Cryptography and Security News
2014 │ 2013 │ 2012 │ 2011 │ 2010 │ 2009 │ 2008 │ 2007 │ 2006 │ 2005 │ 2004 │ 2003 │ 2002 │ 2001 │ 2000 │ 1999

November 12— This week, David Kohlbrenner traveled to Brooklyn to present his USENIX 2016 paper, “Trusted Browsers for Uncertain Times”, one of ten finalists in the 2016 2016 NYU-Poly CSAW Applied Research Competition. Today the judges announced that David’s paper took second place, winning a $750 prize. Congratulations!

September 25— UCSD B.S./M.S. alum Jake Maskiewicz, Ph.D. alum Steve Checkoway, and former postdoc Nadia Heninger won a Best Paper award at ACM CCS 2016 for their paper “A Systematic Analysis of the Juniper Dual EC Incident”! Jake presented the paper. Congratulations to Jake, Steve, Nadia, and their coauthors!

September 15— Congratulations to Wilson Lian who defended his dissertation today, titled "JIT Spraying Threats on ARM and Defense by Diversification" (and coming soon to an NDSS near you)!

July 20Kashmir Hill wrote an article about Steven Hill and Zhimin Zhou’s PETS 2016 paper: “Um, bad news: Pixelating or blurring doesn’t actually work to hide text.

Stefan Savage June 15— But wait...there's more! June has become a "Win Everything" month for Stefan, who today was named to the Irwin Mark and Joan Klein Jacobs Chair in Information and Computer Science, succeeding Ron Graham who is retiring. Congratulations yet again, Stefan!

June 13— Congratulations to Karyn Benson who defended her dissertation today, entitled "Leveraging Internet Background Radiation for Opportunistic Network Analysis"! After putting the last finishing touches on the document itself, Karyn will be taking her many talents to Boston where she will join Akamai's technical staff, as well as continue her training for future Boston Marathons. Congrats, Karyn! Karyn Benson

Stefan Savage June 11— In back-to-back awards, today Stefan Savage accepted the 2015 ACM-Infosys Foundation Award in the Computing Sciences for "innovative research in network security, privacy, and reliability that has taught us to view attacks and attackers as elements of an integrated technological, societal, and economic system." Congratulations once again, Stefan! (Also congratulating Stefan at the awards ceremony was Amin, both of whom look quite distinguished in tuxedos.) Stefan and Amin

Stefan Savage June 10— Today Stefan Savage was awarded the 2016 University of Washington CSE Alumni Achievement Award, together with Albert Greenberg. Stefan receives the award for his "outstanding research in network security and efforts to fight cyber crime...tackling everything from computer worms and online scams, to distributed attacks, insidious global consumer fraud networks, and automobile systems hacking." Congratulations, Stefan! Stefan Savage

June 3— Today the winners of the second annual CSE Graduate and Undergraduate awards were announced, and we are thrilled that David Kohlbrenner was awarded the Graduate Award for Research. Congratulations!

Neha Chachra December 7— Congratulations to Neha Chachra, who successfully defended her dissertation today on "Understanding URL Abuse for Profit." Neha caps a long, creative career contributing to the department in many roles, from the "Learn from Peers" graduate student program to heading the graduate student association's procurement committee. In true style, she gets bonus points for her gift to her advisors on the day of her defense. Neha joins Facebook in February to make online social networks a more secure place. Bobbles

September 14Matt Der successfully defended his thesis today on "Investigating Large-Scale Internet Abuse Through Web Page Classification." Matt heads back to his old stomping grounds in Virginia to join his brother's startup company, Congratulations Matt! Matt Der

August 11— It is a Corvette Summer for Ian Foster and Karl Koscher! Today at WOOT 2015 Ian presented his paper, "Fast and Vulnerable: A Story of Telematic Failures", detailing the security vulnerabilities of car insurance dongles, co-authored with Andrew Prudhomme, Karl, and Stefan. WIRED also covered their work in an article today, "Hackers Cut a Corvette's Brakes Via a Common Car Gadget", picturing Karl and Ian. Special thanks to Sid Karin for the use of his Corvette!

