Research


My research confronts issues of security, privacy, and transparency in a broad range of computer systems and applications.

Some recent research themes:

Understanding SOC Phenomena

Modern Security Operation Centers (SOCs) deploy dozens of products so that analysts can monitor the organization from different perspectives for evidence of attack. Why, then, is news of another massive incident or breach a weekly occurrence? This failure is the result of a constellation of limitations in cybersecurity software that ultimately outsources the hardest work to the cognitive capabilities of human analysts. Recognizing SOC’s as complex sociotechnical systems, my recent work has attempted to directly measure SOC phenomena with the eventual goal of designing and validating effective interventions.

Recent Papers:

Detecting and Investigating Intrusions

Data provenance can be aggregatedfrom multiple operational layers of complex systems.

Our research also seeks to empower SOC analysts by improving the ways in which we audit computers, allowing them to understand and react to attacks before serious damage is inflicted. My earliest and ongoing contributions to this space attempt to directly address the shortcomings of security products through provenance analysis. Data Provenance is a transformation that can be performed on a time-series of log events to surface causal interdependencies. For endpoint events comprised of tuples, processes and objects become vertices in a graph while operations become directed edges that indicate the flow of information. The graph can then be used to produce causal explanations of inter-process workflows, such as identifying the root causes of an event. This straightforward procedure is nonetheless revolutionary when applied to security operations, as today’s products examine processes, endpoints, users in isolation without consideration for their interrelationships

Recent Papers:

Everyday User Privacy

Through the USB Interface, mobile phones can be used to attest the identity of the machines to which they connect.

Users are regularly asked to make choices that inform their digital privacy and even physical wellbeing. Unfortunately, the significance of these decisions are rarely apparent to the user. Worse, user's personal privacy needs are often at odds with the incentives guiding the actions of developers, devices, and platforms My research explores how these unforeseen security factors emerge through the mass proliferation of consumer technologies such as Health & Fitness Tracking and the Internet of Things (IoT). Beyond their technical contributions, these projects seek to inform public discourse on privacy protections, bridging the technical and societal dimensions of data use.

Recent Papers:

Network & Communications Security

Our research has evaluated novel techniques for verifying identity on the Internet.

The global economy is dependent on the security of network communications and infrastructures. Unfortunately, these security properties are violated with alarming frequency due to implementation errors or developer confusion, or because systems are made use of in unanticipated ways. This research seeks to better understanding this breakdown between theory and practice, and identify ways to restore correct functionality in vulnerable networked systems.

Recent Papers: