Security
As our everyday lives become increasingly digital, it is crucial to ensure that our data
and privacy is secure.
From blockchain security and cryptography to infrastructure security, we design, develop, and deploy solutions for improving security and privacy across both software and hardware computer systems.
What We Do
Sub Areas
- Access Control & Authorisation
- Authentication & Biometrics
- Blockchain Security
- Cloud Security
- Cryptography
- Distributed System Security
- FinTech Security
- Hardware Security
- Infrastructure Security & Experimentation
- Internet of Things (IoT) & Cyber Physical Systems (CPS) Security
- Language-Based Security
- Machine Learning & AI Security
- Malware Analysis & Attack Investigation
- Mobile Security & Privacy
- Multimedia Security & Forensics
- Network & Protocol Security
- Operating System Security
- Software Security & Analysis
- Privacy Technologies
- Trustworthy Computing
- Web Security & Privacy
Our Research Projects
Analytical Framework to Quantify Information Leakage and Memorization in Machine Learning
Machine learning models can "memorize" specific data points from their training data, impacting their predictions and potentially leaking sensitive information. This project aims to understand how this memorization affects models and develop methods to mitigate it.
Computational Hardness Assumptions and the Foundations of Cryptography
This program seeks to broaden and diversify the foundations of cryptography by identifying new plausible computational hardness assumptions that can be used to construct cryptosystems. Our current approach is to study and construct "fine-grained" cryptographic primitives based on the conjectured hardness of various well-studied algorithmic problems.
SQLancer: Automatic Testing of Database Management Systems
SQLancer automatically finds logic bugs in Database Management Systems (DBMSs). We have used SQLancer to find and report over 500 unique, previously unknown bugs in widely-used DBMSs. In addition, SQLancer has been widely adopted in the industry.
From iteration on multiple collections in synchrony to fast general interval joins
Synchrony iterator captures a programming pattern for synchronized iterations. It is a conservative extension that enhances the repertoire of algorithms expressible in comprehension syntax. In particular, efficient general synchronized iterations, e.g. linear-time algorithms for low-selectivity database non-equijoins, become expressible naturally in comprehensinon syntax.
Foundational Research Capabilities (FRC) Study on Foundations of Security and Data Privacy
This study was undertaken on behalf of National Research Foundation (NRF) Singapore, to study long-term plans in Security and Privacy foundations, and for further growing foundational research capabilities in Singapore. The study team was led by Abhik Roychoudhury from NUS, and had team members from NUS, NTU, SMU, CSA, A*STAR. The team submitted its report and recommendations at the end of 2022.
Our Research Groups
Verified Systems Engineering
We do research in the design and implementation of programming languages (PL), mathematical models of computation, and computer-assisted formal reasoning. We investigate the theoretical foundations of programming and build tools for ensuring that certain kinds of costly software errors and vulnerabilities never occur in the real-world code, which many people rely upon in their everyday lives.