Provably-Safe Sandboxing with WebAssembly

What if you could run untrusted code and still be able to sleep at night, safe and sound? Disclaimer: our award-winning work [1] can only calm your unsafe-software related fears; we recommend complementing this by additionally checking for monsters under your bed, and leaving …

Robustness between the worst and average case

As machine learning systems become increasingly implemented in safety-critical applications, such as autonomous driving and healthcare, we need to ensure these systems are reliable and trustworthy. For example, we might wish to determine whether a car’s camera-based autopilot sys…

Classification with Strategically Withheld Data

This blog post is based on a research paper with the same title, authored by Anilesh Krishnaswamy, Haoming Li, David Rein, Hanrui Zhang, and Vincent Conitzer, published at AAAI 2021. TL;DR: We investigate a classification problem where each data point being classified is controll…

Time-Traveling Simulation for Security

Blockchains are a powerful technology which allow decentralized agreement with an immutable history. Since transactions can be added, but not removed, blockchains allow distributed banking as a trustworthy alternative to central banking. A vast amount of cryptographic research on…

Hello World

This is the first post being made to the CSD PhD blog, testing out the system. And so, indeed, hello world! That’s really all there is to this post. You don’t need to keep reading. I just have to fill this space so that the preview of this post is filled up. That way when it re…