Skip to main content

Research Projects

Access Control for Pervasive Computing Information
Researcher: Peter Steenkiste

Accountable Mobile Computing Framework Based on User Behavior Modeling
Research Area: Secure Home Computing | Mobility | Privacy Protection | Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Next Generation Threat Prediction and Response | Threat Analysis and Modeling
Researchers: Martin Griss, Anind Dey, Joy Zhang

Adaptive Beamforming for Anti-Jamming and Assured Network Communications
Research Area: Next Generation Secure and Available Networks
Researchers: Patrick Tague, Jason Lohn, Derek Linden

Adaptive Strategies for Cross-Layer Jamming and Anti-Jamming
Research Area: Next Generation Secure and Available Networks
Cross Cutting Thrusts: Threat Analysis and Modeling | Next Generation Threat Prediction and Response
Researcher: Patrick Tague

Adding Artificial Intelligence to Facial Matching Using Soft-Biometric Attributes
Research Area: Security of Cyber-Physical Systems
Researcher: Marios Savvides

Advancing Logic-Based Access Control
Research Area: Secure Home Computing
Cross Cutting Thrusts: Formal Methods | Usable Privacy and Security
Researcher: Lujo Bauer

Agora: Mobile Cloud-Computing Middleware
Research Area: Mobility
Researcher: Priya Narasimhan

Analyzing the Threat Dynamics of Complex Networked Systems
Research Area: Survivable Distributed Systems
Cross Cutting Thrusts: Threat Analysis and Modeling
Researchers: Andrew Moore, Timothy Shimeall

Android App Scanner
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Jason Hong, Janne Lindqvist

An Experiment in Hiring Discrimination via Online Social Networks
Research Area: Privacy Protection
Researchers: Alessandro Acquisti, Christina Fong

Applying Computational Learning Theory
Researcher: Avrim Blum

Architectural Support for Scalable Program Checkpointing
Researchers: Babak Falsafi

Are There Evolutionary Roots To Privacy Concerns?
Research Area: Privacy Protection
Researchers: Alessandro Acquisti, Laura Brandimarte, Jeff Hancock

Artifact-FreeSanitization of Insider-Threat Data
Researcher: Roy Maxion

As-If Infinitely Ranged Integer Model
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security
Researcher: Robert Seacord

A Static Approach to Operating System Security IV
Research Area: Trustworthy Computing Platforms and Devices
Researcher: Karl Crary

Attacking and Defending Unreliable Hardware
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Threat Analysis and Modeling | Next Generation Threat Prediction and Response
Researcher: Onur Mutlu

Attention Economics in Information Rich Environments
Research Area: Privacy Protection
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications | Usable Privacy and Security
Researcher: Alessandro Acquisti

Audio CAPTCHAs for Authenticating Human Users
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Luis von Ahn

Augmenting the Wisdom of Crowds for Anti-Phishing
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Jason Hong, Bryan Pendleton

Automatic Code Generation for Block Ciphers
Cross Cutting Thrusts: Cryptography
Researchers: Markus Püschel

Automatic Facial Landmark Annotation of Facial Images
Research Area: Security of Cyber-Physical Systems
Researcher: Marios Savvides

Automatic Facial Landmarking
Research Area: Security of Cyber-Physical Systems
Researcher: Marios Savvides

Automatic Tracking and Iris Recognition for Rifle Scope
Research Area: Security of Cyber-Physical Systems
Researcher: Marios Savvides

Autonomous Trustworthy Computing Platforms and Devices
Research Area: Trustworthy Computing Platforms and Devices | Security of Cyber-Physical Systems | Mobility
Cross Cutting Thrusts: Software Security
Researcher: Ole Mengshoel

Avoiding User Downtime Due to Setting & Authenticating Security
Researchers: Daniel Siewiorek, Asim Smailagic

BAP: The Binary Analysis Platform
Cross Cutting Thrusts: Software Security
Researchers: David Brumley, Andres Jager

Basis for Empowering Business IT Managers
Cross Cutting Thrusts: Threat Analysis and Modeling | Business Risk Analysis and Economic Implications
Researchers: Andrew Moore, Randall Trzeciak, Dawn Cappelli

Behavior-Based Malware Email Filtering
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security
Researchers: James Hoe, Jason Hong

