Research Library

Since 2015, CLTC has directly funded more than 160 projects by UC Berkeley students, faculty & affiliates on original cybersecurity research topics, in addition to developing our own white papers, publications, blogs, policy analysis and recommendations, and open-source curricula and toolkits.

Filter & Sort

Sort by
Research Type
Research Topics
Date Type Research Item Topics

November 27, 2024

Grant

Avenger: Looking Into The Future of Internet Censorship With Artificial Intelligence Algorithms

By: Changcheng Fan

Internet censorship is a critical human rights issue, as the internet has rapidly become the primary mode of communication globally. While many censorship circumvention tools exist, they are…

November 27, 2024

Grant

Cyber City

By: Brandon Dang, Boo Park, Jennifer Telisczak, Dante Terminella

This capstone project addresses an urgent need in society through an innovative approach: a role-playing mobile game designed to teach users, particularly seniors and non-tech professionals, about social…

educationsocial engineeringvulnerable populations

November 27, 2024

Grant

An Interpretability Study of LLMs for Code Security

By: Zhun Wang

Large language models (LLMs) such as ChatGPT have greatly advanced coding tasks but often fail to generate secure code. Current approaches to improving code security, relying on fine-tuning,…

machine learning (ML)

November 27, 2024

Grant

Empowering Connectivity: Analyzing and Implementing Community-Driven Networks

By: Diana Chen, Hannah Ellis

This project explores the potential of community networks as a solution to issues related to high costs, surveillance, and limited resilience in traditional internet infrastructure. While major ISPs…

encryptioninfrastructureprivacysurveillance

November 27, 2024

Grant

UX Design Considerations for Human AI Agent Interaction

By: Salia Asanova, Kaiting Chang, Cynthia Chen, Casey Hou

This project explores the challenges and design requirements involved in developing safe and user-centered experiences for autonomous AI agents. Unlike traditional AI that simply responds to user prompts,…

artificial intelligence (AI)designrisk

November 19, 2024

White Paper

CyberCAN: Cybersecurity for Cities and Nonprofits

By: Sarah Powazek, Shannon Pierson

A new CLTC report provides guidance to help government leaders in San Francisco and other cities more effectively support the digital security of local nonprofits. The report, “CyberCAN:…

Californiapublic interest cybersecurity

October 31, 2024

White Paper

abstract colorful painting

Resistance to Text-to-Image Generators in Creator Communities

Text-to-image generators like DALL-E have sparked controversy among artistic creators, who are concerned about how generative artificial intelligence (Gen AI) models have been trained with copyright-protected materials. A…

artartificial intelligence (AI)deep fakedigital harmspolicy

October 1, 2024

White Paper

solar panels and wind turbines shown with a grid of digital dots

Cyber Resilience and Social Equity: Twin Pillars of a Sustainable Energy Future

By: Emma Stewart, Remy Stolworthy, Virginia Wright

A report published by the Center for Long-Term Cybersecurity, Cyber Resilience and Social Equity: Twin Pillars of a Sustainable Energy Future, examines the importance of cybersecurity in ensuring equitable access to energy. In an era of worsening cybersecurity threats, the paper advocates for “sustainable energy delivery systems that ensure robust defenses without compromising the goals of reducing energy poverty and ensuring energy security.”

digital harmshomeland securityinfrastructurepolicypublic interest cybersecurity

September 12, 2024

Enhancing Cybersecurity Resilience for Transnational Dissidents

A report published by the Center for Long-Term Cybersecurity, Enhancing Cybersecurity Resilience for Transnational Dissidents, examines the cybersecurity posture, vulnerability, and resilience of exiled women dissidents in the…

digital harmsMITRE Attackpublic interest cybersecurityrisksurveillancevulnerable populations

September 3, 2024

White Paper

white dots appearing to form a swarm

A Swarm Intelligence Approach to Prioritizing the CIS Controls V8.0 Implementation

By: Hayat Abdulla Asad Cue, Thirimachos Bourlai, Mark Lupo

Authored by researchers affiliated with CyberArch, a cybersecurity clinic at the University of Georgia’s Carl Vinson Institute of Government (CVIOG), this paper introduces a novel approach for ranking actions outlined in the Center for Internet Security (CIS) framework, a prioritized set of safeguards to help organizations mitigate common cyber attacks.

cyber talent pipelinedigital harmsgovernanceMITRE Attackpublic interest cybersecurityriskusable securityvulnerable populations