July 30— Congratulations to Tristan Halvorson, who successfully defended his thesis today on "Registration Intent in the Domain Name Market." Tristan also boards the Google train, but he's taking the northern express to the Seattle office! Tristan Halvorson

June 5— Today the winners of the inaugural CSE Graduate and Undergraduate awards were announced, and we are thrilled that four students in the Sysnet group were recognized with awards: Neha Chachra was awarded the Graduate Award for Service and the Viceroy of Social Hour, Gautam Akiwate was awarded the Graduate Award for Teaching, Jake Maskiewicz was awarded the Undergraduate Award for Teaching, and Louis Dekoven was a runner up for the Viceroy of Social Hour. Congratulations everyone on all of your award-winning efforts!

June 2Keaton Mowery successfully defended his thesis today titled "Beneath the Attack Surface." He'll be heading up north to join Apple, and we wish him the best of luck. Congratulations Keaton! Keaton Mowery

Qing Zhang October 30— Continuing the trend, Qing Zhang successfully defended her dissertation today on "Utilizing Source Information to Detect and Prevent Online Fraud". In December, Qing also joins Google...although she will be bolstering the Southern California alumni contingent at Google Irvine. Congratulations and good luck, Qing!

October 16— The Fall series continue as Jiaqi Zhang successfully defended his dissertation today on "Software Configuration Learning and Recommendation". Jiaqi joins local San Diego startup Whova to work with the UCSD founders on applying technical networking to professional networking. Congratulations and good luck, Jiaqi! Jiaqi Zhang

David Wang September 30— Today David Wang became the next student in the Fall Dissertation Series, defending his dissertation on "A Comprehensive Approach to Undermining Search Result Poisoning". Soon David will join the ranks at Google Etsy, continuing his work dealing with Internet service abuse. Congratulations and good luck, David!

kc claffy June 26kc Claffy has been named one of the two recipients of the 2015 IEEE Internet Award. She and our close collaborator, UC Berkeley's Vern Paxson, where both cited for their "For seminal contributions to the field of Internet measurement, including security and network data analysis, and for distinguished leadership in and service to the Internet community by providing open-access data and tools." Congratulations kc and Vern! Vern Paxson

April 28— Today Sarah Meiklejohn defended her thesis, "Flexible Models for Secure Systems". After much cryptography and bitcoin sleuthing, Sarah heads across the pond to start as an Assistant Professor at University College London in a joint appointment in the Departments of Computer Science and Security and Crime Science. (How cool is that?) Congratulations, Sarah! Sarah Meiklejohn

March 31— In an article titled ‘Exclusive: NSA infiltrated RSA security more deeply than thought — study,’ Joseph Menn at Reuters reports on new research from a group that includes UCSD alums Steve Checkoway and Tom Ristenpart, current UCSD undergrad Jake Maskiewicz, and collaborators from Wisconsin, TU Eindhoven, Johns Hopkins, and UIC.

March 5— Alum Chris Kanich, now a professor at UIC, has won an NSF CAREER award. Congrats, Chris!

December 18— Alum Steve Checkoway’s paper showing that Mac laptop cameras can be reprogrammed to disable the camera-on LED is written up in the Washington Post.

December 10Mihir Bellare and YY Zhou are named Fellows of the ACM. Congrats to both!

Network World September 26Network World covers Vacha Dave's work on Viceroi, a classifier that advertising networks can use to detect click fraud.

