Skip to main content

Research Area: Mobility

Projects List

Accountable Mobile Computing Framework Based on User Behavior Modeling
Research Area: Secure Home Computing | Mobility | Privacy Protection | Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Next Generation Threat Prediction and Response | Threat Analysis and Modeling
Researchers: Martin Griss, Anind Dey, Joy Zhang

Agora: Mobile Cloud-Computing Middleware
Research Area: Mobility
Researcher: Priya Narasimhan

Android App Scanner
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Jason Hong, Janne Lindqvist

Autonomous Trustworthy Computing Platforms and Devices
Research Area: Trustworthy Computing Platforms and Devices | Security of Cyber-Physical Systems | Mobility
Cross Cutting Thrusts: Software Security
Researcher: Ole Mengshoel

Behavior-based Mobility Research
Research Area: Mobility
Researchers: Patrick Tague, Joy Zhang

Campus Navigation
Research Area: Privacy Protection | Mobility
Researchers: James Morris, Norman Sadeh

Collaborative Mobile Sensor Network Control with Extremely Noisy Measurements
Research Area: Mobility | Security of Cyber-Physical Systems
Researchers: Pei Zhang, Bruno Sinopoli

Comprehensive Security & Privacy for Next Generation Mobile Networks
Research Area: Mobility | Privacy Protection | Next Generation Secure and Available Networks
Researcher: Patrick Tague

Compressed Sensing for Face Recognition
Research Area: Mobility | Security of Cyber-Physical Systems
Researcher: Vijayakumar Bhagavatula

Context-Aware Scalable Authentication: Using passive multi-factor sensing to facilitate authentication
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Jason Hong

CrowdScanning: Using Crowdsourcing and Static Analysis to understand the Privacy Issues in Smartphone Apps
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Jason Hong, Norman Sadeh

Dependably Usable Interfaces for Security in the Real World (Renewal)
Research Area: Mobility
Researcher: Roy Maxion

Diagnosing and Locating Wireless Disruption
Research Area: Mobility | Next Generation Secure and Available Networks
Researchers: Srinivasan Seshan, Peter Steenkiste, Dave Andersen

Efficiently Securing Non-Volatile Storage in Portable Systems
Research Area: Mobility | Trustworthy Computing Platforms and Devices | Secure Home Computing
Researcher: Ken Mai

Gort: An analysis tool for understanding the privacy and security behaviors of smartphone apps
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Jason Hong

Grey Project: device-enabled authorization
Research Area: Mobility | Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Lujo Bauer

Mobile Platform Security
Research Area: Mobility
Cross Cutting Thrusts: Software Security | Formal Methods
Researchers: Lujo Bauer, Limin Jia

Mobile Users Effectively Control Privacy in a Friend-Finder Application
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Norman Sadeh, Lorrie Cranor, Jason Hong

Multichannel Modeling for Enhancing and Masking Speech Communications
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Ted Selker, Ian Lane

Physiological Activity Recognition System (PARS)
Research Area: Mobility
Researcher: Pei Zhang

Privacy and Security in Real Time Monitoring Systems
Research Area: Mobility | Privacy Protection
Researchers: Daniel Siewiorek, Asim Smailagic, Martin Griss

Reconciling Privacy and Usability by Learning Default Privacy Policies
Research Area: Privacy Protection | Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Norman Sadeh

Risk Analysis for Securing Wireless Ad-Hoc Networks
Research Area: Mobility | Next Generation Secure and Available Networks
Researcher: Radu Marculescu

Robust, Secure, Efficient Networked Embedded Control Systems
Research Area: Trustworthy Computing Platforms and Devices | Mobility
Cross Cutting Thrusts: Software Security
Researcher: Bruno Sinopoli

Saferide
Research Area: Mobility
Researcher: James Morris

SafeSlinger: Easy-to-Use and Secure Public-Key Exchange
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security | Cryptography
Researchers: Michael Farb, Adrian Perrig, Jonathan McCune, Tiffany Hyun-Jin Kim, Yue-Hsun Lin

Securable, Usable Context Toolkit for Mobile Applications
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Martin Griss, Anind Dey, Pei Zhang, Joy Zhang

Secure Ad Hoc Routing Protocols
Research Area: Mobility
Researcher: Adrian Perrig

Semantic Geotagging for Situational Awareness During Disaster Response
Research Area: Mobility | Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Martin Griss, Anind Dey, Ray Bareiss, Steven Rosenberg, Joy Zhang

Sluice: Secure Software Upgrades in Sensor Networks
Research Area: Next Generation Secure and Available Networks | Mobility
Researchers: Priya Narasimhan, Michael Chuang

Spartacus
Research Area: Mobility
Researcher: Pei Zhang

Studying the Android Malware Ecosystem
Research Area: Mobility
Cross Cutting Thrusts: Software Security
Researcher: Nicolas Christin

Transient Customization of Mobile Computing Infrastructure
Research Area: Mobility
Researcher: Mahadev Satyanarayanan

Trinetra: Mobile Technologies for Assisting the Blind & Visually Impaired
Research Area: Mobility | Secure Home Computing
Researchers: Priya Narasimhan, Moshe Mahler

Understanding Human Behaviors at Large Scales through Mobile Devices
Research Area: Mobility | Privacy Protection | Security of Cyber-Physical Systems
Researchers: Jason Hong, Norman Sadeh, Justin Cranshaw, Eran Toch

Usable security and privacy for context-aware mobile applications
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Martin Griss, Anind Dey, Pei Zhang

User-Controllable Policy Learning
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Norman Sadeh, Lorrie Cranor

User Controllable Security & Privacy for Mobile Social Networking
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Norman Sadeh, Lorrie Cranor, Jason Hong

User-Controllable Security and Privacy for Pervasive Computing
Research Area: Privacy Protection | Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Norman Sadeh, Jason Hong, Lorrie Cranor, Lujo Bauer

VMA: Dynamic and Secure Heterogeneous System for Elder Care
Research Area: Next Generation Secure and Available Networks | Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Pei Zhang, Martin Griss, Raj Rajkumar, Daniel Siewiorek, Asim Smailagic