Security and Cryptography

Welcome to the web page for security and cryptography research in the Department of Computer Science and Engineering at the University of California at San Diego. Our group conducts research in areas spanning from theory to practice: we work on the theoretical foundations of cryptography; the development and analysis of cryptographic protocols and algorithms; and on applied cryptography, systems security, and network security. In line with our broad security-related research interests, we are affiliated and actively collaborate with both the Theory Group and the Systems and Networking Group here at UCSD.

People  |   News  |   Publications  |   Sponsors
Faculty
Mihir Bellare
Russell Impagliazzo
Daniele Micciancio
Stefan Savage
Hovav Shacham
Deian Stefan
Geoffrey M. Voelker
Affiliated Faculty
kc claffy
Ranjit Jhala
Ryan Kastner
Sorin Lerner
Alex C. Snoeren
Steven Swanson
Yuanyuan Zhou
Scientists, Postdocs and Research Staff
Brian Kantor
Kirill Levchenko
Cindy Moore
PhD Students
Joe DeBlasio
Louis DeKoven
Brown Farinholt
Danny Huang
Joseph Jaeger
Brian Johannesmeyer
David Kohlbrenner
Guo “Vector” Lee
Baiyu Li
Ariana Mirian
Ruth Ng
Jessica Sorrell
Igors Stepanovs
Edward Sullivan
Qiushi Wang
Michael Walter
Zhaomo Yang
MS Students
Danny Anderson
Erik Buchanan
Stephan Chenette
Grant Jordan
Recent Alumni
Björn Tackmann (postdoc 2014–2016) IBM Research Zurich

Wilson Lian (Ph.D. 2016)Google
Karyn Benson (Ph.D. 2016)Akamai

Neha Chachra (Ph.D. 2015)Facebook
Matthew Der (Ph.D. 2015)notch.io
Tristan Halvorson (Ph.D. 2015)Google
He Liu (Lonnie) (Ph.D. 2015)Google
Keaton Mowery (Ph.D. 2015) Apple
Bhanu Vattikonda (Ph.D. 2015)Apple

Léo Ducas (postdoc 2013–2014) CWI Amsterdam
Viet Tung Hoang (postdoc 2013–2014) UMD/Georgetown (postdoc)UCSB (postdoc) → Florida State University

Sriram Keelveedhi (Ph.D. 2014)Google
Do-kyum Kim (Ph.D. 2014)Google
Feng Lu (Ph.D. 2014)Google
Sarah Meiklejohn (Ph.D. 2014)UCL
Jason Oberg (Ph.D. 2014)Tortuga Logic
David Wang (Ph.D. 2014)Google
Qing Zhang (Ph.D. 2014)Google

Vacha Dave (Postdoc 2013)Microsoft
Christian Kreibich (Researcher 2012–2013)
Lastline
Nicholas Weaver (Researcher 2012–2013)ICSI

Vinh The Lam (Ph.D. 2013)Google
Petros Mol (Ph.D. 2013)Google
Andreas Pitsillidis (Ph.D. 2013)Google
Gjergji Zyba (Ph.D. 2013)Meraki

Jacob Maskiewicz (M.S. 2016) Facebook

Ian Foster (M.S. 2015) Salesforce
Radheshyam Balasundaram (M.S. 2015) Google

Chris Gardner (M.S. 2014) Arris
Devin Lundberg (M.S. 2014) Pinterest

Michael Goldberg (M.S. 2013) Google

[All Alumni]
Recent News

Stefan Savage October 11Stefan Savage is a 2017 MacArthur Fellow!

August 16David Moore, Geoff Voelker, and Stefan Savage have won the 2017 USENIX Security Test-of-Time Award for their 2001 paper, “Inferring Internet Denial-of-Service Activity.“ Geoff Volker

IRTF July 20— At IETF 99, Ph.D. alum Steve Checkoway presented “A Systematic Analysis of the Juniper Dual EC Incident,” a winner of the IRTF Applied Networking Research Prize. Steve’s coauthors on the paper, which was published at ACM CCS 2016, include several with a UCSD connection: B.S./M.S. alum Jake Maskiewicz, former postdoc Nadia Heninger, and professor Hovav Shacham.
[All News]
Recent Publications

Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research, Alex Gamero-Garrido, Stefan Savage, Kirill Levchenko, and Alex C. Snoeren, Proceedings of the ACM Conference on Computer and Communications Security, Dallas, Texas, November 2017.

Better Than Advertised: Improved Security Guarantees for MD-Based Hash Functions, Mihir Bellare, Joseph Jaeger, and Julia Len, Proceedings of the ACM Conference on Computer and Communications Security, Dallas, Texas, November 2017.

Defending Against Key Exfiltration: Efficiency Improvements for BIG-Key Cryptography via Large-Alphabet Subkey Prediction, Mihir Bellare and Wei Dai, Proceedings of the ACM Conference on Computer and Communications Security, Dallas, Texas, November 2017.

Identity-Based Format-Preserving Encryption, Mihir Bellare and Viet Tung Hoang, Proceedings of the ACM Conference on Computer and Communications Security, Dallas, Texas, November 2017.

Tripwire: Inferring Internet Site Compromise, Joe DeBlasio, Stefan Savage, Geoffrey M. Voelker, and Alex C. Snoeren, Proceedings of the ACM Internet Measurement Conference, London, UK, November 2017.

Exploring the Dynamics of Search Advertiser Fraud, Joe DeBlasio, Saikat Guha, Geoffrey M. Voelker, and Alex C. Snoeren, Proceedings of the ACM Internet Measurement Conference, London, UK, November 2017.

Backpage and Bitcoin: Uncovering Human Traffickers, Rebecca S. Portnoff, Danny Yuxing Huang, Periwinkle Doerfler, Sadia Afroz, and Damon McCoy, Proceedings of the ACM SIGKDD Conference, Halifax, Nova Scotia, August 2017.

Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX, Craig Disselkoen, David Kohlbrenner, Leo Porter, and Dean Tullsen, Proceedings of the USENIX Security Symposium, Vancouver, BC, Canada, August 2017.

On the Effectiveness of Mitigations against Floating-Point Timing Channels, David Kohlbrenner and Hovav Shacham, Proceedings of the USENIX Security Symposium, Vancouver, BC, Canada, August 2017.

Dead Store Elimination (Still) Considered Harmful, Zhaomo Yang, Brian Johannesmeyer, Anders Trier Olesen, Sorin Lerner, and Kirill Levchenko, Proceedings of the USENIX Security Symposium, Vancouver, BC, Canada, August 2017.

Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser, Louis F. DeKoven, Stefan Savage, Goeffrey M. Voelker, and Nektarios Lentiadis, Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2017.

[All Publications]
Affiliations
Center for Networked Systems (CNS)         Cooperative Association for Internet Data Analysis (CAIDA)       San Diego Super Computer Center (SDSC)        California Institute for Telecommunications and Information Technology (Cal-IT2) CalIT(2)
Sponsors