L. Jean Camp
Professor of Informatics
Informatics West 300
- Social Informatics
- Proactive Health Informatics
Risk is as inevitable online as it is offline, but informed risk decisions require understanding the underlying risk and the communication of that that risk in a timely, clear manner.
Camp's research area is interdisciplinary security and privacy. She studies key questions such as: Why are security and privacy-protecting technologies rejected or ignored? Is it because organizations would rather accept the uncertain costs of information over the certain costs of protection? Or is it because most of the benefit of an investment in security goes to some distant company which is protected from an attack by a compromised machine? If it's the latter, we need incentive-aware design for security and privacy. Is it because of lack of awareness of the risks? The risks of computing are difficult to understand, and compromised machines may participate in money laundering, spamming, and the enrichment of criminals. Thus, risk communication for security and privacy are required. Is it because the tools are simply unusable? In this case, usable security and privacy are the solution. Camp has published for each of these cases, from theoretical contributions, to actionable critiques, to functioning prototypes.
AAAS Congressional Fellow 2010
NSF CAREER Award winner
Luddy Hall 3030
- Privacy-enhancing technologies
Henry's research focuses on the systems challenges of applied cryptography with a particular emphasis on using cryptography to build secure systems that preserve the privacy of their users.
Henry develops cryptographic techniques that help preserve the security and privacy of users on the Internet. His research emphasizes viewing systems development from a cryptographic perspective and building systems out of cryptography rather than building cryptography into systems. He's especially interested in the challenges that arise when using cryptography to build large and complex systems and in finding ways to adapt existing cryptographic primitives-especially those that are well-studied by theoreticians yet still considered impractical by practitioners'to overcome these problems. For instance, this may involve representing data in ways amenable to efficient parallelization, making tradeoffs in security parameters and threat models that make sense in the context of the given system, or composing seemingly disparate cryptographic primitives to realize complex functionality in a sound-yet-practical manner. Henry's work has resulted in systems for efficient revocable anonymous authentication, batch zero-knowledge proofs of knowledge, high-speed GPU-based cryptanalysis, and practical e-commerce protocols based on private information retrieval, which are in each case two or more orders of magnitude faster than existing techniques offering comparable functionality and security guarantees.
Associate Professor of Computer Science and Informatics
Lindley Hall 230E
- Computer Networks
- Proactive Health Informatics
- Resource Allocation
Hill's research interests are in the area of data protection, including designing, developing, and evaluating mechanisms for securing access and preserving privacy of sensitive data.
Hill's research area is data protection; including designing, developing, and evaluating mechanisms for securing access and preserving privacy of sensitive data. High-dimensional datasets often include some combination of demographic, medical, and other personal information, which presents opportunities to characterize participants in unique ways. Sharing this data with third parties makes identifying information more widely available which limits the effectiveness of current data security and privacy mechanisms. Collecting and owning such data is also a liability for businesses, making them targets for attacks that compromise confidentiality and data integrity. Any information that distinguishes an individual or a record within a database may be used to identify the person to whom the information belongs. Even when traditional identifiers are removed, the uniqueness of the resulting records may make a privacy breach easy to orchestrate or implement. Therefore, when designing mechanisms to enforce privacy policies, one must consider the type of policy, the data and the intended use of the data.
Lindley Hall 330C
Huang has a broad interest in various aspects of computer security and cryptography, and has designed and developed cryptographic protocols to enable secure collaboration over secret data.
Huang is broadly interested in security and cryptography. He has worked on developing cryptographic protocols that provide strong security guarantees over generic computation. His goal is to build elegant theoretical ideas into practically usable systems that address real-world security problems often requiring synergy of Theory, Program Analysis, Artificial Intelligence, and Software Engineering.
Associate Professor of Computer Science
Luddy Hall 3028
- Computer Networks
- Data Science
- Human Centered Computing
Kapadia's research focuses on computer security and privacy issues in the context of social networks and wearable and sensor-enabled computing.
Kapadia is interested in topics related to computer security and privacy. He is particularly interested in accountable anonymity; pervasive, mobile, and wearable computing; human factors; crowdsourcing; and peer-to-peer networks.
Distinguished Alumni Educator Award, 2015
Department of Computer Science, University of Illinois at Urbana-Champaign
Google Research Award, Winter 2014 Privacy-Enhanced Life-Logging with Wearable Cameras Trustees Teaching Award, Indiana University Bloomington, 2013
NSF CAREER 2013
Best of 2012: MIT Technology Review arXiv Blog PlaceRaider
Myers' work focuses on applied and foundational cryptography, and in understanding security and novel threats in complex systems.
Myers' primary research interests in cryptography are in understanding foundational issues of core cryptographic primitives, such as public-key encryption and block-ciphers, and developing practical cryptographic protocols for secure and private computations. He also investigates methods in which many devices interact in a complex system, thereby affecting security, privacy, and attacking capabilities due to emergent outcomes.
2009-2010 Trustees Award for Teaching Excellence
CSAW AT&T Applied Security Research Best Paper Award Finalist
NYU-Polytec Cyber Security Awareness Week, October 2010
Informatics West 318
- Human Centered Computing
Professor of Informatics and Computer Science
Lindley Hall 230F
- Privacy Enhancing Technologies
- Human Genome Privacy
Wang's research focuses on system security and data privacy with a specialization on security and privacy issues in mobile and cloud computing, and privacy issues in dissemination and computation of human genomic data.
Wang is a professor in the School of Informatics and Computing at Indiana University, Bloomington. He received his Ph.D. in Electrical and Computer Engineering from Carnegie Mellon University in 2004, and has since been a faculty member at IU. Dr. Wang is a well-recognized researcher on system and network security. His work focuses on cloud and mobile security, and data privacy. He is a recipient of 2011 Award for Outstanding Research in Privacy Enhancing Technologies (the PET Award) and the Best Practical Paper Award at the 32nd IEEE Symposium on Security and Privacy. His work frequently receives attention from the media, including CNN, MSNBC, Slashdot, CNet, PC World, etc. Examples include his discovery of security-critical vulnerabilities in payment API integrations and his recent study of the security flaws on the Apple platform. His research is supported by the NIH, NSF, Department of Homeland Security, the Air Force and Microsoft Research. Wang is also the director of IU's Center for Security Informatics.
Best Paper Award in Applied Cyber Security Research, 3rd Place (NYU-Poly Cyber Security Awareness Week): for the work on security risks in Android customization
2014 Third place in National Security Innovation Competition: for the work on Android secure upgrading
2013 Finalist for the Best Applied Security Paper Award (NYU-Poly Cyber Security Awareness Week): for the work on dedicated hosts on malicious web infrastructures
2011 Award for Outstanding Research in Privacy Enhancing Technologies (the PET Award): for my research on Genome Privacy
2011 PET Award runner-up: for my research on side-channel information leaks in web applications
2011 Best Practical Paper Award, the 32nd IEEE Symposium on Security and Privacy: for my research on logic flaws in hybrid web applications