August 28Sarah Meiklejohn’s recent IMC paper, “Fistful of Bitcoins: Characterizing Payments Among Men with No Names” looks at some of the issues in tracking transactions in the Bitcoin payment network. It is now receiving a bunch of popular attention including on Slashdot, Vice, BusinessWeek, The Economist, MIT Technology Review, Wired and others (undoubtedly driven in part by her involvement in this story in which she helped track down an attempt to frame Brian Krebs with heroin purchased on the underground site Silk Road). Most recently she used this technique track drug purchases made by reporters at Forbes. Congrats to Sarah and all her co-authors! Bitcoin

Danny Huang August 16— In recognition of his fantastic talk, Danny Huang received the Best Student Presentation award at the 2013 ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN). Danny was in Hong Kong to present his paper, "High-Fidelity Switch Models for Software-Defined Network Emulation", co-authored with Ken and Alex. Great job, Danny!

July 11— Today represents the end of an era. Andreas Pitsillidis successfully defended his dissertation and will be escaping the gravity well of UCSD CSE. In addition to his own tremendous body of research, Andreas personally designed, created, maintained and updated the collection, storage and processing infrastructure used by most of our security measurement work. He leaves us today with a near-production scale system curating over 100TB of structured and unstructed security data — virtually all of our papers depend on his work and we thank him for it. Congrats Andreas, good luck at Google and we hope to keep working with you in the future! Andreas Pitsillidis

May 22— Congratulations to Gjergji Zyba who defended his dissertation today on "Mobile Malware Propagation and Defense". After stints in Stockholm, Bath, and Paris, Gjergji is finishing his collaborative work with Ericsson as he explores his next steps in the Bay Area.

January 19— Today Brian Kantor officially becomes a sexagenarian — join us in wishing him a happy 60th birthday! (Coincidentally, it also nearly marks the 27th anniversary of Brian’s creating the Network News Transport Protocol (NNTP) in the mid 1980s.)

January 11— NPR’s Planet Money covers our Pharmaleaks paper with an interview on Morning Edition and a longer version in their bi-weekly podcast.

October 28— As "an expert at revealing", Stefan Savage talks about cybercime with the San Diego Union-Tribune.

September 25$10 million.            

August 21Mihir Bellare was named a Fellow of the IACR, the International Association for Cryptologic Research, for “fundamental contributions to the theory and practice of cryptography and for educational leadership in cryptography.”

August 8Nadia Heninger’s paper, “Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices,” won the Best Paper award at USENIX Security 2012. Congratulations to Nadia and her coauthors!

August 7— Congrats to Feng Lu and Jiaqi Zhang whose HotSec paper on the risks of adversarial composition of Web services was just covered in Technology Review. Technology Review

Hacked Speedometer August 6— The research that keeps on giving… ComputerWorld covers the joint UW/UCSD work on automotive security. Computerworld

PCWorld June 7Stefan Savage and Chris Grier lend their voices to a PCWorld article on the spamming ecosystem, and Stefan weighs in about malware victims in an MIT Technology Review article. Technology Review

June 4Chris Kanich defended his dissertation, "Characterizing Internet Scams through Underground Infrastructure Infiltration", mere days after Cynthia. Also bolstering the UCSD Midwest contingent, Chris will be moving to the windy city and starting as an assistant professor at the University of Illinois, Chicago, in the fall. Congratulations, Chris! We will miss the drugs! Chris Kanich

USENIX May 9— For the second year in a row, we have four papers accepted to the USENIX Security Symposium: two co-authored by our super-productive postdoc Nadia Heninger, one from our PL group and another by our usual large cast. Congrats to everyone!

February 16— Today, the CCC sponsored a symposium to recognize the 20th anniversary of the Federal Networking and Information Technology Research and Development program (NITRD) — the multi-agency funding program that has sponsored US computing research over the past two decades. The NITRD Symposium featured a broad range of technical speakers including Jeannette Wing, Kevin Knight, Beth Mynatt, Helen Nissenbaum, Sebastian Thrun, Shwetak Patel, Erik Brynjolfsson, Tom Lange, Vint Cerf, Bill Scherlis, Russ Altman, David Keyes, Kathy Yelick, Tom Davis, Eric Brown, Eric Horvitz, Alex Szalay, Tom Kalil, Peter Lee, Chuck Vest and our own Stefan Savage. In 15 minutes apiece, each highlighted how transformative twenty years of computing research in their field has been on the real world. Stefan Savage

CSI San Diego February 1— In his ongoing cybercrime series, Brian Krebs hunts down the operators of major botnets. In today&squo;s column he focuses on the Grum botnet and uses evidence from our previous Trajectory study to help attribute its operator. CSI here we come!

