Grant Year: 2019

January 14, 2020

Hackers vs. Testers: Understanding Software Vulnerability Discovery Processes

Security vulnerabilities pose a grave danger to the integrity of any system because they can undermine almost any protection mechanism or safeguard. As such, finding vulnerabilities before the software gets deployed is a critical task in any current software development cycle. A vital tool has recently emerged in the arsenal…

January 14, 2020

Engaging Expert Stakeholders about the Future of Menstrual Biosensing Technology

Networked sensor technologies are increasingly present in daily life. While promising improved health and efficiency, they also introduce far-reaching issues around cybersecurity, privacy, autonomy, and consent that can be difficult to predict or resist. This project will examine menstrual tracking technologies as a case for understanding the current and near-future…

January 14, 2020

The Mice that Roar: Small States and the Pursuit of National Defense in Cyberspace

Some relatively small states such as Estonia, Finland, Israel, and Singapore have become significant providers of national cyber-defense for their populations, regularly ranking alongside far larger states such as the US. This development is puzzling for security scholars as it represents a departure from the prevailing assumption that larger states…

January 14, 2020

Smart Home Surveillance of Domestic Employees

This research aims at developing a more comprehensive understanding of how the expanding use of smart home devices affects the privacy of individuals who did not choose to deploy them–and may not even be aware of them–with a focus on the privacy of in-home employees, in particular a case study…

January 14, 2020

Deep Fairness in Public Policy

The proliferation of automated decision-making systems has yielded much commercial success, but the potential of such systems to systematically generate biased decisions threatens to exacerbate the vulnerability of certain subgroups. Especially as the aim of machine learning algorithms shifts from making predictions for consumption by humans to making the very…

January 14, 2020

Learning Photo Forensics

Advances in photo editing and manipulation tools have made it significantly easier to create fake imagery. Learning to detect such manipulations, however, remains a challenging problem due to the lack of sufficient amounts of manipulated training data. We propose to address this problem by developing new, sample-efficient learning methods that…

January 14, 2020

Data Privacy: Foundations and Applications

Consider an organization that collects sensitive information about individuals, and needs to share the results of analyzing that data while respecting the individuals’ privacy. The US Census Bureau, for example, collects detailed records on hundreds of millions of individuals, and is mandated to share as much useful aggregate information as…

August 22, 2019

Coordinated Entry System Research and Development for Alameda County’s Continuum of Care

Governments are increasingly using technology to allocate scarce social service resources, like housing services. In collaboration with Alameda County’s Continuum of Care, this project will use qualitative research methods (i.e. interviews, participatory design, and usability testing) to conduct a needs assessment and system recommendation around “matching” unhoused people to appropriate…