Team for Research in
Ubiquitous Secure Technology

News & Highlights

Is the Internet Our Friend?

April 15, 2014

Just how safe is the Internet? TRUST researcher Nicolas Christin was one of the participants who explored this question in a debate ... Read More...


Few clues found in collapse of Mt. Gox bitcoin exchange

March 14, 2014

Despite online sleuthing and crowdsourcing, it is unlikely that those who suffered losses when bitcoin exchange Mt. Gox was hacked will be able to trace the path of their investments, comments ... Read More...


SJSU Establishes Center for Cyber Security and Big Data Studies

December 17, 2013

TRUST partner institution San Jose State announced the establishment of a new Center for Cyber Security ... Read More...


Studying Wiretaps to Big Data - Cornell moves into the MOOC world

November 14, 2013

TRUST researcher Prof. Steve Wicker of Cornell University will be teaching one of Cornell's first Massive Open Online Courses (MOOC) beginning ... Read More...


Online Hackers Beware: GOTCHA!

October 17, 2013

Worried about the robustness of the ubiquitous CAPTCHA in preventing online attacks? TRUST researchers Jeremiah ... Read More...


"Fingerprinting" of Mobile Devices

October 17, 2013

A team led by TRUST researcher and Stanford computer science Professor Dan Boneh has identified ... Read More...


Online privacy concerns growing

October 3, 2013

There's a privacy arms race under way online, a continuing struggle among consumers, Internet companies, advocates and policymakers to assert greater control over personal data. Following recent NSA ... Read More...


Your Digital Trail: Private Company Access

October 2, 2013

As the second story in a four-part series examining one's digital trail and who potentially has access to it, NPR broadcast ... Read More...


Researchers explore underground market of Twitter spam and abuse

October 2, 2013

Data presented at the 22nd USENIX Security Symposium by researchers at ICSI (International Computer Science Institute)from a project exploring the underground market of spam and abuse on Twitter. Vern ... Read More...


Wiretap Extension Will Help Crooks & Terrorists

October 2, 2013

By extending the existing US wiretap laws to give federal agencies easier backdoor access to Internet Communications, the country's enemies and cyberthieves also receive aid and technical assistance for ... Read More...


2013 Summer Program Applications Now Open

December 17, 2012

The TRUST REU is a nine-week summer residential program that offers rising juniors and seniors in computer science or electrical engineering programs the opportunity to conduct research in Cybersecurity, ... Read More...


NSF Awards $10 Million Grant to ICSI and Collaborators to Study Human Element of Cybercrime

September 26, 2012

The International Computer Science Institute (ICSI), along with the University of California, San Diego and George Mason University have received $10 million in a 5-year grant from the National ... Read More...


Johannes Gerke of Cornell University wins IEEE Award

June 12, 2012

Johannes Gerke, computer science professor at Cornell University, is one of 14 prominent technologists to be honored at the IEEE Computer Society's annual awards dinner in Seattle. Professor Gerke ... Read More...


How Al Qaeda Hid Secrets in a Video

May 3, 2012

A May 1, 2012 Discovery News article, "How Al Qaeda Hid Secrets In a Porn Video" discusses using steganography ... Read More...


Secretary Of Homeland Security Speaks At San Jose State

April 18, 2012

On April 16th, Professor and TRUST campus Principal Investigator at San Jose State University Sigurd Meldal participated in hosting a visit by Secretary of Homeland Security Janet Napolitano to ... Read More...


Web Firms to Adopt 'No Track' Button.

February 26, 2012

Support for a do-not-track button by a coalition of Internet giants, including Google, has emerged as part of the White House's call for Congress to pass a "privacy bill of rights" giving people more control ... Read More...


Internet is still vulnerable to cyber-criminals

January 21, 2012

A January 21, 2012 San Francisco Chronicle article "Internet is still vulnerable to cyber-criminals" by James Temple ... Read More...


Android apps and advertising: A bit too cozy

December 13, 2011

A Tech Republic blog entry "Android apps and advertising: A bit too cozy" features the research ... Read More...


Carrier IQ cell phone monitor software is a nightmare

December 5, 2011

TRUST Professor Stephen Wicker was quoted in a NetworkWorld article, "Cornell ... Read More...


White House Honors Cornell's Salman Avestimehr with PECASE

October 5, 2011

TRUST investigator and Cornell Professor Salman Avestimehr was named a recipient of the Presidential Early Career Award for Scientists ... Read More...


"The Science of Cyber Security"

August 9, 2011

US News and World Report's article, "The Science of Cyber Security" by Marlene ... Read More...


Erika Chin: "Seven ways to hang yourself with Google Android"

August 9, 2011

The research work of Erika Chin, an EECS graduate student studying smartphone security was featured in a Consumer Reports online magazine article titled ... Read More...


Stanford's Dan Boneh Receives Dean's Award for Industry Education Innovation

June 13, 2011

TRUST researcher and Stanford University Professor Dan Boneh was awarded the School of Engineering Dean's Award for Industry Education Innovation. ... Read More...


TRUST Researchers to Lead Intel Security Center

June 10, 2011

Intel Labs announced the creation of the Intel Science and Technology Center for Secure Computing (ISTCSC) to be led by UC Berkeley with partner institutions ... Read More...


Audio Captchas defeated

June 3, 2011

Stanford Professor John Mitchell, postdoctoral research Elie Bursztein and their colleagues have developed a way to defeat ... Read More...