Graduate

Faculty


  • L. Jean  CampL. Jean Camp
    Professor of Informatics

    ljcamp@indiana.edu
    (812) 856-1865
    Informatics West 300

    • Security
    • Social Informatics
    • Proactive Health Informatics

Risk is as inevitable online as it is offline, but informed risk decisions require understanding the underlying risk and the communication of that that risk in a timely, clear manner.

  • Research Description

    Camp's research area is interdisciplinary security and privacy. She studies key questions such as: Why are security and privacy-protecting technologies rejected or ignored? Is it because organizations would rather accept the uncertain costs of information over the certain costs of protection? Or is it because most of the benefit of an investment in security goes to some distant company which is protected from an attack by a compromised machine? If it's the latter, we need incentive-aware design for security and privacy. Is it because of lack of awareness of the risks? The risks of computing are difficult to understand, and compromised machines may participate in money laundering, spamming, and the enrichment of criminals. Thus, risk communication for security and privacy are required. Is it because the tools are simply unusable? In this case, usable security and privacy are the solution. Camp has published for each of these cases, from theoretical contributions, to actionable critiques, to functioning prototypes.

  • Accomplishments

    AAAS Congressional Fellow 2010
    NSF CAREER Award winner

  • Ryan  HenryRyan Henry
    Assistant Professor

    henry@indiana.edu
    (812) 856-9972
    Lindley Hall 330E

    • Security
    • Theoretical Computer Science

Henry's research focuses on the systems challenges of applied cryptography with a particular emphasis on using cryptography to build secure systems that preserve the privacy of their users.

  • Research Description

    Henry develops cryptographic techniques that help preserve the security and privacy of users on the Internet. His research emphasizes viewing systems development from a cryptographic perspective and building systems out of cryptography rather than building cryptography into systems. He's especially interested in the challenges that arise when using cryptography to build large and complex systems and in finding ways to adapt existing cryptographic primitives-especially those that are well-studied by theoreticians yet still considered impractical by practitioners'to overcome these problems. For instance, this may involve representing data in ways amenable to efficient parallelization, making tradeoffs in security parameters and threat models that make sense in the context of the given system, or composing seemingly disparate cryptographic primitives to realize complex functionality in a sound-yet-practical manner. Henry's work has resulted in systems for efficient revocable anonymous authentication, batch zero-knowledge proofs of knowledge, high-speed GPU-based cryptanalysis, and practical e-commerce protocols based on private information retrieval, which are in each case two or more orders of magnitude faster than existing techniques offering comparable functionality and security guarantees.

  • Raquel  HillRaquel Hill
    Associate Professor of Computer Science and Informatics

    ralhill@indiana.edu
    (812) 856-5807
    Lindley Hall 230E

    • Computer Networks
    • Proactive Health Informatics
    • Resource Allocation

Hill's research interests are in the area of data protection, including designing, developing, and evaluating mechanisms for securing access and preserving privacy of sensitive data.

  • Research Description

    Hill's research area is data protection; including designing, developing, and evaluating mechanisms for securing access and preserving privacy of sensitive data. High-dimensional datasets often include some combination of demographic, medical, and other personal information, which presents opportunities to characterize participants in unique ways. Sharing this data with third parties makes identifying information more widely available which limits the effectiveness of current data security and privacy mechanisms. Collecting and owning such data is also a liability for businesses, making them targets for attacks that compromise confidentiality and data integrity. Any information that distinguishes an individual or a record within a database may be used to identify the person to whom the information belongs. Even when traditional identifiers are removed, the uniqueness of the resulting records may make a privacy breach easy to orchestrate or implement. Therefore, when designing mechanisms to enforce privacy policies, one must consider the type of policy, the data and the intended use of the data.

  • Yan  HuangYan Huang
    Assistant Professor

    yh33@indiana.edu
    (812) 856-3241
    Lindley Hall 330C

    • Security
    • Cryptography

Huang has a broad interest in various aspects of computer security and cryptography, and has designed and developed cryptographic protocols to enable secure collaboration over secret data.

  • Research Description

    Huang is broadly interested in security and cryptography. He has worked on developing cryptographic protocols that provide strong security guarantees over generic computation. His goal is to build elegant theoretical ideas into practically usable systems that address real-world security problems often requiring synergy of Theory, Program Analysis, Artificial Intelligence, and Software Engineering.