Behavior-based Mobility Research
Research Area: Mobility
Researchers: Patrick Tague, Joy Zhang

Beyond SCADA for Electric Power Infrastructures
Researcher: Marija Ilic

Biometrics Identification on Robots and Unmanned Aerial Vehicles (UAVs)
Research Area: Security of Cyber-Physical Systems
Researcher: Marios Savvides

Bridging the Gap Between Systems Security and Language Security
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security
Researchers: Jonathan McCune

Campus Navigation
Research Area: Privacy Protection | Mobility
Researchers: James Morris, Norman Sadeh

Casual Authentication
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Jason Hong, Eiji Hayashi

Circuit-Level Secure-by-Design Digital Integrated Circuits
Research Area: Trustworthy Computing Platforms and Devices
Researcher: Ken Mai

Circuit-Level Secure-by-Design Field Programmable Gate Arrays
Research Area: Next Generation Secure and Available Networks
Cross Cutting Thrusts: Software Security
Researcher: Ken Mai

Cloud Computing: Establishing Shared Utility, Informing Assured Cloud Computing Research
Research Area: Survivable Distributed Systems
Researchers: Greg Ganger, Priya Narasimhan, Chuck Cranor, Garth Gibson, Julio Lopez, David O'Hallaron

Collaborative Mobile Sensor Network Control with Extremely Noisy Measurements
Research Area: Mobility | Security of Cyber-Physical Systems
Researchers: Pei Zhang, Bruno Sinopoli

Compiling Epistemic Specifications to Secure Distributed Code
Cross Cutting Thrusts: Software Security | Formal Methods
Researcher: Frank Pfenning

Compositional Security
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Formal Methods | Software Security
Researchers: Anupam Datta, Limin Jia, Amit Vasudevan, Sagar Chaki

Comprehensive Security & Privacy for Next Generation Mobile Networks
Research Area: Mobility | Privacy Protection | Next Generation Secure and Available Networks
Researcher: Patrick Tague

Compressed Sensing for Face Recognition
Research Area: Mobility | Security of Cyber-Physical Systems
Researcher: Vijayakumar Bhagavatula

Computer-Readable Privacy Policies
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Lorrie Cranor

Context-Aware Scalable Authentication: Using passive multi-factor sensing to facilitate authentication
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Jason Hong

Continuous Authentication
Research Area: Security of Cyber-Physical Systems
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Marios Savvides

Continuous Authentication of Computer User: How to Avoid Computer Tailgating and Ensure Computer Security
Research Area: Security of Cyber-Physical Systems
Researcher: Marios Savvides

Contractual Anonymity
Research Area: Trustworthy Computing Platforms and Devices | Privacy Protection
Cross Cutting Thrusts: Cryptography
Researchers: David Brumley, Jonathan McCune

Creating Resilient Protocols with Data-Oriented Transport
Researcher: Dave Andersen

Cross-Layer Self-Configuration for Secure and Resilient Networking
Research Area: Next Generation Secure and Available Networks
Cross Cutting Thrusts: Next Generation Threat Prediction and Response
Researcher: Patrick Tague

CrowdScanning: Using Crowdsourcing and Static Analysis to understand the Privacy Issues in Smartphone Apps
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Jason Hong, Norman Sadeh

Cyber-Security Threats to Industrial Control Systems
Research Area: Trustworthy Computing Platforms and Devices | Security of Cyber-Physical Systems
Researchers: Virgil Gligor, Soo Bum Lee

Data Confidentiality, Privacy, and Security
Research Area: Privacy Protection
Cross Cutting Thrusts: Cryptography
Researcher: Stephen Fienberg

Deep Software Assurance: Requirements, Techniques, Field Experience
Cross Cutting Thrusts: Software Security
Researchers: Jonathan Aldrich, William Scherlis

Dependably Usable Interfaces for Security in the Real World (Renewal)
Research Area: Mobility
Researcher: Roy Maxion

Designing Security Kernels for Verification
Research Area: Trustworthy Computing Platforms and Devices
Researchers: Anupam Datta, Jonathan McCune

Design Methodologies for Security Applications
Cross Cutting Thrusts: Formal Methods
Researcher: Roy Maxion

Deterrence via Intermittent Auditing
Research Area: Next Generation Secure and Available Networks
Researchers: Anupam Datta, Virgil Gligor

