SECURITY
As our everyday lives become increasingly digital, it is crucial to ensure that our data
and privacy is secure.
From blockchain security and cryptography to infrastructure security, we design, develop, and deploy solutions for improving security and privacy across both software and hardware computer systems.
WHAT WE DO

Construct and analyse protocols to prevent third parties (or adversaries) from maliciously accessing data.

Develop solutions to combat security breaches caused by hardware failure.

Study techniques to detect and prevent unauthorised access to computer and Internet network systems.

Explore issues and developments in biometrics, multimedia, and machine learning security.

Analyse threats across all areas of security, developing solutions to preserve privacy and develop secure computing systems.
SUB AREAS:
Access Control & Authorisation
Authentication & Biometrics
Blockchain Security
Cloud Security
Cryptography
Distributed System Security
Fintech Security
Hardware Security
Infrastructure Security & Experimentation
Internet of Things (IoT) & Cyber Physical Systems (CPS) Security
Language-Based Security
Machine Learning & AI Security
Malware Analysis & Attack Investigation
Mobile Security & Privacy
Multimedia Security & Forensics
Network & Protocol Security
Operating System Security
Software Security & Analysis
Privacy Technologies
Trustworthy Computing
Web Security & Privacy
OUR RESEARCH PROJECTS


Computational Hardness Assumptions and the Foundations of Cryptography
This program seeks to broaden and diversify the foundations of cryptography by identifying new plausible computational hardness assumptions that can be used to construct cryptosystems. Our current approach is to study and construct "fine-grained" cryptographic primitives based on the conjectured hardness of various well-studied algorithmic problems.

SQLancer: Automatic Testing of Database Management Systems
SQLancer automatically finds logic bugs in Database Management Systems (DBMSs). We have used SQLancer to find and report over 500 unique, previously unknown bugs in widely-used DBMSs. In addition, SQLancer has been widely adopted in the industry.

From iteration on multiple collections in synchrony to fast general interval joins
Synchrony iterator captures a programming pattern for synchronized iterations. It is a conservative extension that enhances the repertoire of algorithms expressible in comprehension syntax. In particular, efficient general synchronized iterations, e.g. linear-time algorithms for low-selectivity database non-equijoins, become expressible naturally in comprehensinon syntax.





OUR RESEARCH GROUPS

Verified Systems Engineering
We do research in the design and implementation of programming languages (PL), mathematical models of computation, and computer-assisted formal reasoning. We investigate the theoretical foundations of programming and build tools for ensuring that certain kinds of costly software errors and vulnerabilities never occur in the real-world code, which many people rely upon in their everyday lives.

Secure Software Research Group
Past and present research team members in this group appear here: https://www.comp.nus.edu.sg/~abhik/students.htm