Apu Kapadia: Research Statement past and Current Research

My research focuses on computer security, with particular emphasis on user privacy. I like to apply sound theoretical techniques to societally relevant problems—a significant portion of my research has focused on empowering users to protect their privacy in a networked society where their personal information or habits are increasingly available to potentially-unauthorized third parties. I have explored solutions in which users place minimal trust in the system to protect their privacy, and make use of privacy-enhancing technologies such as anonymizing networks and anonymous credential systems to access or publish information privately [1, 4, 13, 12]. In situations where complete anonymity against the system may be impractical, I have developed policy-based solutions in which users trust the system to enforce their privacy policies against other users [6, 8, 7, 9]. I am also committed to developing usable security and privacy mechanisms [9, 6, 2], and am interested in other security topics such as secure distributed hash tables (DHTs) [10], keyboard acoustic emanations, privacy in social-networking applications, and querier-side privacy.

[1]  Roy H. Campbell,et al.  Routing through the mist: privacy preserving communication in ubiquitous computing environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[2]  Roy H. Campbell,et al.  KNOW Why your access was denied: regulating feedback for usable security , 2004, CCS '04.

[3]  Roy H. Campbell,et al.  Routing with confidence: supporting discretionary routing requirements in policy based networks , 2004, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004..

[4]  Apu Kapadia,et al.  Models for Privacy in Ubiquitous Computing Environments , 2005 .

[5]  Roy H. Campbell,et al.  Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall , 2007, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07).

[6]  Linden Vongsathorn,et al.  TwoKind authentication: usable authenticators for untrustworthy environments , 2007, SOUPS '07.

[7]  Sean W. Smith,et al.  Nymble: Anonymous IP-Address Blocking , 2007, Privacy Enhancing Technologies.

[8]  Sean W. Smith,et al.  Attribute-Based Publishing with Hidden Credentials and Hidden Policies , 2007, NDSS.

[9]  Sean W. Smith,et al.  Blacklistable anonymous credentials: blocking misbehaving users without ttps , 2007, CCS '07.

[10]  Tristan Henderson,et al.  Virtual Walls: Protecting Digital Privacy in Pervasive Environments , 2007, Pervasive.

[11]  David Kotz,et al.  AnonySense: Opportunistic and Privacy-Preserving Context Collection , 2009, Pervasive.

[12]  Apu Kapadia,et al.  Halo: High-Assurance Locate for Distributed Hash Tables , 2008, NDSS.