Taming Undefined Behavior in LLVM
Fundamentals of User Studies
Overview of important methods and techniques applied in user studies from the perspective of academic research, and also from the perspective of product development. The talk is ended with two examples of projects done at…
IoT Security Standards
This project includes contributions to IETF and other relevant standards organizations, as well as reviews of public documents in such bodies, related to IoT security. Reviews of documents: draft-ietf-suit-mud-03 draft-hartke-core-e2e-security-reqs-02 draft-pei-opentrustprotocol-04 draft-moran-suit-architecture-03 draft-housley-suit-cose-hash-sig-00 draft-ietf-teep-architecture-00 draft-ietf-suit-architecture-05…
Machine Learning for Web Security
In this project, we use machine learning to improve web security by addressing these types of attacks. A number of these projects have been used to help protect Bing’s users.
Organizational Infrastructure Security
Protecting an organization's infrastructure from attacks is critical to defending against cyber threats. In this project, we work on projects to detect targeted attacks as well as commodity malware on an organizational computer network.