Highlighted Research Projects

Cryptographic Security at Scale

Cryptography is a cornerstone of modern computer security and is ubiquitous on the computer systems we depend on daily. As an academic discipline, after several decades of scientific development, we have a good understanding of Read more…

Mathematical Limits of Lattices in Cryptography

Nearly all of public-key cryptography relies on the assumed difficulty of solving various number-theoretic problems. Recent spectacular developments in cryptography such as fully homomorphic encryption, candidate multilinear maps, and efficient post-quantum lattice-based cryptography have produced Read more…

Developing Real-Time Virtualization

Recent years have witnessed two major trends in the development of complex real-time systems. First, they are moving from physically isolated hosts towards common computing platforms shared by multiple systems. Using common platforms can bring Read more…

Smart Alarms for Medical Device Systems

The Intensive Care Unit of most major hospitals is a noisy environment. In order to monitor patients, healthcare practitioners set threshold alarms on each of many individual vital sign monitors. While nurses themselves rarely consider Read more…

Network Provenance

Operators of distributed systems often find themselves needing to answer a diagnostic or forensic question. Some part of the system is found to be in an unexpected state; for example, a suspicious routing table entry Read more…

Theory and Practice of Differential Privacy

Large, diverse datasets hold tremendous promise, if only we can derive statistical insights from them. But often, these datasets are siloed and withheld, because of privacy concerns. Differential privacy can mitigate these concerns — it Read more…

Fairness in Machine Learning

Important decisions such as police deployment, loan approvals, hiring, and parole from incarceration are beginning to be made by machine learning algorithms. This has lent urgency to the question of whether these algorithms are fair. Read more…

Foundations of Adaptive Data Analysis

Classical tools for rigorously analyzing data make the assumption that the analysis is static: the models to be fit, and the hypotheses to be tested are fixed independently of the data, and preliminary analysis of Read more…

Improving GPU Performance and Programmability

In recent years, graphics processing units (GPUs) have thoroughly permeated consumer processor designs. It is now essentially impossible to find a smartphone, tablet or laptop without a substantial integrated GPU on the processor die. Utilizing Read more…

Measuring the World’s Well-Being

The World Well-Being Project (WWBP) is pioneering scientific techniques for measuring psychological well-being and physical health based on the analysis of language in social media. As a collaboration between computer scientists, psychologists, and medical researchers, Read more…

The Science of Deep Specification

In our interconnected world, software bugs and security vulnerabilities pose enormous costs and risks. The Deep Specification project addresses this problem by showing how to build software that does what it is supposed to do, Read more…