Security and Cryptography

Welcome to the web page for security and cryptography research in the Department of Computer Science and Engineering at the University of California at San Diego. Our group conducts research in areas spanning from theory to practice: we work on the theoretical foundations of cryptography; the development and analysis of cryptographic protocols and algorithms; and on applied cryptography, systems security, and network security. In line with our broad security-related research interests, we are affiliated and actively collaborate with both the Theory Group and the Systems and Networking Group here at UCSD.

People  |   News  |   Publications  |   Sponsors
Mihir Bellare
Russell Impagliazzo
Daniele Micciancio
Stefan Savage
Hovav Shacham
Deian Stefan
Geoffrey M. Voelker
Affiliated Faculty
kc claffy
Ranjit Jhala
Ryan Kastner
Sorin Lerner
Alex C. Snoeren
Steven Swanson
Keith Marzullo
Yuanyuan Zhou
Scientists, Postdocs and Research Staff
Brian Kantor
Kirill Levchenko
Cindy Moore
Björn Tackmann
PhD Students
Karyn Benson
Joe DeBlasio
Brown Farinholt
Danny Huang
Joseph Jaeger
David Kohlbrenner
Vector Lee
Wilson Lian
Igors Stepanovs
Edward Sullivan
Qiushi Wang
Michael Walter
Zhaomo Yang
MS Students
Danny Anderson
Erik Buchanan
Stephan Chenette
Louis DeKoven
Grant Jordan
Recent Alumni
Neha Chachra (Ph.D. 2015)Facebook
Matthew Der (Ph.D. 2015)
Tristan Halvorson (Ph.D. 2015)Google
He Liu (Lonnie) (Ph.D. 2015)Google
Keaton Mowery (Ph.D. 2015) Apple
Bhanu Vattikonda (Ph.D. 2015)Apple

Léo Ducas (postdoc 2013–2014) CWI Amsterdam
Viet Tung Hoang (postdoc 2013–2014) UMD/Georgetown (postdoc)

Sriram Keelveedhi (Ph.D. 2014)Google
Do-kyum Kim (Ph.D. 2014)Google
Feng Lu (Ph.D. 2014)Google
Sarah Meiklejohn (Ph.D. 2014)UCL
Jason Oberg (Ph.D. 2014)Tortuga Logic
David Wang (Ph.D. 2014)Google
Qing Zhang (Ph.D. 2014)Google

Vacha Dave (Postdoc 2013)Microsoft
Christian Kreibich (Researcher 2012–2013)
Nicholas Weaver (Researcher 2012–2013)ICSI

Vinh The Lam (Ph.D. 2013)Google
Petros Mol (Ph.D. 2013)Google
Andreas Pitsillidis (Ph.D. 2013)Google
Gjergji Zyba (Ph.D. 2013)Meraki

Nadia Heninger (postdoc 2011–2012) Microsoft Research New EnglandPenn
Stefano Tessaro (postdoc 2010–2012) MIT (postdoc)UC Santa Barbara

Stephen Checkoway (Ph.D. 2012) Johns HopkinsUniversity of Illinois at Chicago
Chris Kanich (Ph.D. 2012) → University of Illinois at Chicago
John McCullough (Ph.D. 2012) Google

Jacob Maskiewicz (M.S. 2016) Facebook

Ian Foster (M.S. 2015) Salesforce

Chris Gardner (M.S. 2014) Arris
Devin Lundberg (M.S. 2014) Pinterest

Michael Goldberg (M.S. 2013) Google

Soumyarupa De (M.S. 2012) Microsoft India
Rafael Dowsley (M.S. 2012) Karlsruhe Institute of Technology
Deepika Gopal (M.S. 2012) Cisco
Aishwarya Venkataraman (M.S. 2012) StackIQ

[All Alumni]
Recent News

Neha Chachra December 7— Congratulations to Neha Chachra, who successfully defended her dissertation today on "Understanding URL Abuse for Profit." Neha caps a long, creative career contributing to the department in many roles, from the "Learn from Peers" graduate student program to heading the graduate student association's procurement committee. In true style, she gets bonus points for her gift to her advisors on the day of her defense. Neha joins Facebook in February to make online social networks a more secure place. Bobbles
[All News]
Recent Publications

You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications, Frank Li, Zakir Durumeric, Jakub Czyz, Damon McCoy, Stefan Savage, Michael Bailey, and Vern Paxson, Proceedings of the USENIX Security Symposium, Austin, TX, August 2016.

