Network Provenance

Operators of distributed systems often find themselves needing to answer a diagnostic or forensic question. Some part of the system is found to be in an unexpected state; for example, a suspicious routing table entry is discovered, or a proxy cache is found to contain an unusually large number of Read more…

Theory and Practice of Differential Privacy

Large, diverse datasets hold tremendous promise, if only we can derive statistical insights from them. But often, these datasets are siloed and withheld, because of privacy concerns. Differential privacy can mitigate these concerns — it provides a strong, attractive privacy guarantee that protects data owners from risks associated disclosure of Read more…

Improving GPU Performance and Programmability

In recent years, graphics processing units (GPUs) have thoroughly permeated consumer processor designs. It is now essentially impossible to find a smartphone, tablet or laptop without a substantial integrated GPU on the processor die. Utilizing these omnipresent GPUs, however, remains a challenge. Writing correct and performant parallel code, a notoriously Read more…

Measuring the World’s Well-Being

The World Well-Being Project (WWBP) is pioneering scientific techniques for measuring psychological well-being and physical health based on the analysis of language in social media. As a collaboration between computer scientists, psychologists, and medical researchers, we are shedding new light on the psychosocial processes that affect health and happiness and Read more…

DeDOS: Declarative Dispersion-Oriented Software

The goal of this project is to create fundamentally new defenses against distributed denial-of-service (DDoS) attacks that can provide far greater resilience to these attacks compared to existing solutions. Today’s responses to DDoS attacks largely rely on old-school network-based filtering or scrubbing, which are slow and manual, and cannot handle Read more…

The Science of Deep Specification

In our interconnected world, software bugs and security vulnerabilities pose enormous costs and risks. The Deep Specification project addresses this problem by showing how to build software that does what it is supposed to do, no less and (just as important) no more: No unintended backdoors that allow hackers in, Read more…