Show    entries

Are Password Managers Improving our Password Habits?

David Ng, Graduate Student, School of Information, UC Berkeley
Cristian Bravo-Lillo, Lecturer, School of Information, UC Berkeley
Jacky Ho, Graduate Student, School of Information, UC Berkeley
Christian Hercules, Graduate Student, School of Information, UC Berkeley
Stuart Schechter, Lecturer, School of Information, UC Berkeley
Password managers adoptions are becoming the norm these days, but are they also encouraging best practices for its users? Do they use complex and unique passwords or do they just store weak passwords? We discovered that many users ignore password reset notifications. We are motivated to find a path to...

Evaluating equity and bias in cybersecurity related job descriptions and the impact on the cyber talent pipeline

Mehtab Khan, JSD Student, School of Law, UC Berkeley
Cybersecurity workers are in high demand but short supply. During the Covid-19 crisis, we have seen a greater need for cybersecurity professionals as e-commerce has skyrocketed, universities have shifted online, and millions of Americans are working from home on personal networks. There are also significant diversity challenges to the cybersecurity...

Towards Bayesian Classifiers that are Robust Against Adversarial Attacks

An Ju, PhD Student, EECS, UC Berkeley
We aim to build neural networks that are intrinsically robust against adversarial attacks. We focus on classifying images in real-world scenarios with complex backgrounds under unforeseen adversarial attacks. Previous defenses lack interpretability and have limited robustness against unforeseen attacks, failing to deliver trustworthiness to users. We will study Bayesian models,...

Evaluating The Digital Divide in The Usability of Privacy and Security Settings in Smartphones

Joanne Ma, Graduate Student, School of Information, UC Berkeley
Alisa Frik, Postdoctoral Researcher, International Computer Science Institute, UC Berkeley
With the smartphone penetration rate reaching over 80% in the US, smartphone settings remain one of the main models for information privacy and security controls. Yet, their usability is largely understudied, especially with respect to the usability impact on underrepresented socio-economic and low-tech groups. In this project we will estimate...

A Comprehensive Investigation of Developers’ Remediation Practices

Noura Alomar, PhD Student, International Computer Science Institute, UC Berkeley
Primal Wijesekera, Staff Research Scientist, International Computer Science Institute, UC Berkeley
Security vulnerabilities pose a grave danger to the integrity of any system because they can undermine almost any protection mechanism organizations put in place to defend themselves against potential attacks. As such, finding vulnerabilities before the software gets deployed or after putting software in production is a critical task in...

Assessing and Developing Online Election Information Infrastructure

Emma Lurie, PhD Student, School of Information, UC Berkeley
In the United States, people are increasingly turning to online sources to find information about elections. Election information includes everything from mail-in ballot instructions to candidate Facebook page posts. In the U.S., as well as around the world, online misinformation threatens democratic systems. Politicians, technology companies, journalists, and voters all...

Misinformation Corrections

Ji Su Yoo, PhD Student, School of Information, UC Berkeley
Misinformation and disinformation campaigns often rely on bots and fake accounts to impersonate human users with similar demographic characteristics, political beliefs, and social values as their audience to establish credibility. Such nefarious efforts are successful because human beliefs and behaviors about new information are based on the identity of the...

Keystone: An Open Framework for Architecting TEEs

Dawn Song, Professor, Department of Electrical Engineering and Computer Science, UC Berkeley
Shweta Shivaji Shinde, Postdoctoral Scholar, Department of Electrical Engineering and Computer Science, UC Berkeley
David Kohlbrenner, Postdoctoral Scholar, Department of Electrical Engineering and Computer Science, UC Berkeley
Trusted execution environments (TEEs) are found in a range of devices — from embedded sensors to cloud servers — and encompass a range of cost, power constraints, and security threat model choices. On the other hand, each of the current vendor-specific TEEs makes a fixed set of trade-offs, with little...

How Do Vulnerable Patients Understand Data Privacy as It Pertains to mHealth Interventions?

Laura Elizabeth Pathak, PhD Student, School of Social Welfare, UC Berkeley
As mobile health (mHealth) interventions have the potential to acquire a dominant role in safety-net healthcare settings, there are many challenges to data privacy that need to be considered. Users with marginalized backgrounds have a greater risk of experiencing more detrimental consequences of privacy and security breaches to mHealth apps...

Secure Authentication in Blockchain Environments

Giulio Malavolta, Postdoctoral Fellow, Computer Science Department, Carnegie Mellon University
Bitcoin and blockchain systems brought us to the brink of a technological revolution: these systems allow us to bypass the need for centralized trusted entities to run protocols on a large scale. However, the decentralized nature of these systems brings unique challenges, including user authentication. While cryptography provides strong solutions...
Showing 21 - 30 of 146 entries