About the iSec Lab

iSec (The Information Security Lab) at UT Arlington is a research group based in the Department of Computer Science and Engineering.

iSec conducts research on system security and privacy. With an emphasis on practical results, we seek to develop technologies to secure current and emerging applications. Our research interests include:

  • User authentication with passwords and graphical passwords
  • Mobile device security
  • Anonymity and censorship resistance
  • Secure software development and testing

The group is co-directed by professors Donggang Liu and Matthew Wright and currently includes over ten graduate students.

Current undergraduate and graduate students at UT Arlington who are interested in computer security research should review the Research page and contact one of the affiliated faculty.

iSec Research Highlight

Anonymous Communications

Traffic analysis can expose a great deal about sensitive relationships; anonymous communications system are a promising technology to stop this kind of information leakage. We focus on ways to stop long-term attacks against these systems, as well as the application of anonymity to wireless and ad-hoc networks.

> See our anon.next project page

Android Security

The number of Android malware has increased greatly during the last few years. Static analysis is widely used in detecting such malware by analyzing the code without execution. However, the effectiveness of current tools depends on the app model as well as the malware detection algorithm that analyzes the app model. More at Research Page

>For more information, see Dexteroid: Detecting Malicious Behaviors in Android Apps Using Reverse-Engineered Life Cycle Models

Usable Security and Privacy

We are exploring designs of systems and interfaces that enable effective security without placing an excessive burden on users. In particular, we are interested in the design of password systems that enable high memorability for random strings, alternatives to security warnings that many users ignore, and the use of nudges to improve privacy outcomes.