January 30— The National Research Council’s study The Safety Challenge and Promise of Automotive Electronics: Insights from Unintended Acceleration was released on January 18th and, along its recommendations, argues for a more significant focus on cybersecurity issues (based largely on our joint work with University of Washington). Mainstream press coverage around this release and the issues of automotive cybersecurity include the LA Times, BusinessWeek. and MIT Technology Review. The last article suggests that industry is moving quickly and it documents a ten-fold increase in security staffing at GM’s OnStar division and the development of focused automotive security tams within both research and product companies. Our thanks to NSF for their support; its nice to see a project pay off. Hacked Speedometer

BusinessWeek Spam Works December 8— Infographics rule! This week's BusinessWeek features a two page spread highlighting results from our research on spam economics. The data for these visuals are derived from two efforts: one led by Research Scientist Kirill Levchenko (spam value chain) and the other by CSE Ph.D. candidate Chris Kanich (spam revenue and demand) but both were a huge team effort (including the key help of our colleagues at ICSI as well)

December 6— Today's NY Times features a special section looking at the future of computing; nine essays written by nine computer scientists. Our own Stefan Savage penned one of these pieces, focusing on the future direction of security threats. Stefan Savage

Marti Motoyama September 19— In the final days of summer, Marti Motoyama successfully defends his dissertation after years of abuse. Marti also makes a healthy decision to join FitBit this Fall. Congratulations, Marti!

June 6— In addition to our four USENIX Security papers, we just heard back that both of our WOOT and both of our CSET papers were accepted. Congrats to everyone! USENIX

USENIX June 6— In addition to our four USENIX Security papers, we just heard back that both of our WOOT and both of our CSET papers were accepted. Congrats to everyone!

May 19— As a sad day for the department, Chez Bob czar Michael Vrable defended his thesis today. Gone are the days of restocking, fridge cleaning, and soda machine hacking as he joins Google in Mountain View where someone else takes care of it all. It is also an unfortunate day for the UCSD Programming Contest team as well, as Michael retires as a long-time coach and mentor for so many students over the years. Congratulations, Michael! We already miss you — the soda machine is out of Coke again... Michael Vrable

Damon McCoy May 6Damon McCoy, our CIFellow postdoc, has accepted a tenure-track faculty position in the Department of Computer Science at George Mason University. Congrats to both Damon and GMU!

April 18USENIX Security paper notifications just came out and four UCSD papers were selected! Congrats to Danny Anderson, Tristan Halvorson, Chris Kanich, Brian Kantor, Kirill Levchenko, Damon McCoy, Sarah Meiklejohn, Marti Motoyama, Keaton Mowery, Stefan Savage, Hovav Shacham, and Geoff Voelker. We’ll see you all there! USENIX

Hacked Speedometer March 13— Congratulations to Steve Checkoway, Damon McCoy, Brian Kantor, and Danny Anderson, and their University of Washington collaborators Karl Koscher, Alexei Czeskis, and Franziska Roesner, whose study of the vulnerability of modern cars to remote compromise was picked up by the press after being presented to the National Academy of Sciences. (We understand some faculty at UCSD and UW were involved as well.) The New York Times’ John Markoff broke the story; catch additional coverage in the Technology Review, PCWorld, Slashdot, Jamie Zawinski’s blog, Boing Boing, and The Volokh Conspiracy. More information at the CEASS site.

