Security and Cryptography

Welcome to the web page for security and cryptography research in the Department of Computer Science and Engineering at the University of California at San Diego. Our group conducts research in areas spanning from theory to practice: we work on the theoretical foundations of cryptography; the development and analysis of cryptographic protocols and algorithms; and on applied cryptography, systems security, and network security. In line with our broad security-related research interests, we are affiliated and actively collaborate with both the Theory Group and the Systems and Networking Group here at UCSD.

People  |   News  |   Publications  |   Sponsors
Mihir Bellare
Russell Impagliazzo
Daniele Micciancio
Stefan Savage
Hovav Shacham
Deian Stefan
Geoffrey M. Voelker
Affiliated Faculty
kc claffy
Ranjit Jhala
Ryan Kastner
Sorin Lerner
Alex C. Snoeren
Steven Swanson
Yuanyuan Zhou
Scientists, Postdocs and Research Staff
Brian Kantor
Kirill Levchenko
Cindy Moore
PhD Students
Joe DeBlasio
Louis DeKoven
Brown Farinholt
Danny Huang
Joseph Jaeger
Brian Johannesmeyer
David Kohlbrenner
Guo “Vector” Lee
Baiyu Li
Ariana Mirian
Ruth Ng
Jessica Sorrell
Igors Stepanovs
Edward Sullivan
Qiushi Wang
Michael Walter
Zhaomo Yang
MS Students
Danny Anderson
Erik Buchanan
Stephan Chenette
Grant Jordan
Recent Alumni
Björn Tackmann (postdoc 2014–2016) IBM Research Zurich

Wilson Lian (Ph.D. 2016)Google
Karyn Benson (Ph.D. 2016)Akamai

Neha Chachra (Ph.D. 2015)Facebook
Matthew Der (Ph.D. 2015)
Tristan Halvorson (Ph.D. 2015)Google
He Liu (Lonnie) (Ph.D. 2015)Google
Keaton Mowery (Ph.D. 2015) Apple
Bhanu Vattikonda (Ph.D. 2015)Apple

Léo Ducas (postdoc 2013–2014) CWI Amsterdam
Viet Tung Hoang (postdoc 2013–2014) UMD/Georgetown (postdoc)UCSB (postdoc) → Florida State University

Sriram Keelveedhi (Ph.D. 2014)Google
Do-kyum Kim (Ph.D. 2014)Google
Feng Lu (Ph.D. 2014)Google
Sarah Meiklejohn (Ph.D. 2014)UCL
Jason Oberg (Ph.D. 2014)Tortuga Logic
David Wang (Ph.D. 2014)Google
Qing Zhang (Ph.D. 2014)Google

Vacha Dave (Postdoc 2013)Microsoft
Christian Kreibich (Researcher 2012–2013)
Nicholas Weaver (Researcher 2012–2013)ICSI

Vinh The Lam (Ph.D. 2013)Google
Petros Mol (Ph.D. 2013)Google
Andreas Pitsillidis (Ph.D. 2013)Google
Gjergji Zyba (Ph.D. 2013)Meraki

Jacob Maskiewicz (M.S. 2016) Facebook

Ian Foster (M.S. 2015) Salesforce
Radheshyam Balasundaram (M.S. 2015) Google

Chris Gardner (M.S. 2014) Arris
Devin Lundberg (M.S. 2014) Pinterest

Michael Goldberg (M.S. 2013) Google

[All Alumni]
Recent News

November 12— This week, David Kohlbrenner traveled to Brooklyn to present his USENIX 2016 paper, “Trusted Browsers for Uncertain Times”, one of ten finalists in the 2016 2016 NYU-Poly CSAW Applied Research Competition. Today the judges announced that David’s paper took second place, winning a $750 prize. Congratulations!

September 25— UCSD B.S./M.S. alum Jake Maskiewicz, Ph.D. alum Steve Checkoway, and former postdoc Nadia Heninger won a Best Paper award at ACM CCS 2016 for their paper “A Systematic Analysis of the Juniper Dual EC Incident”! Jake presented the paper. Congratulations to Jake, Steve, Nadia, and their coauthors!

September 15— Congratulations to Wilson Lian who defended his dissertation today, titled "JIT Spraying Threats on ARM and Defense by Diversification" (and coming soon to an NDSS near you)!
[All News]
Recent Publications

A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations, Wilson Lian, Hovav Shacham, and Stefan Savage, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2017.

How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles, Mortiz Contag, Guo Li, Andre Pawlowski, Flexi Domke, Stefan Savage, Kirill Levchenko, and Thorsten Holz, Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, May 2017.

NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion, Mihir Bellare, Georg Fuchsbauer, and Alessandra Scafuro, Proceedings of Asiacrypt 2016, Hanoi, Vietnam, December 2016.

From Identification to Signatures, Tightly: A Framework and Generic Transforms, Mihir Bellare, Bertram Poettering, and Douglas Stebila, Proceedings of Asiacrypt 2016, Hanoi, Vietnam, December 2016.

Simultaneous Secrecy and Reliability Amplification for a General Channel Model, Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets, Bruce M. Kapron, Valerie King, and Stefano Tessaro, Proceedings of TCC 2016-B, Beijing, October 2016.

Compactness vs Collusion Resistance in Functional Encryption, Baiyu Li and Daniele Micciancio, Proceedings of TCC 2016-B, Beijing, October 2016.

Message-Recovery Attacks on Feistel-Based Format Preserving Encryption, Mihir Bellare, Viet Tung Hoang, and Stefano Tessaro, Proceedings of the ACM Conference on Computer and Communications Security, Vienna, October 2016.

Superhacks: Exploring and Preventing Vulnerabilities in Browser Binding Code, Fraser Brown and Deian Stefan, Proceedings of the Workshop on Programming Languages and Analysis for Security (PLAS), Vienna, October 2016.

A Systematic Analysis of the Juniper Dual EC Incident, Stephen Checkoway, Jake Maskiewicz, Christina Garman, Josh Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, and Hovav Shacham, Proceedings of the ACM Conference on Computer and Communications Security, Vienna, October 2016.

[All Publications]
Center for Networked Systems (CNS)         Cooperative Association for Internet Data Analysis (CAIDA)       San Diego Super Computer Center (SDSC)        California Institute for Telecommunications and Information Technology (Cal-IT2) CalIT(2)