Skip to content

Software & Hardware Systems

Our researchers are driving innovation across the entire hardware, software and network stack to make computer systems more reliable, efficient and secure. 

From internet-scale networks, to next-generation chip designs, to deep learning frameworks and more, we build and refine the devices and applications that individuals, industries and, indeed, entire economies depend upon every day.


Research Groups & Labs

Three padlocks of different sizes linked by a chain

Cryptography Research Group

The Cryptography Group advances the foundations and applications of cryptography, including public-key and symmetric cryptography, obfuscation, attribute-based and functional encryption, secure multi-party computation, quantum cryptography and more.

Laptop displaying glowing purple light onscreen in darkened room

Security and Privacy Research Lab

The Security and Privacy Research Lab works on a variety of topics, ranging from studying and addressing security and privacy risks in existing technologies, to anticipating future risks in emerging technologies.


Faculty Members

Faculty

Adjunct Faculty

Emeritus Faculty


Centers & Initiatives

eScience Institute logo

eScience Institute

The eScience Institute empowers researchers and students in all fields to answer fundamental questions through the use of large, complex, and noisy data. As the hub of data-intensive discovery on campus, we lead a community of innovators in the techniques, technologies, and best practices of data science and the fields that depend on them.

ACTION logo

NSF AI ACTION Institute

The NSF AI Institute for Agent-based Cyber Threat Intelligence and Operation (ACTION) seeks to change the way mission-critical systems are protected against sophisticated, ever-changing security threats. In cooperation with (and learning from) security operations experts, intelligent agents will use complex knowledge representation, logic reasoning, and learning to identify flaws, detect attacks, perform attribution, and respond to breaches in a timely and scalable fashion.

Highlights