Development & Evaluation of Resource-Aware Configurable Survivability
Researcher: Priya Narasimhan

Development of De-identification Tools for Video Surveillance Data
Researchers: Jie Yang

Diagnosing and Locating Wireless Disruption
Research Area: Mobility | Next Generation Secure and Available Networks
Researchers: Srinivasan Seshan, Peter Steenkiste, Dave Andersen

Differentially-Private Synthetic Dataset Release for Machine Learning and Clustering
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Avrim Blum

Distributed Security Monitoring System for Survivable Networks
Research Area: Survivable Distributed Systems
Researcher: Hyong Kim

Distributed Stream Algorithms
Researchers: Christopher Olston

Dynamically Reconfigurable Antenna Arrays
Research Area: Trustworthy Computing Platforms and Devices
Researchers: Jason Lohn, Derek Linden

Effective Trust Indicators
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Lorrie Cranor

Efficient, Secure Encryption Implementations
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Cryptography
Researcher: Ken Mai

Efficient and Effective High Speed Network Logging for Digital Forensics
Research Area: Next Generation Secure and Available Networks
Researcher: Dave Andersen

Efficient Data-Intensive Computing in Support of Security Applications
Research Area: Next Generation Secure and Available Networks | Survivable Distributed Systems
Cross Cutting Thrusts: Next Generation Threat Prediction and Response
Researcher: Dave Andersen

Efficiently Securing Non-Volatile Storage in Portable Systems
Research Area: Mobility | Trustworthy Computing Platforms and Devices | Secure Home Computing
Researcher: Ken Mai

Efficient Trojan Detection in Field Programmable Gate Arrays
Research Area: Trustworthy Computing Platforms and Devices
Researchers: Shawn Blaton

Empirical Analysis of Data Breach Litigation
Research Area: Privacy Protection
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications
Researchers: Alessandro Acquisti, Sasha Romanosky

Empirically-Based Insider Threat Risk Assessment Diagnostic
Cross Cutting Thrusts: Threat Analysis and Modeling | Next Generation Threat Prediction and Response
Researchers: Andrew Moore, Dawn Cappelli

Engineering Self-Healing Systems to Support Trustworthy Computing
Researcher: David Garlan

Enhancements to Large-Scale Network Monitoring for Bot Detection
Research Area: Next Generation Secure and Available Networks
Researchers: Marcus DeShon

Enhancing DMS Software to Secure Electric Power Network Service
Researchers: Marija Ilic, Ozan Tonguz

Evaluating and Controlling Personal Privacy in Smart Environments
Research Area: Secure Home Computing
Researchers: Patrick Tague, Anthony Rowe

Evaluating and Improving Browser Encryption
Cross Cutting Thrusts: Software Security | Usable Privacy and Security
Researchers: Collin Jackson, Lin-Shung Huang, Eric Chen

Evolutionary Roots of Privacy and Security Concerns
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Alessandro Acquisti

Expanding Firewall Misconfiguration Detection Based on Dynamic Routing Analysis for Large Network
Research Area: Next Generation Secure and Available Networks
Researcher: Hyong Kim

Exploratory R&D of a Technology-Driven Insider Threat Scoring Metric
Cross Cutting Thrusts: Next Generation Threat Prediction and Response | Threat Analysis and Modeling
Researchers: Andrew Moore, Randall Trzeciak

Extracting Security Policies from Source Code
Research Area: Privacy Protection
Researchers: Michael Tschantz

Fast Correlation Filtering for Biometric Recognition
Research Area: Security of Cyber-Physical Systems
Cross Cutting Thrusts: Cryptography
Researcher: Vijayakumar Bhagavatula

Fault-Tolerant Voting
Cross Cutting Thrusts: Formal Methods
Researcher: Ryan O'Donnell

Formalizing and Enforcing Privacy
Research Area: Privacy Protection
Cross Cutting Thrusts: Formal Methods
Researchers: Anupam Datta, Limin Jia, Jeremiah Blocki, Zeliha Dilsun Kaynar, Divya Sharma, Arunesh Sinha, Michael Tschantz

Further Investigations into Wireless Broadcast
Researcher: Rohit Negi

Games and Links: Combating Web Spam
Research Area: Trustworthy Computing Platforms and Devices
Researcher: Manuel Blum

