Security and Cryptography

Welcome to the web page for security and cryptography research in the Department of Computer Science and Engineering at the University of California at San Diego. Our group conducts research in areas spanning from theory to practice: we work on the theoretical foundations of cryptography; the development and analysis of cryptographic protocols and algorithms; and on applied cryptography, systems security, and network security. In line with our broad security-related research interests, we are affiliated and actively collaborate with both the Theory Group and the Systems and Networking Group here at UCSD.

People  |   News  |   Publications  |   Sponsors
Faculty
Mihir Bellare
Russell Impagliazzo
Daniele Micciancio
Stefan Savage
Hovav Shacham
Geoffrey M. Voelker
Affiliated Faculty
kc claffy
Ranjit Jhala
Ryan Kastner
Sorin Lerner
Alex C. Snoeren
Steven Swanson
Keith Marzullo
Yuanyuan Zhou
Postdocs and Research Staff
Brian Kantor
Vacha Dave
Kirill Levchenko
PhD Students
Karyn Benson
Neha Chachra
Matt Der
Mayank Dhiman
Rafael Dowsley
Brown Farinholt
Michael Goldberg
Tristan Halvorson
Sriram Keelveedhi
Do-kyum Kim
David Kohlbrenner
Wilson Lian
He Liu (Lonnie)
Feng Lu
Sarah Meiklejohn
Petros Mol
Keaton Mowery
Jason Oberg
Edward Sullivan
Qing Zhang
MS Students
Danny Anderson
Erik Buchanan
Stephan Chenette
Grant Jordan
David Wang
Undergraduate Students
Jacob Maskiewicz
Recent Alumni
Vinh The Lam (Ph.D. 2013)Google
Nadia Heninger (postdoc 2011–2012) Microsoft Research New EnglandPenn
Stefano Tessaro (postdoc 2010–2012) MIT (postdoc)UC Santa Barbara
Chris Kanich (Ph.D. 2012) University of Illinois at Chicago
Stephen Checkoway (Ph.D. 2012) Johns Hopkins
John McCullough (Ph.D. 2012) Google
Damon McCoy (postdoc 2009–2011)George Mason University
David Cash (postdoc 2009–2011) IBM ResearchRutgers University
Panagiotis Voulgaris (Ph.D. 2011) Google
Marti Motoyama (Ph.D. 2011) FitBit
Michael Vrable (Ph.D. 2011) Google
Thomas Ristenpart (Ph.D. 2010) University of Wisconsin at Madison
Scott Yilek (Ph.D. 2010) University of St. Thomas
Justin Ma (Ph.D. 2010)UC Berkeley (postdoc)Google
Patrick Verkaik (Ph.D. 2010) Meraki
Barath Raghavan (Ph.D. 2009)Williams College
David Moore (Ph.D. 2009)Cisco
Soumyarupa De (M.S. 2012) Microsoft India
Deepika Gopal (M.S. 2012) Cisco
Aishwarya Venkataraman (M.S. 2012) StackIQ
Sushma Bannur (M.S. 2011) Microsoft
Sambit Das (M.S. 2011) EricssonCisco
Kourosh Derakshan (M.S. 2011) Qualcomm
Moitrayee Gupta (M.S. 2011) NetApp
Grace Wang (M.S. 2010)Qualcomm
Brandon Enright (B.S. 2010) Cisco
Todor Ristov (M.S. 2009)MotorolaQualcomm
Ryan Roemer (M.S. 2009)MicrosoftIP Street
[All Alumni]
Recent News

March 31— In an article titled ‘Exclusive: NSA infiltrated RSA security more deeply than thought — study,’ Joseph Menn at Reuters reports on new research from a group that includes UCSD alums Steve Checkoway and Tom Ristenpart, current UCSD undergrad Jake Maskiewicz, and collaborators from Wisconsin, TU Eindhoven, Johns Hopkins, and UIC.

March 5— Alum Chris Kanich, now a professor at UIC, has won an NSF CAREER award. Congrats, Chris!
[All News]
Recent Publications

Characterizing Large-Scale Click Fraud in ZeroAccess, Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Conference on Computer and Communications Security, Scotsdale, Arizona, November 2014.

On The Security of Mobile Cockpit Information Systems, Devin Lundberg, Brown Farinholt, Edward Sullivan, Ryan Mast, Stephen Checkoway, Stefan Savage, Alex C. Snoeren, and Kirill Levchenko, Proceedings of the ACM Conference on Computer and Communications Security, Scotsdale, Arizona, November 2014.

