Security and Cryptography

Welcome to the web page for security and cryptography research in the Department of Computer Science and Engineering at the University of California at San Diego. Our group conducts research in areas spanning from theory to practice: we work on the theoretical foundations of cryptography; the development and analysis of cryptographic protocols and algorithms; and on applied cryptography, systems security, and network security. In line with our broad security-related research interests, we are affiliated and actively collaborate with both the Theory Group and the Systems and Networking Group here at UCSD.

People  |   News  |   Publications  |   Sponsors
Faculty
Mihir Bellare
Russell Impagliazzo
Daniele Micciancio
Stefan Savage
Hovav Shacham
Deian Stefan
Geoffrey M. Voelker
Affiliated Faculty
kc claffy
Ranjit Jhala
Ryan Kastner
Sorin Lerner
Alex C. Snoeren
Steven Swanson
Yuanyuan Zhou
Scientists, Postdocs and Research Staff
Brian Kantor
Kirill Levchenko
Cindy Moore
PhD Students
Joe DeBlasio
Louis DeKoven
Brown Farinholt
Danny Huang
Joseph Jaeger
Brian Johannesmeyer
David Kohlbrenner
Guo “Vector” Lee
Baiyu Li
Ariana Mirian
Ruth Ng
Jessica Sorrell
Igors Stepanovs
Edward Sullivan
Qiushi Wang
Michael Walter
Zhaomo Yang
MS Students
Danny Anderson
Erik Buchanan
Stephan Chenette
Grant Jordan
Recent Alumni
Björn Tackmann (postdoc 2014–2016) IBM Research Zurich

Wilson Lian (Ph.D. 2016)Google
Karyn Benson (Ph.D. 2016)Akamai

Neha Chachra (Ph.D. 2015)Facebook
Matthew Der (Ph.D. 2015)notch.io
Tristan Halvorson (Ph.D. 2015)Google
He Liu (Lonnie) (Ph.D. 2015)Google
Keaton Mowery (Ph.D. 2015) Apple
Bhanu Vattikonda (Ph.D. 2015)Apple

Léo Ducas (postdoc 2013–2014) CWI Amsterdam
Viet Tung Hoang (postdoc 2013–2014) UMD/Georgetown (postdoc)UCSB (postdoc) → Florida State University

Sriram Keelveedhi (Ph.D. 2014)Google
Do-kyum Kim (Ph.D. 2014)Google
Feng Lu (Ph.D. 2014)Google
Sarah Meiklejohn (Ph.D. 2014)UCL
Jason Oberg (Ph.D. 2014)Tortuga Logic
David Wang (Ph.D. 2014)Google
Qing Zhang (Ph.D. 2014)Google

Vacha Dave (Postdoc 2013)Microsoft
Christian Kreibich (Researcher 2012–2013)
Lastline
Nicholas Weaver (Researcher 2012–2013)ICSI

Vinh The Lam (Ph.D. 2013)Google
Petros Mol (Ph.D. 2013)Google
Andreas Pitsillidis (Ph.D. 2013)Google
Gjergji Zyba (Ph.D. 2013)Meraki

Jacob Maskiewicz (M.S. 2016) Facebook

Ian Foster (M.S. 2015) Salesforce
Radheshyam Balasundaram (M.S. 2015) Google

Chris Gardner (M.S. 2014) Arris
Devin Lundberg (M.S. 2014) Pinterest

Michael Goldberg (M.S. 2013) Google

[All Alumni]
Recent News

November 12— This week, David Kohlbrenner traveled to Brooklyn to present his USENIX 2016 paper, “Trusted Browsers for Uncertain Times”, one of ten finalists in the 2016 2016 NYU-Poly CSAW Applied Research Competition. Today the judges announced that David’s paper took second place, winning a $750 prize. Congratulations!
[All News]
Recent Publications

How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles, Mortiz Contag, Guo Li, Andre Pawlowski, Flexi Domke, Stefan Savage, Kirill Levchenko, and Thorsten Holz, Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, May 2017.

To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild, Brown Farinholt, Mohammad Rezaeirad, Paul Pearce, Hitesh Dharamdasani, Haikuo Yin, Stevens LeBlond, Damon McCoy, and Kirill Levchenko, Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, May 2017.

Finding and Preventing Bugs in JavaScript Bindings, Fraser Brown, Shravan Narayan, Riad S. Wahby, Dawson Engler, Ranjit Jhala, and Deian Stefan, Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, May 2017.

How Do System Administrators Resolve Access-Denied Issues in the Real World?, Tianyin Xu, Han Min Naing, Le Lu, and Yuanyuan Zhou, Proceedings of the 35th Annual CHI Conference on Human Factors in Computing Systems (CHI'17), Denver, CO, USA, May 2017.

Pinning Down Abuse on Google Maps, Danny Yuxing Huang, Doug Grundman, Kurt Thomas, Elie Bursztein, Abhishek Kumar, Kirill Levchenko, and Alex C. Snoeren, Proceedings of the International World Wide Web Conference (WWW), Perth, Australia, April 2017.

Automated Analysis of Cybercriminal Markets, Rebecca S Portnoff, Sadia Afroz, Greg Durrett, Jonathan K Kummerfeld, Taylor Berg-Kirkpatrick, Damon McCoy, Kirill Levchenko, and Vern Paxson, Proceedings of the International World Wide Web Conference (WWW), Perth, Australia, April 2017.

A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations, Wilson Lian, Hovav Shacham, and Stefan Savage, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2017.

NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion, Mihir Bellare, Georg Fuchsbauer, and Alessandra Scafuro, Proceedings of Asiacrypt 2016, Hanoi, Vietnam, December 2016.

From Identification to Signatures, Tightly: A Framework and Generic Transforms, Mihir Bellare, Bertram Poettering, and Douglas Stebila, Proceedings of Asiacrypt 2016, Hanoi, Vietnam, December 2016.

[All Publications]
Affiliations
Center for Networked Systems (CNS)         Cooperative Association for Internet Data Analysis (CAIDA)       San Diego Super Computer Center (SDSC)        California Institute for Telecommunications and Information Technology (Cal-IT2) CalIT(2)
Sponsors