Gort: An analysis tool for understanding the privacy and security behaviors of smartphone apps
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Jason Hong

Grey Project: device-enabled authorization
Research Area: Mobility | Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Lujo Bauer

Impact of Online Social Networks on Hiring Practices
Research Area: Privacy Protection
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications
Researchers: Alessandro Acquisti, Christina Fong

Improved Biometric Encryption by Using Correlation Filters
Research Area: Security of Cyber-Physical Systems
Cross Cutting Thrusts: Cryptography
Researcher: Vijayakumar Bhagavatula

Improving the Security and Usability of Text Passwords
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Lorrie Cranor, Lujo Bauer, Nicolas Christin

Inference-Based Adaptation Techniques for Next Generation Jamming and Anti-Jamming Capabilities
Research Area: Next Generation Secure and Available Networks
Cross Cutting Thrusts: Next Generation Threat Prediction and Response | Threat Analysis and Modeling
Researcher: Patrick Tague

Information and Influence Propagation in Social Networks
Research Area: Next Generation Secure and Available Networks
Researchers: Virgil Gligor, Osman Yagan

Inherently Trojan-Resistant Integrated Circuit Architectures
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Cryptography
Researcher: Ken Mai

Insider Threat Analysis Center
Cross Cutting Thrusts: Threat Analysis and Modeling | Next Generation Threat Prediction and Response
Researchers: Andrew Moore, Randall Trzeciak, Dawn Cappelli

Integrated Vehicle-Network-Vision System for Transit Security
Researcher: Yang Cai

Intelligent Video Surveillance Networks for Critical Infrastructures
Research Area: Next Generation Secure and Available Networks | Security of Cyber-Physical Systems
Researcher: Raj Rajkumar

Lockdown: A Safe and Practical Environment for Security Applications
Research Area: Secure Home Computing | Trustworthy Computing Platforms and Devices
Researchers: Virgil Gligor, Adrian Perrig, Amit Vasudevan

Logical Reasoning About Obligations
Research Area: Privacy Protection
Cross Cutting Thrusts: Formal Methods
Researcher: Frank Pfenning

Long Range Iris Acquisition and Recognition
Research Area: Security of Cyber-Physical Systems
Researcher: Marios Savvides

Long Range Stand-off Iris Recognition
Research Area: Security of Cyber-Physical Systems
Researcher: Marios Savvides

Machine Learning Techniques for Phishing Attacks
Research Area: Trustworthy Computing Platforms and Devices | Privacy Protection
Researcher: Jason Hong

Making the Support Vector Machine-Based Relays Secure
Research Area: Next Generation Secure and Available Networks
Researchers: Marija Ilic, Ozan Tonguz

Malicious Fault-Immune Cryptographic Hardware Implementation
Cross Cutting Thrusts: Cryptography
Researcher: Diana Marculescu

Management & Education of Risks of Insider Threat (MERIT)
Researchers: Andrew Moore, Dawn Cappelli

Measuring and Modeling Security and Privacy Laws
Research Area: Privacy Protection
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications
Researchers: Alessandro Acquisti, Sasha Romanosky, Richard Sharp

MERIT ITL: The Insider Threat Lab
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications | Threat Analysis and Modeling | Next Generation Threat Prediction and Response
Researchers: Andrew Moore, Randall Trzeciak, Dawn Cappelli

Mixed Effects Models for Predicting Anomaly-Detector Error Rates
Research Area: Security of Cyber-Physical Systems
Researcher: Roy Maxion

Mobile Platform Security
Research Area: Mobility
Cross Cutting Thrusts: Software Security | Formal Methods
Researchers: Lujo Bauer, Limin Jia

Mobile Users Effectively Control Privacy in a Friend-Finder Application
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Norman Sadeh, Lorrie Cranor, Jason Hong

Multi-Biometric Authentication System (MBAS)
Researcher: Vijayakumar Bhagavatula

Multi-Biometrics for Security & Surveillance
Research Area: Security of Cyber-Physical Systems
Researchers: Marios Savvides, Keshav Thirumalai Seshadri, Shreyas Venugopalan, Taihei Munemoto

MultiBiometric Signal Exploitation, Analysis and Acceleration
Research Area: Security of Cyber-Physical Systems
Researcher: Marios Savvides

Multichannel Modeling for Enhancing and Masking Speech Communications
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Ted Selker, Ian Lane

