Designing and analyzing practical anonymous communication protocols.
Integrating technology with law and policy to understand how surveillance tools actually work.
Examining the costs and lessons of cybersecurity incidents to help shape future policy.
Exploring the processes and mental models of professionals who perform security tasks.
Building secure and private database management systems to balance trade-offs among privacy, performance, and query result accuracy.
Investigating the intersection of artificial intelligence, security, and hardware.