iSec Research Highlight
Traffic analysis can expose a great deal about sensitive relationships; anonymous communications system are a promising technology to stop this kind of information leakage. We focus on ways to stop long-term attacks against these systems, as well as the application of anonymity to wireless and ad-hoc networks.
> See our anon.next project page
The number of Android malware has increased greatly during the last few years. Static analysis is widely used in detecting such malware by analyzing the code without execution. However, the effectiveness of current tools depends on the app model as well as the malware detection algorithm that analyzes the app model. More at Research Page
>For more information, see Dexteroid: Detecting Malicious Behaviors in Android Apps Using Reverse-Engineered Life Cycle Models
Usable Security and Privacy
We are exploring designs of systems and interfaces that enable effective security without placing an excessive burden on users. In particular, we are interested in the design of password systems that enable high memorability for random strings, alternatives to security warnings that many users ignore, and the use of nudges to improve privacy outcomes.