Multi-Modal Biometric Sensor Networks
Researcher: Marios Savvides

Multi-Modal Biometric Verification
Research Area: Security of Cyber-Physical Systems
Researcher: Vijayakumar Bhagavatula

Next Generation Available Internet
Research Area: Trustworthy Computing Platforms and Devices | Next Generation Secure and Available Networks
Researchers: Virgil Gligor, Adrian Perrig, Soo Bum Lee

Next-Generation Binary Analysis Techniques and Platform
Cross Cutting Thrusts: Software Security | Formal Methods
Researcher: David Brumley

One-Finger, Two-Factor Authentication with Number Pads
Research Area: Security of Cyber-Physical Systems
Researcher: Roy Maxion

Online Crime Economics: Modeling Advertising and Retail Operations
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications | Threat Analysis and Modeling
Researcher: Nicolas Christin

On Privacy and Compliance
Research Area: Privacy Protection
Cross Cutting Thrusts: Cryptography
Researchers: Anupam Datta, Zeliha Dilsun Kaynar

Open Source & Outsourced Software Acceptance Evaluation & Assurance
Researchers: James Herbsleb, Jonathan Aldrich

Open Source Evaluation and Assurance
Cross Cutting Thrusts: Software Security | Formal Methods
Researcher: William Scherlis

PASIS
Researcher: Greg Ganger

Password-Composition Policies and the Security and Usability of Passwords
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Lujo Bauer, Nicolas Christin, Lorrie Cranor

Passwords
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Lujo Bauer, Lorrie Cranor, Nicolas Christin

Path Inference in Data Center Networks
Research Area: Next Generation Secure and Available Networks
Researcher: Hyong Kim

Personal Information Revelation in Online Social Networks
Research Area: Privacy Protection
Researcher: Alessandro Acquisti

Personal Information Security, Conflation of Dissemination and Access, and Illusion of Control
Research Area: Privacy Protection
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications
Researcher: Alessandro Acquisti

Physiological Activity Recognition System (PARS)
Research Area: Mobility
Researcher: Pei Zhang

Pi (Path Identifier) Packet Marking Scheme
Researcher: Adrian Perrig

Principled Approach to Web Security
Cross Cutting Thrusts: Software Security | Formal Methods
Researchers: Anupam Datta, Limin Jia, Deepak Garg

Privacy, Audit and Accountability
Research Area: Privacy Protection
Researchers: Anupam Datta, Limin Jia

Privacy, Information Disclosure, & Authorization from a Logical Perspective
Researchers: Frank Pfenning, Lujo Bauer

Privacy and Security in Real Time Monitoring Systems
Research Area: Mobility | Privacy Protection
Researchers: Daniel Siewiorek, Asim Smailagic, Martin Griss

Privacy and the Illusion of Control
Research Area: Privacy Protection
Researchers: Alessandro Acquisti, Laura Brandimarte, George Lowenstein

Privacy and Usability in Pervasive Computing Environments
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Norman Sadeh, Lujo Bauer

Privacy Decision-Making
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Lorrie Cranor, Alessandro Acquisti

Privacy notice and choice in practice
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Lorrie Cranor

Privacy Nudging
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Alessandro Acquisti, Lorrie Cranor, Norman Sadeh

Probabilistic Verification of Security Properties in Self-Adaptive Systems
Cross Cutting Thrusts: Software Security
Researcher: David Garlan

Process Variation-Aware Modeling, Analysis, and Prevention of Thermal Attacks in Many-Core Systems
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Threat Analysis and Modeling
Researcher: Diana Marculescu

Proposal: Trust-free Garbage Collection for Mobile Code
Research Area: Survivable Distributed Systems
Researcher: Karl Crary

Protecting Browsers from Mixed Content Injection Attacks
Cross Cutting Thrusts: Software Security | Usable Privacy and Security
Researchers: Collin Jackson

Protecting Privacy and Confidentiality of Information
Research Area: Privacy Protection
Researcher: Rahul Telang

Prototyping Security Applications for Ambient Intelligence
Researcher: Radu Marculescu

Providing Privacy & Authentication
Research Area: Privacy Protection
Researcher: Rohit Negi

Recognition of Challenging Ocular Images
Research Area: Security of Cyber-Physical Systems
Researcher: Vijayakumar Bhagavatula