February 28— WIRED Magazine explains how to calculate the gross daily proceeds of spammers, based on the work of Chris Kanich and the rest of the Spamalytics crew. Spamalytics

February 17— Our colleagues in the Non-volatile Storage Lab have a neat paper about the challenges in erasing data from Flash-based SSDs. Good stuff. Also see Slashdot.

February 15— In recent history-sniffing news, the Release Candidate for IE9 adds history sniffing protections, and Scott Adams takes on history sniffing in a Dilbert strip.

Spamalytics II January 31— Afer two years of effort, spanning two institutions and several person decades of effort, the “Click Trajectory” paper was accepted today to IEEE Security and Privacy (Oakland). Congrats to all 15 authors! (also, congrats to UCSD alum Justin Ma and his Berkeley colleagues on their real-time URL filtering paper which was also accepted).

January 31— Following Stefano’s TCC best student paper last week, David Cash wins the Best Paper award (for the second year running!) at Eurocrypt 2011 for his paper “Efficient Authentication from Hard Learning Problems” (with Eike Kiltz, Krzysztof Pietrzak, Abhishek Jain, and Daniele Venturi). David Cash

Stefano Tessaro January 21Stefano Tessaro wins the Best Student Paper award at TCC 2011 for his paper “Security Amplification for the Cascade of Arbitrarily Weak PRPs: Tight Bounds via the Interactive Hardcore Lemma.” Congrats!

December 10The Skein cryptographic hash function, designed by a team including UCSD’s Mihir Bellare and UCSD alum Yoshi Kohno, has been selected as one of five finalists chosen in NIST’s SHA-3 competition, which will select a new standard hash to replace SHA-1. Sixty-four proposed hash function designs were submitted to NIST when the competition began two years ago. Congratulations to Mihir, Yoshi and the rest of their team! Mihir Bellare

Stefan Savage December 08Stefan Savage was named an ACM Fellow “for contributions to large scale systems and network security.” Read our press release here.

November 30— Lots of press for Dongseok Jang’s recent history sniffing study (with three faculty co-authors in Ranjit Jhala, Sorin Lerner and Hovav Shacham—the standard faculty/student ratio here at UCSD). The paper was published at CCS in October, but got a second wind in the press, perhaps due to its being cited in a speech by David Vladeck, the Director of the FTC’s Bureau of Consumer Protection, or due to the recent House “Do Not Track” hearings, or maybe due to the prurient aspects of some of the sites studied. Regardless, congrats to everyone! Catch coverage in Forbes (×2, ×3, ×4, ×5, ×6), Above the Law, The Wall Street Journal, Associated Press (×2), MediaPost (×2, ×3, ×4), The BBC, The Register, The Telegraph, PC World, Network World (×2), CNet, InformationWeek, PC Magazine (×2), Technology Review, eWeek, TIME, TechDirt, ZDNet, ZDNet UK, The Huffington Post, Slashdot (×2), Jamie Zawinski’s blog, Boing Boing, Reddit, Krebs on Security, Ars Technica, The New York Times, and our own eventual press release. Dongseok Jang

CAPTCHA August 11Marti Motoyama’s new study on CAPTCHA-solving economics (conducted with with Kirill Levchenko, Chris Kanich, Damon McCoy, Geoff Voelker and Stefan Savage) was covered in Technology Review and later by Brian Krebs in his widely-read security blog. More detail on this “epic new analysis” can be found in the “seminal paper” located here. Stefan Savage discussed the work as well on NPR’s Weekend Edition.

June 21Tom Ristenpart successfully defended his thesis today, on “New Approaches for the Design and Analysis of Cryptographic Hash Functions.” In the fall he will be joining the tenure track at the University of Wisconsin at Madison. Congratulations, Prof. Ristenpart! Tom

Scott Yilek June 4Scott Yilek successfully defended his thesis today, on “Public-Key Encryption Secure in the Presence of Randomness Failures.” In the fall he will be joining the tenure track at the University of St. Thomas. Congratulations, Prof. Yilek!

