Anonymous Communication Protocols
Designing and analyzing practical anonymous communication protocols.
Communications and Encryption Policy
Integrating technology with law and policy to understand how surveillance tools actually work.
Cybersecurity Policy and Economics of Information Security
Examining the costs and lessons of cybersecurity incidents to help shape future policy.
Human-Centered Security and Privacy
Exploring the processes and mental models of professionals who perform security tasks.
Privacy-Preserving Database Systems
Building secure and private database management systems to balance trade-offs among privacy, performance, and query result accuracy.
Problems at the Intersection of Security, AI, and Hardware
Investigating the intersection of artificial intelligence, security, and hardware.