Reconciling Privacy and Usability by Learning Default Privacy Policies
Research Area: Privacy Protection | Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Norman Sadeh

Response to Software Vulnerabilities
Cross Cutting Thrusts: Software Security
Researchers: Ashish Arora

RFMaster: RFID-based Secure Access to Physical Spaces
Researcher: Raj Rajkumar

Risk Analysis for Securing Wireless Ad-Hoc Networks
Research Area: Mobility | Next Generation Secure and Available Networks
Researcher: Radu Marculescu

Robust, optimal design of interdependent, multi-layer, and multiplex networks
Research Area: Next Generation Secure and Available Networks
Researcher: Osman Yagan

Robust, Secure, Efficient Cyber-Physical Systems
Research Area: Security of Cyber-Physical Systems
Cross Cutting Thrusts: Threat Analysis and Modeling
Researcher: Norman Sadeh

Robust, Secure, Efficient Networked Embedded Control Systems
Research Area: Trustworthy Computing Platforms and Devices | Mobility
Cross Cutting Thrusts: Software Security
Researcher: Bruno Sinopoli

Robust Connectivity in the Presence of Insecure and Unreliable Links in Ad-Hoc Networks
Research Area: Next Generation Secure and Available Networks
Researchers: Virgil Gligor, Osman Yagan

Robust Iris & Face Acquisition at 8-13m for the War-Fighter
Research Area: Security of Cyber-Physical Systems
Researcher: Marios Savvides

Robust Multi-Biometrics Identification Using Soft-Biometric Intelligence
Research Area: Security of Cyber-Physical Systems
Researcher: Marios Savvides

SAF: Applying Assurance to the Survivability Analysis Framework
Research Area: Survivable Distributed Systems

Saferide
Research Area: Mobility
Researcher: James Morris

SafeSlinger: Easy-to-Use and Secure Public-Key Exchange
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security | Cryptography
Researchers: Michael Farb, Adrian Perrig, Jonathan McCune, Tiffany Hyun-Jin Kim, Yue-Hsun Lin

SCION: Scalability, Control, and Isolation On Next-Generation Networks
Research Area: Trustworthy Computing Platforms and Devices | Next Generation Secure and Available Networks
Researchers: Adrian Perrig, Dave Andersen, Virgil Gligor, Soo Bum Lee

Securable, Usable Context Toolkit for Mobile Applications
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Martin Griss, Anind Dey, Pei Zhang, Joy Zhang

Secure, Reliable, Efficient Physical Unclonable Functions
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Cryptography
Researcher: Ken Mai

Secure Access to Buildings using RFID Technologies & Video Logging
Researcher: Raj Rajkumar

Secure Ad Hoc Routing Protocols
Research Area: Mobility
Researcher: Adrian Perrig

Secure Broadcast Communication: in Wired and Wireless Networks
Research Area: Next Generation Secure and Available Networks
Researcher: Adrian Perrig

Secure Communication in Sensor Networks
Research Area: Next Generation Secure and Available Networks
Researcher: Adrian Perrig

Secure Concurrent Distributed Programming
Cross Cutting Thrusts: Software Security | Formal Methods
Researcher: Frank Pfenning

Secure digital home
Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Lujo Bauer, Greg Ganger, Lorrie Cranor

Secure Distributed Logic Programming
Cross Cutting Thrusts: Formal Methods | Software Security
Researcher: Frank Pfenning

Secure Home Storage
Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Lujo Bauer, Lorrie Cranor, Greg Ganger

Secure Network & Communication Infrastructure
Research Area: Next Generation Secure and Available Networks
Researcher: Ozan Tonguz

Secure Routing in Sensor Networks
Researcher: Adrian Perrig

Secure Sensor Networks
Research Area: Next Generation Secure and Available Networks
Researcher: Adrian Perrig

Secure Software Development and Operation
Cross Cutting Thrusts: Software Security | Formal Methods
Researchers: David Brumley, Maverick Woo, Manuel Egele

Securing the Digital Home
Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Lujo Bauer, Lorrie Cranor, Greg Ganger, Adrian Perrig

Security and Privacy Risk Management in Organizations
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications
Researchers: Nicolas Christin, Anupam Datta