June 2— Following Petros and Scott’s PKC best paper last week, David Cash wins the Best Paper award at Eurocrypt 2010 for his paper “Bonsai Trees, or How to Delegate a Lattice Basis” (with Dennis Hofheinz, Eike Kiltz, and Chris Peikert). Eurocrypt 2010

PKC 2010 May 27Petros Mol and Scott Yilek win the Best Paper award at PKC 2010 for their paper “Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions.” Congrats!
Also at PKC, Daniele Micciancio gives an invited talk on “Duality in Lattice Cryptography.”

May 17Steve Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, and collaborators at the University of Washington led by Yoshi Kohno (UCSD alum!) describe how to hack cars in their paper at the 2010 IEEE Symposium on Security and Privacy. More information at the CEASS site and in articles in JSOE News, New York Times, New Scientist, Technology Review, and PC World. Hacked Speedometer

April 05Stefan Savage was quoted in a San Diego Daily Transcript round-table meeting on cybersecurity.

ACM March 30Mihir Bellare awarded ACM’s 2009 Paris Kanellakis Theory and Practice Award, along with Phillip Rogaway, for “their development of the field of Practice-Oriented Provable-Security and its widespread impact on the theory and practice of cryptography and security.”

Justin Ma March 21Justin Ma, International Man of Mystery, First of the Tri-advised, Duke of Auto-Tune, Teacher of Pandas and Defender of the Web sucessfully defended his dissertation, “Learning to Detect Malicious URLs.” Justin is now on the whirlwind talk circuit, but will shortly be joining UC Berkeley as a postdoc. Congrats Justin! Justin Ma

February 9Daniele Micciancio is program chair of TCC 2010. IACR

New Scientist article January 25New Scientist article about the Botnet Judo paper by Andreas Pitsillidis, Kirill Levchenko, Chris Kanich, Geoff Voelker, Stefan Savage, and coauthors.

September 27Stefan Savage gets featured in Voice of San Diego story. Doc Savage

Cloud September 3Press for Tom Ristenpart, Hovav Shacham and Stefan Savage for their recent paper examining placement vulnerabilities in third-party cloud computing.

September 4— Press for our AVC Advantage paper: NPR’s Talk of the Nation—Science Friday; KPBS; The Register; Dark Reading; PC World; InformationWeek; Canwest; The Hindustan Times; Slashdot; Digg; Ars Technica; Engadget.

August 10Stephen Checkoway, in collaboration with Hovav Shacham, Brian Kantor, and their co-authors from Michigan and Princeton, recently demonstrated a practical attack against the AVC Advantage voting machine—absent any access to source code and overcoming a hardware architecture that prevents code execution from DRAM. More info can be found in the Jacobs School press release here or in their EVT ’09 paper here.

July 16— Network World magazine quotes Stefan Savage today in its story on Canadian Pharmacy spam.

June 15Geoff Voelker received one of sixty national HP 2009 Innovation Research grants to support our ongoing studies of Internet-based eCrime. More information can be found here. HP

Network World May 1— Network World magazine’s list of “20 kick-ass network research projects’ includes three efforts with UCSD creators including Tom Ristenpart’s Adeona laptop tracking service (USENIX Security ’08, w/UW collaborators). Also, on the sysnet side of the house: Yuvraj Agarwal’s Somniloquy system for power savings (NSDI ’09, w/Microsoft collaborators) and Kirill Levchenko’s XL routing protocol (SIGCOMM ’08). Congrats to everyone for all the ass-kicking!