Deniable Liaisons, Abhinav Narain, Nick Feamster, and Alex C. Snoeren, Proceedings of the ACM Conference on Computer and Communications Security, Scotsdale, Arizona, November 2014.

Algebraic MACs and Keyed-Verification Anonymous Credentials, Melissa Chase, Sarah Meiklejohn, and Greg Zaverucha, Proceedings of the ACM Conference on Computer and Communications Security, Scotsdale, Arizona, November 2014.

Search + Seizure: The Effectiveness of Interventions on SEO Campaigns, David Wang, Matthew Der, Mohammad Karami, Lawrence Saul, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference, Vancouver, BC, Canada, November 2014.

Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild, Borbala Benko, Elie Bursztein, Daniel Margolis, Tadek Pietraszek, Andy Archer, Allan Aquino, Andreas Pitsillidis, and Stefan Savage, Proceedings of the ACM Internet Measurement Conference, Vancouver, BC, Canada, November 2014.

On the Practical Exploitability of Dual-EC in TLS Implementations, Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, and Hovav Shacham, Proceedings of the USENIX Security Symposium, San Diego, CA, August 2014.

Hulk: Eliciting Malicious Behavior in Browser Extensions, Alexandros Kapravelos, Chris Grier, Neha Chachra, Chris Kruegel, Giovanni Vigna, and Vern Paxson, Proceedings of the USENIX Security Symposium, San Diego, CA, August 2014.

Security Analysis of a Full-Body Scanner, Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, and Hovav Shacham, Proceedings of the USENIX Security Symposium, San Diego, CA, August 2014.

Knock It Off: Profiling the Online Storefronts of Counterfeit Merchandise, Matthew Der, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM SIGKDD Conference, Washington D.C., August 2014.

Security of Symmetric Encryption against Mass Surveillance, Mihir Bellare, Kenneth G. Paterson, and Philip Rogaway, Proceedings of Crypto 2014, Santa Barbara, CA, August 2014.

Cryptography from Compression Functions: The UCE Bridge to the ROM, Mihir Bellare, Viet Tung Hoang, and Sriram Keelveedhi, Proceedings of Crypto 2014, Santa Barbara, CA, August 2014.

Improved Short Lattice Sigantures in the Standard Model, Leo Ducas and Daniele Micciancio, Proceedings of Crypto 2014, Santa Barbara, CA, August 2014.

Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting, Neha Chachra, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the Workshop on the Economics of Information Security (WEIS), State College, PA, June 2014.

Locally Dense Codes, Daniele Micciancio, 29th Annual IEEE Conference on Computational Complexity (CCC 2014), Vancouver, BC, Canada, June 2014.

Key-Versatile Signatures and Applications: RKA, KDM, and Joint Enc/Sig, Mihir Bellare, Sarah Meiklejohn, and Susan Thomson, Proceedings of Eurocrypt 2014, Copenhagen, Denmark, May 2014.

Deja Q: Using Dual Systems to Revisit q-Type Assumptions, Melissa Chase and Sarah Meiklejohn, Proceedings of Eurocrypt 2014, Copenhagen, Denmark, May 2014.

A Gaussian Latent Variable Model for Large Margin Classification of Labeled and Unlabeled Data, Do-kyum Kim, Matthew Der, and Lawrence K. Saul, Proceedings of the 17th International Conference on Artificial Intelligence and Statistics (AISTATS), Reykjavik, Iceland, April 2014.

XXXtortion? Inferring Registration Intent in the .XXX TLD, Tristan Halvorson, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the International World Wide Web Conference (WWW), Seoul, Korea, April 2014.

Botcoin: Monetizing Stolen Cycles, Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Kirill Levchenko, Alex C. Snoeren, Stefan Savage, Nicholas Weaver, Chris Grier, and Damon McCoy, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014.

DSpin: Detecting Automatically Spun Content on the Web, Qing Zhang, David Wang, and Geoffrey M. Voelker, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014.

SafeDispatch: Security C++ Virtual Calls, Dongseok Jang, Zachary Tatlock, and Sorin Lerner, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014.

[All Publications]
Affiliations
Center for Networked Systems (CNS)         Cooperative Association for Internet Data Analysis (CAIDA)       San Diego Super Computer Center (SDSC)        California Institute for Telecommunications and Information Technology (Cal-IT2) CalIT(2)
Sponsors