Security Behavior Observatory
Research Area: Secure Home Computing | Privacy Protection
Cross Cutting Thrusts: Software Security | Usable Privacy and Security | Threat Analysis and Modeling
Researchers: Alessandro Acquisti, Nicolas Christin, Lorrie Cranor, Rahul Telang

Security for Cloud Clients with Rich Controlled Sharing
Researchers: Virgil Gligor, Adrian Perrig, James Newsome, Jonathan McCune, Collin Jackson, Eric Chen

Security Issues in Information Naming
Research Area: Secure Home Computing | Survivable Distributed Systems
Cross Cutting Thrusts: Next Generation Threat Prediction and Response
Researcher: Srinivasan Seshan

Security Patterns: Assurance for Secure Concurrent and Distributed Computing
Cross Cutting Thrusts: Software Security | Next Generation Threat Prediction and Response | Formal Methods
Researchers: William Scherlis, Jonathan Aldrich

Security Quality Requirements Engineering (SQUARE) Project
Cross Cutting Thrusts: Formal Methods | Software Security
Researchers: Nancy Mead, Lorrie Cranor

Self-Configuring Wireless Networks
Researchers: Srinivasan Seshan, Peter Steenkiste

Self-Securing Devices
Researcher: Greg Ganger

Self-Securing Storage
Researcher: Greg Ganger

Semantic Geotagging for Situational Awareness During Disaster Response
Research Area: Mobility | Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Martin Griss, Anind Dey, Ray Bareiss, Steven Rosenberg, Joy Zhang

Semantic Web Reasoning Technologies for Web Privacy
Researcher: Norman Sadeh

SENSIBLEIntegrating SENSing & Processing
Researcher: Diana Marculescu

Sensor Network Security Monitoring and Management System
Research Area: Next Generation Secure and Available Networks
Researcher: Adrian Perrig

Simplifying Access Control for Home Networking
Research Area: Privacy Protection | Security of Cyber-Physical Systems
Researchers: Jason Hong, Bryan Pendleton

Simplifying Logins with Web Ticket
Research Area: Privacy Protection | Security of Cyber-Physical Systems
Researchers: Jason Hong, Eiji Hayashi

Sluice: Secure Software Upgrades in Sensor Networks
Research Area: Next Generation Secure and Available Networks | Mobility
Researchers: Priya Narasimhan, Michael Chuang

Smart Meters and Their Impact on Residential Privacy
Research Area: Security of Cyber-Physical Systems | Privacy Protection
Researcher: Anthony Rowe

Soft-Biometrics
Research Area: Security of Cyber-Physical Systems
Researcher: Marios Savvides

Soft Biometrics from Emerging Media
Research Area: Security of Cyber-Physical Systems
Researchers: Yang Cai, Mel Siegel, Brian Zeleznik, Rich Noland, Alex Nicoll

Software-Based Attestation for Peripherals
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security | Threat Analysis and Modeling
Researchers: Adrian Perrig, Jonathan McCune

Spartacus
Research Area: Mobility
Researcher: Pei Zhang

SQUARE: Requirements Engineering for Improved System Security
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Formal Methods
Researcher: Nancy Mead

Starfish: Scalable Survivable Middleware
Researcher: Priya Narasimhan

Statistical Methodology and Disclosure Limitation
Researcher: Stephen Fienberg

Studying the Android Malware Ecosystem
Research Area: Mobility
Cross Cutting Thrusts: Software Security
Researcher: Nicolas Christin

Super-Resolution for Iris Recognition
Research Area: Security of Cyber-Physical Systems
Researcher: Vijayakumar Bhagavatula

Supporting Trust Decisions
Researchers: Lorrie Cranor, Norman Sadeh

Survivable Distributed Storage: From Theory to Reality
Research Area: Survivable Distributed Systems
Researchers: Greg Ganger, Manish Prasad

Surviving Network Partitioning in Distributed Wireless Systems
Research Area: Survivable Distributed Systems
Researcher: Priya Narasimhan

System Integrity Manager for the Everyday Users
Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Hyong Kim, James Hoe

System Quality Requirements Engineering Process (SQUARE)
Researcher: Nancy Mead

Targeted Software Assurance
Research Area: Survivable Distributed Systems
Cross Cutting Thrusts: Software Security | Formal Methods
Researchers: William Scherlis, Jonathan Aldrich