On the (In)effectiveness of Mosaicing and Blurring as Tools for Document Redaction, Steven Hill, Zhimin Zhou, Lawrence Saul, and Hovav Shacham, Privacy Enhancing Technologies Symposium, Darmstadt, Germany, July 2016.

Automobile Driver Fingerprinting, Miro Enev, Alex Takakuwa, Karl Koscher, and Tadayoshi Kohno, Privacy Enhancing Technologies Symposium, Darmstadt, Germany, July 2016.

New Negative Results on Differing-Inputs Obfuscation, Mihir Bellare, Igors Stepanovs, and Brent Waters, Proceedings of Eurocrypt 2016, Vienna, May 2016.

Nonce-Based Cryptography: Retaining Security when Randomness Fails, Mihir Bellare and Björn Tackmann, Proceedings of Eurocrypt 2016, Vienna, May 2016.

Honey Encryption beyond Message Recovery Security, Joseph Jaeger, Thomas Ristenpart, and Qiang Tang, Proceedings of Eurocrypt 2016, Vienna, May 2016.

Hash-Function based PRFs: AMAC and its Multi-User Security, Mihir Bellare, Daniel J. Bernstein, and Stefano Tessaro, Proceedings of Eurocrypt 2016, Vienna, May 2016.

Practical, Predictable Lattice Basis Reduction, Daniele Micciancio and Michael Walter, Proceedings of Eurocrypt 2016, Vienna, May 2016.

HIPStR---Heterogeneous-ISA Program State Relocation, Ashish Venkat, Sriskanda Shamasunder, Dean Tullsen, and Hovav Shacham, Proceedings of the 21th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Atlanta, GA, April 2016.

Quantifying Hardware Security Using Joint Information Flow Analysis, Ryan Kastner, Wei Hu, and Alric Althoff, Proceedings of the Conference on Design, Automation, and Test in Europe (DATE), Dresden, Germany, March 2016.

Stressing Out: Bitcoin "Stress Testing", Khaled Baqer, Danny Yuxing Huang, Nicholas Weaver, and Damon McCoy, BITCOIN '14: The Third Workshop on Bitcoin and Blockchain Research, Christ Church, Barbados, February 2016.

Protecting C++ Dynamic Dispatch Through VTable Interleaving, Dimitar Bounov, Rami Gökhan Kici, and Sorin Lerner, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2016.

Contention in Cryptoland: Obfuscation, Leakage and UCE, Mihir Bellare, Igors Stepanovs, and Stefano Tessaro, Proceedings of TCC 2016-A, Tel Aviv, January 2016.

Non-Malleable Encryption: Simpler, Shorter, Stronger, Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, and Daniele Venturi, Proceedings of TCC 2016-A, Tel Aviv, January 2016.

Point-Function Obfuscation: A Framework and Generic Constructions, Mihir Bellare and Igors Stepanovs, Proceedings of TCC 2016-A, Tel Aviv, January 2016.

Exploring Controller Area Networks, Ian Foster and Karl Koscher, USENIX ;login: 40(6), December 2015.

Robust Authenticated Encryption and the Limits of Symmetric Cryptography, Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, and Björn Tackmann, Proceedings of the 15th IMA International Conference on Cryptography and Coding, Oxford, December 2015.

(De-)Constructing TLS 1.3, Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, and Daniele Venturi, Proceedings of Indocrypt 2015, Bangalore, India, December 2015.

[All Publications]
Center for Networked Systems (CNS)         Cooperative Association for Internet Data Analysis (CAIDA)       San Diego Super Computer Center (SDSC)        California Institute for Telecommunications and Information Technology (Cal-IT2) CalIT(2)