Select Research Projects

NSDI Test of Time USENIX award recipients: Jeff Modul, Kun Tan, Geoff Voelker, (name obscured), and Lonnie Liu (l to r)
Sora: High-Performance Software Radio
Cloud Computing services at the top, connecting to devices below it (tablet, phones, laptops, computers)
Hey, You, Get Off of My Cloud
Live URL Classification System showing a progression from Live URL feeds to a Real-Time Feature Collector and then to a Classifier with equations below the flow chart
Identifying Suspicious URLs
Three men in masks around a a gray car with WA license plates and a bumpersticker that says Security and Privacy Research Lab on one side and a UCSD sticker on the other side
Experimental Security Analysis of a Modern Automobile
Photo of a pile of damaged old cell phones
UC San Diego Computer Scientists Tackle Annual Waste of 1.5 Billion Junked Smartphones
Example of a spoofed email attack exploiting open forwarding and relaxed validation for forwarded email from well-known providers
Scammers Can Abuse Security Flaws in Email Forwarding to Impersonate High-profile Domains
Image shows an android phone hooked up to diagnostic equipment
Bluetana: Detecting Bluetooth Card Skimmers
Map of globe showing how spam payments are processed, and laundered throughout the world
Click Trajectories: End-to-End Analysis of the Spam Value Chain
Tritonsort: A Balanced Large-Scale Sorting System: Alex Rasmussen, George Porter, Michael Conley, Radhika Niranjan Mysore, Amin Vahdat (UCSD), Harsha V. Madhyastha (UC Riverside), Alexander Pucher (Vienna University of Technology)
TritonSort