Techniques for Compositional Security: Foundations, Mechanized Reasoning and Applications
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Formal Methods | Software Security
Researchers: Anupam Datta, Limin Jia, Deepak-Garg

The CAPTCHA Project
Researchers: Manuel Blum, Luis von Ahn

The Dragnet System for Network Forensic Analysis
Researcher: Hui Zhang

The Economic Incentive to Improve Software Security
Researchers: Rahul Telang, Ashish Arora

The TESLA Broadcast Authentication Protocol
Researcher: Adrian Perrig

Three-Dimensional Craniofacial Modeling for Novel Two-Dimensional Pose Synthesis and Age Progression
Research Area: Security of Cyber-Physical Systems
Researcher: Marios Savvides

Transient Customization of Mobile Computing Infrastructure
Research Area: Mobility
Researcher: Mahadev Satyanarayanan

Trinetra: Mobile Technologies for Assisting the Blind & Visually Impaired
Research Area: Mobility | Secure Home Computing
Researchers: Priya Narasimhan, Moshe Mahler

Trusted Computing
Research Area: Trustworthy Computing Platforms and Devices
Researchers: Anupam Datta, Adrian Perrig, Virgil Gligor, Amit Vasudevan

Trust Establishment in Interactive Human Protocols Over the Internet
Research Area: Trustworthy Computing Platforms and Devices
Researchers: Virgil Gligor, Adrian Perrig, Tiffany Hyun-Jin Kim

Trustworthy Computing Platforms and Devices
Research Area: Trustworthy Computing Platforms and Devices
Researchers: Virgil Gligor, Anupam Datta, Adrian Perrig, Amit Vasudevan, Limin Jia

Trustworthy Execution Environments on Mobile Devices
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security | Threat Analysis and Modeling
Researchers: Amit Vasudevan, Adrian Perrig, James Newsome, Jonathan McCune

Understanding Human Behaviors at Large Scales through Mobile Devices
Research Area: Mobility | Privacy Protection | Security of Cyber-Physical Systems
Researchers: Jason Hong, Norman Sadeh, Justin Cranshaw, Eran Toch

Understanding User Investments & Response to Security Threats
Cross Cutting Thrusts: Threat Analysis and Modeling | Business Risk Analysis and Economic Implications
Researcher: Nicolas Christin

Usable Cyber Trust Indicators
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Lorrie Cranor

Usable security and privacy for context-aware mobile applications
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Martin Griss, Anind Dey, Pei Zhang

User-Controllable Policy Learning
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Norman Sadeh, Lorrie Cranor

User Controllable Security & Privacy for Mobile Social Networking
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Norman Sadeh, Lorrie Cranor, Jason Hong

User-Controllable Security and Privacy for Pervasive Computing
Research Area: Privacy Protection | Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Norman Sadeh, Jason Hong, Lorrie Cranor, Lujo Bauer

Use Your Illusion: Using Visual Distortion to Secure Image-Based Authentication
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Jason Hong, Nicolas Christin, Eiji Hayashi

Using Personalized Face Composites for Visceral Targeting
Research Area: Privacy Protection
Researchers: Alessandro Acquisti, Ralph Gross, Sonam Samat, Eyal Pe'er

Vajra: Benchmarking Survivability in Distributed Systems
Researcher: Priya Narasimhan

Verifiable Properties of Computations Outsourced to the Cloud
Cross Cutting Thrusts: Cryptography
Researchers: Virgil Gligor, Anupam Datta, Amit Vasudevan

Visualizing Home Networks
Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Jason Hong

VMA: Dynamic and Secure Heterogeneous System for Elder Care
Research Area: Next Generation Secure and Available Networks | Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Pei Zhang, Martin Griss, Raj Rajkumar, Daniel Siewiorek, Asim Smailagic

Wireless Sensor Networks for People-Tracking
Research Area: Next Generation Secure and Available Networks | Security of Cyber-Physical Systems
Researcher: Raj Rajkumar

Wireless Video Sensor Networks for Security Applications
Researcher: Radu Marculescu

XTREC: Secure Real-time Execution Trace Recording and Analysis on Commodity Platforms
Research Area: Trustworthy Computing Platforms and Devices | Security of Cyber-Physical Systems
Cross Cutting Thrusts: Software Security
Researchers: Adrian Perrig, Virgil Gligor, Amit Vasudevan