Security and Privacy
Our faculty are recognized leaders in security and privacy, using both innovative theory and practical methods to address these critical issues.
In today's digital landscape, various adversaries exploit security vulnerabilities to compromise essential assets. At the same time, increasing privacy concerns and extensive data collection enable the manipulation of individual lives, underscoring the need for effective solutions.
We focus on the security of computer and communication systems, including operating systems, data provenance, the Internet, wireless networks, cloud computing, and mobile computing. Our research includes privacy-preserving data sharing, distributed systems, cryptocurrencies, blockchains, adversarial machine learning, and advanced cryptographic techniques. These methods are applied to diverse areas, such as multisensory systems, human factors, power grids, autonomous vehicles, and healthcare. By addressing these challenges, we work to enhance digital security and protect individuals' privacy.
Siebel School Experts at Work
Big challenges. Bold solutions. See how our faculty and students are shaping Security and Privacy.
NSF awards strengthen open-science data security
- Siebel School News
- November 11, 2025
Five CS Graduate Students Named 2026 Siebel Scholars
- Siebel School News
- October 22, 2025
Research Efforts and Groups
- Coordinated Science Lab (CSL)
- Information Trust Institute (ITI) in the Coordinated Science Lab
- Genomic Security and Privacy (GSP) Theme at the Institute for Genomic Biology
- Illinois Cyber Security Scholars Program
- Illinois-NSA Center for Cyber Defense Education and Research
- Security and Privacy Research at Illinois (SPR@I Group)
Seminars
- Security and Privacy at Illinois (SPR@I) Seminar
- Illinois Computer Science Speaker Series: brings prominent leaders and experts to campus to share their ideas and promote conversations about important challenges and topics in the discipline.
Faculty & Affiliate Faculty
Secure Compilation, Program Analysis, Software Security, Debloating
Systems and Networks, Auditing, Internet of Things Security
Privacy and Networks
Network Verification, Software Resilience, Model Checking
Cloud Computing, Big Data, Ubiquitous Computing, Micro Kernels
Usable Privacy, Usable Security
Hardware Security, Applied Cryptography
Network Infrastructure Security and Verification
Internet-of-Things, Privacy, Data Science,Healthcare, Power Grid
Cryptography, Secure Computation, Multiparty Computation
Systems Security, Memory/Storage Security
Measures and Models, Trust Measurement and Modeling, AI/ML, Systems and Networks
Secure Computation, Cryptography, Privacy
Mobile Privacy, Wireless Security
E-Crime and Cyber-Physical Systems
Machine Learning, Privacy Preserving Generative Models
Trustworthy AI, Cyber Threat Intelligence, Privacy Compliance
Distributed Computing and Cryptography
Approximate Computing across Full System Stack
Mobile, Multi-Sensory Systems, Quality and Resource Management, Energy Systems
Modeling and Simulation
Cryptography, Secure Distributed Systems, Privacy
Formal verification of security protocols; Verification of differential privacy
Security and Privacy, Internet Measurement, Human Factors
Usable Privacy and Security
Cryptography, Security