Recent history is littered with examples of software vendors betraying user trust, exposing the public to exploitable code, data leaks, and invasive privacy practices. Undirected security research may be insufficient for preventing such foreseeable and preventable failures, as these problems are often the result of misaligned vendor incentives rather than the technical specifics of the systems themselves. This dissertation illustrates the utility of security research that is motivated explicitly by the goal of realigning incentives of market actors toward providing better security. We find that a research approach guided by a deep understanding of the economic, regulatory, and technical attributes of the actors involved is crucial for so...
Security has become a buzzword over the current years. As per Wikipedia, 55.1% of global population ...
My research interests lie at the intersection of cryptographic research, and systems security and pr...
Nowadays, it is not difficult to conjure up images of hacked power plants, remote-hijacked public t...
The need for secure systems and improved authentication methods is growing as online transactions an...
An economic perspective has yielded invaluable insights into the analysis and design of information ...
Currently, the majority of international economic, commercial, cultural, social, and governmental co...
Twenty years ago, law enforcement organizations lobbied to require data and communication services t...
Modern computing and interactions have become increasingly complex over the last decade, resulting i...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Twenty years ago, law enforcement organizations lobbied to require data and communication services t...
Twenty years ago, law enforcement organizations lobbied to require data and communication services t...
The objective of penetration testing is to attack computer networks, without causing harm, in order ...
Modern life relies on the internet for everything from communicating and shopping to banking and see...
Various security measures are ineffective having been designed without adequate usability and econom...
The state of security across the Internet is poor, and it has been so since the advent of the modern...
Security has become a buzzword over the current years. As per Wikipedia, 55.1% of global population ...
My research interests lie at the intersection of cryptographic research, and systems security and pr...
Nowadays, it is not difficult to conjure up images of hacked power plants, remote-hijacked public t...
The need for secure systems and improved authentication methods is growing as online transactions an...
An economic perspective has yielded invaluable insights into the analysis and design of information ...
Currently, the majority of international economic, commercial, cultural, social, and governmental co...
Twenty years ago, law enforcement organizations lobbied to require data and communication services t...
Modern computing and interactions have become increasingly complex over the last decade, resulting i...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Twenty years ago, law enforcement organizations lobbied to require data and communication services t...
Twenty years ago, law enforcement organizations lobbied to require data and communication services t...
The objective of penetration testing is to attack computer networks, without causing harm, in order ...
Modern life relies on the internet for everything from communicating and shopping to banking and see...
Various security measures are ineffective having been designed without adequate usability and econom...
The state of security across the Internet is poor, and it has been so since the advent of the modern...
Security has become a buzzword over the current years. As per Wikipedia, 55.1% of global population ...
My research interests lie at the intersection of cryptographic research, and systems security and pr...
Nowadays, it is not difficult to conjure up images of hacked power plants, remote-hijacked public t...