Limin Jia, Deepak-Garg

Trustworthy Execution Environments on Mobile Devices
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security | Threat Analysis and Modeling
Researcher s: Amit Vasudevan, Adrian Perrig, James Newsome, Jonathan McCune

Understanding Human Behaviors at Large Scales through Mobile Devices
Research Area: Mobility | Privacy Protection | Security of Cyber-Physical Systems
Researcher s: Jason Hong, Norman Sadeh, Justin Cranshaw, Eran Toch