Security and Cryptography

Welcome to the web page for security and cryptography research in the Department of Computer Science and Engineering at the University of California at San Diego. Our group conducts research in areas spanning from theory to practice: we work on the theoretical foundations of cryptography; the development and analysis of cryptographic protocols and algorithms; and on applied cryptography, systems security, and network security. In line with our broad security-related research interests, we are affiliated and actively collaborate with both the Theory Group and the Systems and Networking Group here at UCSD.

People  |   News  |   Publications  |   Sponsors
Faculty
Mihir Bellare
Russell Impagliazzo
Daniele Micciancio
Stefan Savage
Hovav Shacham
Geoffrey M. Voelker
Affiliated Faculty
kc claffy
Ranjit Jhala
Ryan Kastner
Sorin Lerner
Alex C. Snoeren
Steven Swanson
Keith Marzullo
Yuanyuan Zhou
Postdocs and Research Staff
Brian Kantor
Vacha Dave
Kirill Levchenko
PhD Students
Karyn Benson
Neha Chachra
Matt Der
Mayank Dhiman
Rafael Dowsley
Brown Farinholt
Michael Goldberg
Tristan Halvorson
Sriram Keelveedhi
Do-kyum Kim
David Kohlbrenner
Wilson Lian
He Liu (Lonnie)
Feng Lu
Sarah Meiklejohn
Petros Mol
Keaton Mowery
Jason Oberg
Edward Sullivan
Qing Zhang
MS Students
Danny Anderson
Erik Buchanan
Stephan Chenette
Grant Jordan
David Wang
Undergraduate Students
Jacob Maskiewicz
Recent Alumni
Vinh The Lam (Ph.D. 2013)Google
Nadia Heninger (postdoc 2011–2012) Microsoft Research New EnglandPenn
Stefano Tessaro (postdoc 2010–2012) MIT (postdoc)UC Santa Barbara
Chris Kanich (Ph.D. 2012) University of Illinois at Chicago
Stephen Checkoway (Ph.D. 2012) Johns Hopkins
John McCullough (Ph.D. 2012) Google
Damon McCoy (postdoc 2009–2011)George Mason University
David Cash (postdoc 2009–2011) IBM ResearchRutgers University
Panagiotis Voulgaris (Ph.D. 2011) Google
Marti Motoyama (Ph.D. 2011) FitBit
Michael Vrable (Ph.D. 2011) Google
Thomas Ristenpart (Ph.D. 2010) University of Wisconsin at Madison
Scott Yilek (Ph.D. 2010) University of St. Thomas
Justin Ma (Ph.D. 2010)UC Berkeley (postdoc)Google
Patrick Verkaik (Ph.D. 2010) Meraki
Barath Raghavan (Ph.D. 2009)Williams College
David Moore (Ph.D. 2009)Cisco
Soumyarupa De (M.S. 2012) Microsoft India
Deepika Gopal (M.S. 2012) Cisco
Aishwarya Venkataraman (M.S. 2012) StackIQ
Sushma Bannur (M.S. 2011) Microsoft
Sambit Das (M.S. 2011) EricssonCisco
Kourosh Derakshan (M.S. 2011) Qualcomm
Moitrayee Gupta (M.S. 2011) NetApp
Grace Wang (M.S. 2010)Qualcomm
Brandon Enright (B.S. 2010) Cisco
Todor Ristov (M.S. 2009)MotorolaQualcomm
Ryan Roemer (M.S. 2009)MicrosoftIP Street
[All Alumni]
Recent News
[All News]
Recent Publications

Too LeJIT to Quit: Extending JIT Spraying to ARM, Wilson Lian, Hovav Shacham, and Stefan Savage, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2015.

Characterizing Large-Scale Click Fraud in ZeroAccess, Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Conference on Computer and Communications Security, Scottsdale, Arizona, November 2014.

On The Security of Mobile Cockpit Information Systems, Devin Lundberg, Brown Farinholt, Edward Sullivan, Ryan Mast, Stephen Checkoway, Stefan Savage, Alex C. Snoeren, and Kirill Levchenko, Proceedings of the ACM Conference on Computer and Communications Security, Scottsdale, Arizona, November 2014.

Deniable Liaisons, Abhinav Narain, Nick Feamster, and Alex C. Snoeren, Proceedings of the ACM Conference on Computer and Communications Security, Scottsdale, Arizona, November 2014.

Algebraic MACs and Keyed-Verification Anonymous Credentials, Melissa Chase, Sarah Meiklejohn, and Greg Zaverucha, Proceedings of the ACM Conference on Computer and Communications Security, Scottsdale, Arizona, November 2014.

Search + Seizure: The Effectiveness of Interventions on SEO Campaigns, David Wang, Matthew Der, Mohammad Karami, Lawrence Saul, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference, Vancouver, BC, Canada, November 2014.

Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild, Borbala Benko, Elie Bursztein, Daniel Margolis, Tadek Pietraszek, Andy Archer, Allan Aquino, Andreas Pitsillidis, and Stefan Savage, Proceedings of the ACM Internet Measurement Conference, Vancouver, BC, Canada, November 2014.

On the Practical Exploitability of Dual-EC in TLS Implementations, Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, and Hovav Shacham, Proceedings of the USENIX Security Symposium, San Diego, CA, August 2014.

Hulk: Eliciting Malicious Behavior in Browser Extensions, Alexandros Kapravelos, Chris Grier, Neha Chachra, Chris Kruegel, Giovanni Vigna, and Vern Paxson, Proceedings of the USENIX Security Symposium, San Diego, CA, August 2014.

Security Analysis of a Full-Body Scanner, Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, and Hovav Shacham, Proceedings of the USENIX Security Symposium, San Diego, CA, August 2014.

Mouse Trap: Exploiting Firmware Updates in USB Peripherals, Jacob Maskiewicz, Benjamin Ellis, James Mouradian, and Hovav Shacham, Proceedings of Workshop On Offensive Technologies (WOOT), August 2014.

Knock It Off: Profiling the Online Storefronts of Counterfeit Merchandise, Matthew Der, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM SIGKDD Conference, Washington D.C., August 2014.

Security of Symmetric Encryption against Mass Surveillance, Mihir Bellare, Kenneth G. Paterson, and Philip Rogaway, Proceedings of Crypto 2014, Santa Barbara, CA, August 2014.

Cryptography from Compression Functions: The UCE Bridge to the ROM, Mihir Bellare, Viet Tung Hoang, and Sriram Keelveedhi, Proceedings of Crypto 2014, Santa Barbara, CA, August 2014.

Improved Short Lattice Sigantures in the Standard Model, Leo Ducas and Daniele Micciancio, Proceedings of Crypto 2014, Santa Barbara, CA, August 2014.

Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting, Neha Chachra, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the Workshop on the Economics of Information Security (WEIS), State College, PA, June 2014.

Locally Dense Codes, Daniele Micciancio, 29th Annual IEEE Conference on Computational Complexity (CCC 2014), Vancouver, BC, Canada, June 2014.

[All Publications]
Affiliations
Center for Networked Systems (CNS)         Cooperative Association for Internet Data Analysis (CAIDA)       San Diego Super Computer Center (SDSC)        California Institute for Telecommunications and Information Technology (Cal-IT2) CalIT(2)
Sponsors