Security and Cryptography

Welcome to the web page for security and cryptography research in the Department of Computer Science and Engineering at the University of California at San Diego. Our group conducts research in areas spanning from theory to practice: we work on the theoretical foundations of cryptography; the development and analysis of cryptographic protocols and algorithms; and on applied cryptography, systems security, and network security. In line with our broad security-related research interests, we are affiliated and actively collaborate with both the Theory Group and the Systems and Networking Group here at UCSD.

People  |   News  |   Publications  |   Sponsors
Mihir Bellare
Russell Impagliazzo
Daniele Micciancio
Stefan Savage
Hovav Shacham
Geoffrey M. Voelker
Affiliated Faculty
kc claffy
Ranjit Jhala
Ryan Kastner
Sorin Lerner
Alex C. Snoeren
Steven Swanson
Keith Marzullo
Yuanyuan Zhou
Postdocs and Research Staff
Brian Kantor
Vacha Dave
Kirill Levchenko
PhD Students
Karyn Benson
Neha Chachra
Matt Der
Mayank Dhiman
Rafael Dowsley
Brown Farinholt
Michael Goldberg
Tristan Halvorson
Sriram Keelveedhi
Do-kyum Kim
David Kohlbrenner
Wilson Lian
He Liu (Lonnie)
Feng Lu
Sarah Meiklejohn
Petros Mol
Keaton Mowery
Jason Oberg
Edward Sullivan
Qing Zhang
MS Students
Danny Anderson
Erik Buchanan
Stephan Chenette
Grant Jordan
David Wang
Undergraduate Students
Jacob Maskiewicz
Recent Alumni
Vinh The Lam (Ph.D. 2013)Google
Nadia Heninger (postdoc 2011–2012) Microsoft Research New EnglandPenn
Stefano Tessaro (postdoc 2010–2012) MIT (postdoc)UC Santa Barbara
Chris Kanich (Ph.D. 2012) University of Illinois at Chicago
Stephen Checkoway (Ph.D. 2012) Johns Hopkins
John McCullough (Ph.D. 2012) Google
Damon McCoy (postdoc 2009–2011)George Mason University
David Cash (postdoc 2009–2011) IBM ResearchRutgers University
Panagiotis Voulgaris (Ph.D. 2011) Google
Marti Motoyama (Ph.D. 2011) FitBit
Michael Vrable (Ph.D. 2011) Google
Thomas Ristenpart (Ph.D. 2010) University of Wisconsin at Madison
Scott Yilek (Ph.D. 2010) University of St. Thomas
Justin Ma (Ph.D. 2010)UC Berkeley (postdoc)Google
Patrick Verkaik (Ph.D. 2010) Meraki
Barath Raghavan (Ph.D. 2009)Williams College
David Moore (Ph.D. 2009)Cisco
Soumyarupa De (M.S. 2012) Microsoft India
Deepika Gopal (M.S. 2012) Cisco
Aishwarya Venkataraman (M.S. 2012) StackIQ
Sushma Bannur (M.S. 2011) Microsoft
Sambit Das (M.S. 2011) EricssonCisco
Kourosh Derakshan (M.S. 2011) Qualcomm
Moitrayee Gupta (M.S. 2011) NetApp
Grace Wang (M.S. 2010)Qualcomm
Brandon Enright (B.S. 2010) Cisco
Todor Ristov (M.S. 2009)MotorolaQualcomm
Ryan Roemer (M.S. 2009)MicrosoftIP Street
[All Alumni]
Recent News

March 31— In an article titled ‘Exclusive: NSA infiltrated RSA security more deeply than thought — study,’ Joseph Menn at Reuters reports on new research from a group that includes UCSD alums Steve Checkoway and Tom Ristenpart, current UCSD undergrad Jake Maskiewicz, and collaborators from Wisconsin, TU Eindhoven, Johns Hopkins, and UIC.

March 5— Alum Chris Kanich, now a professor at UIC, has won an NSF CAREER award. Congrats, Chris!

December 18— Alum Steve Checkoway’s paper showing that Mac laptop cameras can be reprogrammed to disable the camera-on LED is written up in the Washington Post.

December 10Mihir Bellare and YY Zhou are named Fellows of the ACM. Congrats to both!
[All News]
Recent Publications

Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting, Neha Chachra, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the Workshop on the Economics of Information Security (WEIS), State College, PA, June 2014.

Key-Versatile Signatures and Applications: RKA, KDM, and Joint Enc/Sig, Mihir Bellare, Sarah Meiklejohn, and Susan Thomson, Proceedings of Eurocrypt 2014, Copenhagen, Denmark, May 2014.

Deja Q: Using Dual Systems to Revisit q-Type Assumptions, Melissa Chase and Sarah Meiklejohn, Proceedings of Eurocrypt 2014, Copenhagen, Denmark, May 2014.

A Gaussian Latent Variable Model for Large Margin Classification of Labeled and Unlabeled Data, Do-kyum Kim, Matthew Der, and Lawrence K. Saul, Proceedings of the 17th International Conference on Artificial Intelligence and Statistics (AISTATS), Reykjavik, Iceland, April 2014.

XXXtortion? Inferring Registration Intent in the .XXX TLD, Tristan Halvorson, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the International World Wide Web Conference (WWW), Seoul, Korea, April 2014.

Botcoin: Monetizing Stolen Cycles, Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Kirill Levchenko, Alex C. Snoeren, Stefan Savage, Nicholas Weaver, Chris Grier, and Damon McCoy, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014.

DSpin: Detecting Automatically Spun Content on the Web, Qing Zhang, David Wang, and Geoffrey M. Voelker, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014.

SafeDispatch: Security C++ Virtual Calls, Dongseok Jang, Zachary Tatlock, and Sorin Lerner, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014.

A Fistful of Bitcoins: Characterizing Payments Among Men with No Names, Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage, USENIX ;login: 38(6), December 2013.

ViceROI: Catching Click-Spam in Search Ad Networks, Vacha Dave, Saikat Guha, and Yin Zhang, Proceedings of the ACM Conference on Computer and Communications Security, Berlin, Germany, November 2013.

Eliminating Timing Information Flows in a Mix-trusted System-on-Chip, Jason Oberg, Timothy Sherwood, and Ryan Kastner, IEEE Design and Test of Computers, 2013.

Compact Proofs of Retrievability, Hovav Shacham and Brent Waters, Journal of Cryptology, 2013.

[All Publications]
Center for Networked Systems (CNS)         Cooperative Association for Internet Data Analysis (CAIDA)       San Diego Super Computer Center (SDSC)        California Institute for Telecommunications and Information Technology (Cal-IT2) CalIT(2)