Security and Privacy

Subareas

Accessibility in security & privacy

Privacy and security mechanisms usable by people with a range of abilities and disabilities will improve cybersecurity for all.

Censorship resistance

Building systems that resist censorship will improve people’s privacy and their freedom to access information.

Cloud computing

Delivering computing services over the Internet (“the cloud”) comes with significant risks when sensitive data are processed by servers that are less trustworthy.

Cryptography

Use cryptography to build secure systems that preserve user privacy and enable secure data collaboration.

Data privacy

Ensure that even snippets of genetic code published in online databases can’t be used to identify individuals.

Economics of privacy

Understanding and protecting consumer decisions regarding the trade-offs associated with the privacy and the sharing of personal data.

eCrime and malware

Understanding the economics, psychology, and technology of ecrime, including: phishing, ransomware, and malware.

Internet of things and wearables

Give people control over wearable and home-based personal devices.

Protection of vulnerable populations

Protecting all populations from the perils of the internet is the primary responsibility of cybersecurity professionals.

Secure phones

Providing voice security in the form of end-to-end encryption, protecting against man-in-the-middle attack.

Secure systems

Leveraging integrated artificial and human intelligence to build secure systems that protect privacy.

Social media abuse

Detection of practices such as fake accounts, malicious social bots, harmful disinformation, inauthentic coordinated campaigns, malware, and spam.

Usable security

Ensure that people can easily and efficiently make proper security decisions aligned with their mental models.

Vulnerability discovery

Our research focuses on understanding vulnerabilities that expose fundamental flaws in system architectures, leading to more defensible system design.

Ready to start your journey at Luddy? Take the next step!