Security and Privacy
At the same time society is increasingly relying on computers, a diverse array of adversaries are exploiting security vulnerabilities in these systems to compromise critical assets. There are also rising privacy concerns about how pervasive collection of data about individuals can be used to predict and manipulate their behavior. Illinois Security and Privacy faculty address security and privacy concerns with both theoretical and applied approaches.
They address security of computer and communication systems including: operating systems; auditing and data provenance; the Internet, wireless networks, and the “internet of things”; cloud computing; approximate computing; quality and resource management; and mobile computing. They also explore techniques related to security and privacy in a data science context such as: technologies for privacy-preserving data sharing based on cryptography, hardware, or generative models; distributed systems, crypto-currencies, and blockchains; adversarial machine learning; secure computation, zero-knowledge verifiable outsourcing, and related cryptography. These and other techniques are applied to a wide range of applications including: multi-sensory systems and multimedia; human factors and socio-technical considerations; power grids, autonomous vehicles and other cyber-physical systems; healthcare and genomics.
Faculty & Affiliate Faculty
Secure Compilation, Program Analysis, Software Security, Debloating
Systems and Networks, Auditing, Internet of Things Security
Privacy and Networks
Network Verification, Software Resilience, Model Checking
Cloud Computing, Big Data, Ubiquitous Computing, Micro Kernels
Hardware Security, Applied Cryptography
Network Infrastructure Security and Verification
Internet-of-Things, Privacy, Data Science,Healthcare, Power Grid
Systems Security, Memory/Storage Security
Measures and Models
Secure Computation, Cryptography, Privacy
Mobile Privacy, Wireless Security
E-Crime and Cyber-Physical Systems
Machine Learning, Privacy Preserving Generative Models
Distributed Computing and Cryptography
Approximate Computing across Full System Stack
Real-Time and Cyber-Physical Systems, Internet-of-Things, Cloud Computing
Mobile, Multi-Sensory Systems, Quality and Resource Management, Energy Systems
Modeling and Simulation
Computer Security, Applied Cryptography, Blockchain
Security and Privacy, Internet Measurement, Human Factors
Usable Privacy and Security
Mobile, Text Analytics, Testing, Program Analysis
Adjunct Faculty
Research Efforts and Groups
- Coordinated Science Lab (CSL)
- Information Trust Institute (ITI) in the Coordinated Science Lab
- Genomic Security and Privacy (GSP) Theme at the Institute for Genomic Biology
- Illinois Cyber Security Scholars Program
- Illinois-NSA Center for Cyber Defense Education and Research
- Security and Privacy Research at Illinois (SPR@I Group)
How a Chinese Scientist In the US is Helping Defend AI Systems from Cyberattacks
News | February 14, 2021
Illinois CS Sends Four Participants, 28 Faculty Mentors to Rising Stars 2020
News | November 18, 2020
The Best Free Secure Email
News | September 24, 2020