  • Apu  KapadiaApu Kapadia
    Associate Professor of Computer Science and Informatics

    kapadia@indiana.edu
    (812) 856-1465
    Lindley Hall 330B

    • Computer Networks
    • Data Science
    • Security

Kapadia's research focuses on computer security and privacy issues in the context of social networks and wearable and sensor-enabled computing.

  • Research Description

    Kapadia is interested in topics related to computer security and privacy. He is particularly interested in accountable anonymity; pervasive, mobile, and wearable computing; human factors; crowdsourcing; and peer-to-peer networks.

  • Accomplishments

    Distinguished Alumni Educator Award, 2015
    Department of Computer Science, University of Illinois at Urbana-Champaign
    Google Research Award, Winter 2014 Privacy-Enhanced Life-Logging with Wearable Cameras Trustees Teaching Award, Indiana University Bloomington, 2013
    NSF CAREER 2013
    Best of 2012: MIT Technology Review arXiv Blog PlaceRaider

  • Steven  MyersSteven Myers
    Associate Professor of Computer Science and Informatics

    samyers@indiana.edu
    (812) 856-1860
    Lindley Hall 330F

    • Complexity Theory
    • Cryptography
    • Logic & Mathematical Foundations in Informatics

Myers' work focuses on applied and foundational cryptography, and in understanding security and novel threats in complex systems.

  • Research Description

    Myers' primary research interests in cryptography are in understanding foundational issues of core cryptographic primitives, such as public-key encryption and block-ciphers, and developing practical cryptographic protocols for secure and private computations. He also investigates methods in which many devices interact in a complex system, thereby affecting security, privacy, and attacking capabilities due to emergent outcomes.

  • Accomplishments

    2009-2010 Trustees Award for Teaching Excellence
    CSAW AT&T Applied Security Research Best Paper Award Finalist
    NYU-Polytec Cyber Security Awareness Week, October 2010

  • Sameer  PatilSameer Patil
    Assistant Professor

    patil@indiana.edu
    (812) 855-4546
    Informatics West 318

    • Security
    • Privacy
    • Human Centered Computing
  • Research Description

  • Accomplishments

  • XiaoFeng  WangXiaoFeng Wang
    Professor of Informatics and Computer Science

    xw7@indiana.edu
    (812) 856-1862
    Lindley Hall 230F

    • Security
    • Privacy Enhancing Technologies
    • Human Genome Privacy

Wang's research focuses on system security and data privacy with a specialization on security and privacy issues in mobile and cloud computing, and privacy issues in dissemination and computation of human genomic data.

  • Research Description

    Wang is a professor in the School of Informatics and Computing at Indiana University, Bloomington. He received his Ph.D. in Electrical and Computer Engineering from Carnegie Mellon University in 2004, and has since been a faculty member at IU. Dr. Wang is a well-recognized researcher on system and network security. His work focuses on cloud and mobile security, and data privacy. He is a recipient of 2011 Award for Outstanding Research in Privacy Enhancing Technologies (the PET Award) and the Best Practical Paper Award at the 32nd IEEE Symposium on Security and Privacy. His work frequently receives attention from the media, including CNN, MSNBC, Slashdot, CNet, PC World, etc. Examples include his discovery of security-critical vulnerabilities in payment API integrations and his recent study of the security flaws on the Apple platform. His research is supported by the NIH, NSF, Department of Homeland Security, the Air Force and Microsoft Research. Wang is also the director of IU's Center for Security Informatics.

  • Accomplishments

    Best Paper Award in Applied Cyber Security Research, 3rd Place (NYU-Poly Cyber Security Awareness Week): for the work on security risks in Android customization
    2014 Third place in National Security Innovation Competition: for the work on Android secure upgrading
    2013 Finalist for the Best Applied Security Paper Award (NYU-Poly Cyber Security Awareness Week): for the work on dedicated hosts on malicious web infrastructures
    2011 Award for Outstanding Research in Privacy Enhancing Technologies (the PET Award): for my research on Genome Privacy
    2011 PET Award runner-up: for my research on side-channel information leaks in web applications
    2011 Best Practical Paper Award, the 32nd IEEE Symposium on Security and Privacy: for my research on logic flaws in hybrid web applications