- #STANFORD CS MOBILE AND INTERNET COMPUTING HOW TO#
- #STANFORD CS MOBILE AND INTERNET COMPUTING SOFTWARE#
In 2016 more than 2 billion records and $450 billion were lost due to publicly-reported criminal and nation-state cyberattacks across the globe, and over 100 million medical records were stolen in the United States alone. It protects your passwords, your email, and in general protects your privacy and keeps your data safe.
#STANFORD CS MOBILE AND INTERNET COMPUTING HOW TO#
Her work has been publicized in The Washington Post, Wired, and The Economist, and she received a 2016 ACM CCS Best Paper Award.Ĭryptography is the study of how to keep secrets. She is also one of the co-founders of ZCash, a startup building a cryptocurrency based on Zerocash. Some of her recent work has been on demonstrating flaws in Apple’s iMessage end to end encryption, cryptographic automation, decentralized anonymous e-cash, and decentralized anonymous credentials. More specifically, her work has focused on the security of deployed cryptographic systems from all aspects, including the evaluation of real systems, improving the tools that we have to design and create them, and actually creating real, deployable systems.
Her research interests focus largely on practical and applied cryptography. She then did a short postdoc at the University of Maryland before joining Purdue. She received the Bachelor of Science in Computer Science and Engineering and Bachelor of Arts in Mathematics from Bucknell University in 2011, a Masters of Engineering in Computer Science from Johns Hopkins University in 2013, and just completed her PhD in Computer Science from Johns Hopkins University in August 2017. Finally, we believe energy exploit will be a practical attack vector and mobile users should be aware of this type of attacks.Ĭhristina Garman is an assistant professor in the Department of Computer Science at Purdue University. We quantitatively show how quickly we can drain the battery through each individual attack, as well as their combinations.
#STANFORD CS MOBILE AND INTERNET COMPUTING SOFTWARE#
In particular, we explore energy attacks from the following aspect: hardware components, software resources, and network communications through the design and implementation of concrete malicious apps, and malicious web pages. As such, in this paper, we present the first systematic study on how to exploit the energy attacks on smartphones. While previous studies have analyzed the energy attacks in servers, no existing work has analyzed the energy attacks on mobile devices.
In general, energy attacks on mobile devices are denial of service (DoS) type of attacks. They use batteries that allow using the device for a limited amount of time. Energy Attacks on Mobile and IoT DevicesĪll mobile devices are energy-constrained.
Kundu has been a member of ACM for over decade during this period, he has participated in several ACM conferences and acted as reviewer for many journals. Kundu's research is: "How to weave security, privacy, compliance, and ethics requirements with the functionality." He is currently the Associate Editor for IEEE Transactions on Dependable and Secure Computing, and Guest Editor, IEEE Internet Computing Special Issue on Healthcare Informatics and Privacy. He is leading the security and compliance research efforts for IBM Watson Health Cloud. His research interests are in Security, Privacy, Compliance and AI Ethics for cloud, blockchain, mobile/IoT and regulatory computing environments. in Computer Science from Purdue University in 2010 prior to joining IBM Research. Keynote Address Ashish Kundu, ACM Distinguished SpeakerĪshish Kundu is a Master Inventor, and Research Scientist in Security Research at the IBM T J Watson Research Center, Yorktown Heights, New York. He received Ph.D.