pdf
Who Knows I Like Jelly Beans? An Investigation Into Search Privacy

In Proceedings of the 22nd Privacy Enhancing Technologies Symposium (PETS 2022)

pdf
SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model

In Proceedings of the 17th ACM Asia Conference on Computer and Communications Security (ACM ASIACCS 2022)

pdf
Trauma-Informed Computing: Towards Safer Technology Experiences for All

In Proceedings of the 2022 Conference on Human Factors in Computing Systems (CHI 2022)

pdf
Model Stealing Attacks Against Inductive Graph Neural Networks

In Proceedings of the 43nd IEEE Symposium on Security and Privacy (S&P 2022)

pdf
A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned

In Proceedings of the 31st USENIX Security Symposium (USENIX Security 2022)

pdf
Inference Attacks Against Graph Neural Networks

In Proceedings of the 31st USENIX Security Symposium (USENIX Security 2022)

pdf
When Sally Met Trackers: Web Tracking From the Users' Perspective

In Proceedings of the 31st USENIX Security Symposium (USENIX Security 2022).

Related News

Secure systems map

Secure Systems

Central to trust in an increasingly digital world is the ability to detect and prevent attacks in modern (and not so modern) information systems. This research includes building secure software, supporting forensics, malware analysis, browser/web/network security, and information-centric security.

LEARN MORE
Man entering credit card details on tablet

Privacy, Identity, and Trust

Consumers and corporations are driven to engage in a digital world that they cannot adequately trust. We are developing paradigms to enable online commerce and facilitate machine learning in ways that provide privacy and protect user identities, by leveraging such concepts as local differential privacy, federated machine learning, identity brokering, and blockchain technology.

LEARN MORE
machine learning image

Robust and Fair Machine Learning, Data Mining, and Artificial Intelligence

The tremendous growth in the learning capacity of Machine Learning methods has yet to be met with a corresponding growth in our ability to understand these models. Equally troubling, our ability to build robust machine learning models has not kept pace with research in adversarial attacks against machine learning. As we increasingly hand over decision making to automated machine learning and AI systems, we must find ways that the life-altering decisions made by these systems can be audited for fairness, safety, robustness to adversaries, and the preservation of privacy of any personally identifiable information over which they operate.

LEARN MORE
click to top

Back to Top