Security and Privacy
At the same time society is increasingly relying on computers, a diverse array of adversaries are exploiting security vulnerabilities in these systems to compromise critical assets. There are also rising privacy concerns about how pervasive collection of data about individuals can be used to predict and manipulate their behavior. Illinois Security and Privacy faculty address security and privacy concerns with both theoretical and applied approaches.
They address security of computer and communication systems including: operating systems; auditing and data provenance; the Internet, wireless networks, and the “internet of things”; cloud computing; approximate computing; quality and resource management; and mobile computing. They also explore techniques related to security and privacy in a data science context such as: technologies for privacy-preserving data sharing based on cryptography, hardware, or generative models; distributed systems, crypto-currencies, and blockchains; adversarial machine learning; secure computation, zero-knowledge verifiable outsourcing, and related cryptography. These and other techniques are applied to a wide range of applications including: multi-sensory systems and multimedia; human factors and socio-technical considerations; power grids, autonomous vehicles and other cyber-physical systems; healthcare and genomics.
Research Efforts and Groups
- Coordinated Science Lab (CSL)
- Information Trust Institute (ITI) in the Coordinated Science Lab
- Genomic Security and Privacy (GSP) Theme at the Institute for Genomic Biology
- Illinois Cyber Security Scholars Program
- Illinois-NSA Center for Cyber Defense Education and Research
- Security and Privacy Research at Illinois (SPR@I Group)
Seminars
- Security and Privacy at Illinois (SPR@I) Seminar
- Illinois Computer Science Speaker Series: brings prominent leaders and experts to campus to share their ideas and promote conversations about important challenges and topics in the discipline.
Faculty & Affiliate Faculty
Secure Compilation, Program Analysis, Software Security, Debloating
Systems and Networks, Auditing, Internet of Things Security
Privacy and Networks
Network Verification, Software Resilience, Model Checking
Cloud Computing, Big Data, Ubiquitous Computing, Micro Kernels
Usable Privacy and Security
Hardware Security, Applied Cryptography
Network Infrastructure Security and Verification
Internet-of-Things, Privacy, Data Science,Healthcare, Power Grid
Cryptography, Secure Computation, Multiparty Computation
Systems Security, Memory/Storage Security
Measures and Models, Trust Measurement and Modeling, AI/ML, Systems and Networks
Secure Computation, Cryptography, Privacy
Mobile Privacy, Wireless Security
E-Crime and Cyber-Physical Systems
Machine Learning, Privacy Preserving Generative Models
Distributed Computing and Cryptography
Approximate Computing across Full System Stack
Mobile, Multi-Sensory Systems, Quality and Resource Management, Energy Systems
Modeling and Simulation
Cryptography, Secure Distributed Systems, Privacy
Formal verification of security protocols; Verification of differential privacy
Security and Privacy, Internet Measurement, Human Factors
Usable Privacy and Security
Cryptography, Security
Adjunct Faculty
CS professor Charith Mendis receives DARPA Young Faculty Award
- News
- October 9, 2024
Five CS students named 2025 Siebel Scholars
- News
- October 2, 2024
Improving the safety of LLM foundation models
- News
- September 16, 2024