Team for Research in
Ubiquitous Secure Technology

News & Highlights

TRUST researcher Deirde Mulligan receives IAPP Privacy Leadership Award

April 21, 2016

TRUST researcher Deirdre Mulligan has been awarded the prestigious  ... Read More...


Former TRUST REU Student Wins Silver Award in ACM Research Competition for Undergrads

November 25, 2015

Luther Martin, a NERSC Student Assistant via the UC Berkeley TRUST-REU program, won ... Read More...


Former TRUST REU Student to Participate in FTC conference on Privacy and Technology

November 24, 2015

Ibrahim Altaweel, a participant in the TRUST Center's 2014REU program, has been selected to present research ... Read More...


Stanford to Offer Course in CryptoCurrency

August 25, 2015

As part of its new graduate certificate program in cybersecurity, Stanford University is ... Read More...


Summer Camp for Cybersecurity

August 25, 2015

High school students in the San Francisco Bay Area had a special opportunity to learn more about cybersecurity this summer, thanks to CYBEAR, a summer ... Read More...


TRUST Researcher Dan Boneh to Receive 2014 ACM-Infosys Foundation Award

March 31, 2015

The Association ... Read More...


Have You Read Your Privacy Policy?

February 5, 2015

... Read More...


San Jose State Designated Cyber Security Center of Excellence

December 4, 2014

TRUST Center partner institution San Jose State University was recently designated a National Center of Academic ... Read More...


Best Paper Award for TRUST Medical Informatics Research

November 25, 2014

The work of TRUST researchers at Vanderbilt University and their colleagues was recognized at the American Medical ... Read More...


Password Managers Pose Security Risk

September 24, 2014

Password managers may not be as effective as you think. While these tools provide convenience and (ostensibly) peace of mind, a recently released report ... Read More...


Privacy Can Be Good for Business

July 16, 2014

These days, most consumers are not surprised to learn that their online browsing habits or personal cell phone usage are mined by companies for targeted marketing practices. However, as TRUST researcher ... Read More...


Is the Internet Our Friend?

April 15, 2014

Just how safe is the Internet? TRUST researcher Nicolas Christin was one of the participants who explored this question in a debate ... Read More...


Few clues found in collapse of Mt. Gox bitcoin exchange

March 14, 2014

Despite online sleuthing and crowdsourcing, it is unlikely that those who suffered losses when bitcoin exchange Mt. Gox was hacked will be able to trace the path of their investments, comments ... Read More...


SJSU Establishes Center for Cyber Security and Big Data Studies

December 17, 2013

TRUST partner institution San Jose State announced the establishment of a new Center for Cyber Security ... Read More...


Studying Wiretaps to Big Data - Cornell moves into the MOOC world

November 14, 2013

TRUST researcher Prof. Steve Wicker of Cornell University will be teaching one of Cornell's first Massive Open Online Courses (MOOC) beginning ... Read More...


Online Hackers Beware: GOTCHA!

October 17, 2013

Worried about the robustness of the ubiquitous CAPTCHA in preventing online attacks? TRUST researchers Jeremiah ... Read More...


"Fingerprinting" of Mobile Devices

October 17, 2013

A team led by TRUST researcher and Stanford computer science Professor Dan Boneh has identified ... Read More...


Online privacy concerns growing

October 3, 2013

There's a privacy arms race under way online, a continuing struggle among consumers, Internet companies, advocates and policymakers to assert greater control over personal data. Following recent NSA ... Read More...


Your Digital Trail: Private Company Access

October 2, 2013

As the second story in a four-part series examining one's digital trail and who potentially has access to it, NPR broadcast ... Read More...


Researchers explore underground market of Twitter spam and abuse

October 2, 2013

Data presented at the 22nd USENIX Security Symposium by researchers at ICSI (International Computer Science Institute)from a project exploring the underground market of spam and abuse on Twitter. Vern ... Read More...


Wiretap Extension Will Help Crooks & Terrorists

October 2, 2013

By extending the existing US wiretap laws to give federal agencies easier backdoor access to Internet Communications, the country's enemies and cyberthieves also receive aid and technical assistance for ... Read More...


2013 Summer Program Applications Now Open

December 17, 2012

The TRUST REU is a nine-week summer residential program that offers rising juniors and seniors in computer science or electrical engineering programs the opportunity to conduct research in Cybersecurity, ... Read More...


NSF Awards $10 Million Grant to ICSI and Collaborators to Study Human Element of Cybercrime

September 26, 2012

The International Computer Science Institute (ICSI), along with the University of California, San Diego and George Mason University have received $10 million in a 5-year grant from the National ... Read More...


Johannes Gerke of Cornell University wins IEEE Award

June 12, 2012

Johannes Gerke, computer science professor at Cornell University, is one of 14 prominent technologists to be honored at the IEEE Computer Society's annual awards dinner in Seattle. Professor Gerke ... Read More...


How Al Qaeda Hid Secrets in a Video

May 3, 2012

A May 1, 2012 Discovery News article, "How Al Qaeda Hid Secrets In a Porn Video" discusses using steganography ... Read More...