February 25— Google just announced their Native Client Security Contest for which Stefan Savage has agreed to be one of the judges. Good luck everyone! Google

Stefan Savage February 21Stefan Savage was quoted in John Markoff’s recent New York Times article Do We Need a New Internet and, even more influential, the infamous CCC blog :-)

December 30— Lots of press for Tom Ristenpart’s USENIX Security paper describing Adeona, a system that helps track stolen laptops in a privacy-preserving manner. A collaboration with University of Washington researchers including alum Yoshi Kohno), Adeona has been downloaded by over 50,000 people and has been covered in reports ranging frm the San Francisco Chronicle to Slashdot. See Tom describe Adeona in this short video or read more in press releases from UCSD and UW. Tom

Mihir November 6— As some of you many know, the National Institute of Standards and Technology is running a public competition to develop a new crytopgraphic hash function for a range of applications. Our own Mihir Bellare as well as alum Yoshi Kohno are part of the team that has developed and submitted the Skein Hash Function. It has received some coverage at places like Wired, Slashdot, Dark Reading, and Arstechnica.

November 5— Brian Krebs of the Washington Post recently wrote about our paper on spam conversion rates (joint with ICSI). From there it snowballed a bit. Here are some pointers to derivative stories: The Register, Network World, BBC News, Slashdot, Arstechnica, Schneier’s blog, etc. Spamalytics

Celestron and friends October 30— Our recent paper on duplicating house keys from photos has received a bit of press (e.g., MSNBC, Scientific American, Popular Science, Discover, CNET, CNET [again], The Register, Dark Reading, and others).

October 27Erik Buchanan and Ryan Roemer got written up in both Information Week and Dark Reading for their work on generalizing return-oriented programming. Ryan and Erik

Kirill Levchenko September 3Kirill Levchenko defended his thesis today. “XL”ent work, Dr. Levchenko. Kirill continues on as a postdoc with the group.

February 07Justin Ma was named one of three recipients of Symantec’s new Research Labs Graduate Fellowship. Congrats Justin! Justin

Sumeet September 8Sumeet Singh has been named one of the top 35 innovators under 35 by MIT Technology Review magazine. Read the full release here. Congrats Summeet!

June 27David Anderson was awarded an AFCEA Lockheed Martin Graduate Scholarship for Science and Technology. Congratulations, David!

June 9Barath Raghavan has been awarded a Woolley Graduate Leadership Fellowship by the Jacobs School recognizing his academic achievements and service to the department. Congrats Barath!

May 15Flavio Junqueira sucessfully defended his thesis and will be leaving us to join Yahoo Research in Barcelona. Congrants Flavio! (Expect vistors.) Flavio

March 31— NSF announced today the results of the 2006 NSF Graduate Fellowship competition. Michael Vrable was recognized as a fellow and Justin Ma was awarded an honorable mention. Congrats to Michael and Justin!

Geoff Voelker February 15— UCSD recently acknowledged what the rest of us already know: that Geoff Voelker is one of the top teachers around. Geoff was named to receive the Chancellor’s Associates Faculty Award for “excellence in undergraduate teaching”—one of only three Engineering faculty to receive the award in its 16 year history (and the only recipient ever from Computer Science). Congrats Geoff!

June 28Alper Mizrak is the recipient of this year’s IEEE William C. Carter Award, which is presented annually to recognize individuals who have made significant contributions to dependable computing through their dissertation research. The award is attached to this year’s DSN paper, Fatih: Detecting and Isolating Malicious Routers, with Yu-Chung Cheng and their advisors. Congrats! Alper Mizrak receiving William C. Carter Award

Netsift, Inc. June 27Cisco has announced plans to acquire Netsift, Inc. today. Congrats to George, Sumeet and the whole Netsift team! The UCSD press release can be found here.

April 15Stefan Savage is profiled in the San Diego Union-Tribune where he describes his life as a cat-herder.

December 15George Varghese’s new book Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices was just published by Morgan Kauffman. Network Algorithmics

Center for Internet Epidemiology and Defenses September 21— The Center for Internet Epidemiology and Defenses (CIED) has been selected by the National Science Foundation as one of two large-scale projects in its new CyberTrust program. The CIED effort, a collaboration between our group and the International Computer Science Institute&squo;s Center for Internet Research, will receive $6.2M over five years in addition to industrial support from Microsoft, Intel, Hewlett-Packard, and the UCSD Center for Networked Systems (a $10M research center supported by AT&T, Alcatel, Hewlett-Packard, Qualcomm and Sun Microsystems). CIED will study large-scale Internet-based pathogens—such as worms and viruses—analyze their behaviors, develop early-warning and forensic capabilities and design automated defense technologies. CIED is led by Stefan Savage at UCSD and Vern Paxson at ICSI with co-PIs including Geoff Voelker, George Varghese, and Nick Weaver. Officially announcing the award are NSF's press release and a joint press release from UCSD and ICSI. Media coverage of the center's founding can be found at MSNBC, InternetWeek, the San Diego Union-Tribune and the Christian Science Monitor.

September 1Cristian Estan has been awarded the UCSD Departmental Dissertation award. Congrats Cristi!

May 31Cristian Estan has accepted a tenure-track position from the University of Wisconsin’s Computer Science Department. Congrats Cristi and good luck! Cristian Estan

March 31— Three of our graduate students were recognized in the 2004 NSF Graduate Fellowship competition. Current student Barath Raghavan was selected as a fellow, while Chris Tuttle was awarded an honorable mention. As well, Lisa Cowan, who will be joining us in Fall 2004 was also selected as a fellow. Congratulations to Barath, Chris and Lisa!

February 23Stefan Savage has been awarded an Alfred P. Sloan Foundation faculty research fellowship for 2004. These fellowships recognize young faculty “who show the most outstanding promise of making fundamental contributions to new knowledge.” Stefan is the second in the Systems and Networking group to receive this honor—Amin Vahdat received a Sloan Fellowship in 2003. More information on UCSD Sloan recipeints for 2004 can be found here

August 29— The National Science Foundation recently awarded a $1.8 million Research Infrastructure grant to UCSD CSE. The award will fund a five year project to build a high-speed wired and wireless communications, computation and storage grid in the department. Andrew Chien led the proposal, with co-PIs Joesph Pasquale, Stefan Savage and David Kriegman (Vision). More information can be found here.

August 8John Bellardo’s recent presentation at the USENIX Security Symposium included a live demonstration of shutting down all wireless communications using a pocket PC. See descriptions of the event in Government Computer News and Techworld. This work was fully described in his paper 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions, jointly authored with Stefan Savage.

05:29 UTC to 06:00 UTC February 7David Moore and Stefan Savage were part of a team that recently analyzed the spread of the Sapphire/Slammer worm. They showed that the worm compromised 90 percent of its victims within the first 10 minutes, reaching a peak probing rate of over 50 million probes per second. The results were widely reported (including CNN, the Washington Post, and InfoWorld). The full report can be found here.

December 19George Varghese was honored as an ACM Fellow for his contributions in efficient, scalable algorithms.

January 10— Professor Stefan Savage finally defended his thesis. He received the University of Washington's William Chan Memorial Dissertation Award for this work.

September 1— International fashionplates David Moore, Geoff Voelker, and Stefan Savage grace the cover of this month’s Information Security Magazine for their analysis of denial-of-service attacks. Sure to be a collector’s item! :-) David Moore, Stefan Savage, Geoff Voelker

August 13David Moore, Geoff Voelker and Stefan Savage received the best paper award award at the USENIX Security Symposium for their paper Inferring Internet Denial of Service Activity. Congrats guys!

May 25— There has been considerable press around the previous denial-of-service report, including stories or mentions in The New York Times, CNN , Wired and New Scientist. A more complete listing can be found here.

May 22Geoff Voelker received the Tau Beta Pi Outstanding Engineering Teaching Award. Great going Geoff!

May 21— Group members David Moore, Geoff Voelker and Stefan Savage recently completed the first empirical study of world-wide denial-of-service attack activity. They found roughly 4000 attacks active per week against over 5,000 distinct targets. More information can be found here.