
Cybersecurity and Privacy at Khoury College of Computer Sciences
Making the digital world safer — and training the next generation of cybersecurity professionals and researchers
Today’s connected world brings digital risks at every level. Network threats target data from personal to global — everything from bank accounts and the world’s satellites are vulnerable. The Cybersecurity and Privacy research area at Khoury College brings together one of the largest and most interdisciplinary groups of faculty experts in the academic world. Faculty in this area are experts in a broad range of cybersecurity topics including cryptography, systems and network security, wireless security, AI security, hardware risks in chips, online privacy, and psychology of disinformation.
Khoury College’s research strength spans the range of cybersecurity and privacy domains, encompassing theoretical computer science, security of software, hardware, and networked systems, and is fueled by a collaborative focus on understanding how human behaviors and technology interact.


Designing secure systems for all
Research from Khoury College faculty and graduate students is making browsers safer, identifying risks in GPS systems, and finding out how to make the internet-connected gadgets that fill our lives safe from hackers who could hijack them or steal personal data.
Khoury cybersecurity and privacy research is also helping address social engineering and cognitive hacks, such as misinformation campaigns, scams, and frauds.
Research on trustworthy AI identified new vulnerabilities in generative AI systems and new privacy risks in Large Language Models (LLMs), helping make AI more secure.
Research on human-centered security and privacy is dedicated to making security and privacy easy and accessible for everyday users, increasing their agency and trust in digital systems.
Sample research areas
- Mobile system security
- Wireless and distributed systems
- Security and privacy of cloud computing
- Systems security
- Software security
- Online privacy, including on web, mobile, and Internet of Things (IoT)
- Network and distributed systems security, including blockchains
- Cryptography
- Trustworthy AI, including generative AI
- Cyber-physical security
- Algorithm auditing
- Human-centered security and privacy, including sociotechnical
equity and agency - Deceptive “dark pattern” user interfaces
- Trust and safety
Domains of interest
- Cybersecurity and privacy
- Information assurance
- Internet of Things (IoT) privacy and security
- Network and distributed systems security
- Sociotechnical equity and agency
- Secure systems

Khoury researchers: At the forefront
Faculty awards and achievements
2025 ACNS Test of Time Award | Philippe Golle, Jessica Staddon, Brent Waters |
2024 ACM SACMAT Test of Time Award | Ziming Zhao |
2024 AAAI ICWSM Honorable Mention Award | Desheng Hu, Jeffrey Gleason, Muhammad Abu Bakar Aziz, Nikolas Guggenberger, Ronald E. Robertson, Christo Wilson |
2024 CMU Cylab Distinguished Alumni Award | Alina Oprea |
2024 Caspar Bowden PET Award Runner-Up | Umar Iqbal, Pouneh Nikkhah Bahrami, Rahmadi Trimananda, Hao Cui, Alexander Gamero-Garrido, Daniel J. Dubois, David Choffnes, Athina Markopoulou, Franziska Roesner, Zubair Shafiq |
2024 HCOMP Best Paper Award | Tianshi Li |
2023 AAAI ICWSM Best Paper Award | Jeffrey Gleason, Desheng Hu, Ronald E. Robertson, Christo Wilson |
2023 Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies (runner-up) | Alina Oprea |
2023 International Communication Association (ICA) Outstanding Applied or Public Research Award | Alan Mislove, Christo Wilson, Karrie Karahalios, Christian Sandvig |
2023 Robert D. Klein University Lecturer at Northeastern University | Christo Wilson |
2023 Internet Measurement Conference Best Paper Award | Umar Iqbal, Pouneh Nikkhah Bahrami, Rahmadi Trimananda, Hao Cui, Alexander Gamero-Garrido, Daniel J. Dubois, David Choffnes, Athina Markopoulou, Franziska Roesner, Zubair Shafiq |
2023 Pervasive and Mobile Computing Best Research Papers 2019-2021 Award | Tianshi Li |
2023 PETS Best Student Paper Runner-Up | Amogh Pradeep, Álvaro Feal, Julien Gamba, Ashwin Rao, Martina Lindorfer, Narseo Vallina-Rodriguez, David Choffnes |
2022 CHI Best Paper Honorable Mention | Tianshi Li |
Current project highlights
One-of-a-kind lab to test smart devices and network security
People: David Choffnes
The Mon(IoT)r Lab at Northeastern University is a unique facility dedicated to understanding the security and privacy risks posed by internet-connected devices, or IoT. By replicating a typical home environment filled with smart gadgets, researchers can study how these devices behave in the real world. Unlike traditional computers, IoT devices often lack essential security features and are difficult to update, making them prime targets for hackers. The lab’s work is crucial for identifying vulnerabilities and developing strategies to protect our increasingly connected lives.
PrivacyLens: Evaluating Privacy Norm Awareness of Language Models in Action
People: Tianshi Li, Weiyan Shi
As language models are increasingly used in personalized communication and given more agency, ensuring they respect contextual privacy norms becomes critical. However, evaluating LMs’ privacy awareness is challenging due to the contextual nature of privacy cases and lack of realistic evaluation methods.
PrivacyLens is a data construction and multi-level evaluation framework to evaluate the privacy norm awareness of language models (LMs). Our experiment shows that GPT-4 agent leaks information that violates privacy norms in 25.68% of cases even without malicious attackers.

Recent research publications
A sampling of research papers from the last one to two years, primarily drawn from area conferences and intended to be illustrative; see individual faculty websites (in bios below) for robust publications lists.
SIMplicity or eSIMplification? Privacy and Security Risks in the eSIM Ecosystem
Authors: Maryam Motallebighomi, Jason Veara, Evangelos Bitsikas, Aanjhan Ranganathan
Conference: In Proceedings of 34th Conference: USENIX Security Symposium (USENIX Security 2025)
Promises, Promises: Understanding Claims Made in Social Robot Consumer Experiences
Authors: Johanna Gunawan, Sarah Elizabeth Gillespie, David Choffnes, Woodrow Hartzog, Christo Wilson
Conference: (proceedings of HI Conference on Human Factors in Computing Systems (CHI), 2025)
“Only as Strong as the Weakest Link”: On the Security of Brokered Single Sign-On on the Web
Authors: Tommaso Innocenti, Louis Jannett, Christian Mainka, Vladislav Mladenov, Engin Kirda
Conference: (proceedings of 2025 IEEE Symposium on Security and Privacy)
Riddle Me This! Stealthy Membership Inference for Retrieval-Augmented Generation
Authors: Ali Naseh, Yuefeng Peng, Anshuman Suri, Harsh Chaudhari, Alina Oprea, Amir Houmansadr
Conference: (proceedings of ACM CCS 2025)
Characterizing the Usability and Usefulness of U.S. Ad Transparency Systems
Authors: Kevin Bryson, Arthur Borem, Phoebe Moh, Omer Akgul, Laura Edelson, Tobias Lauinger, Michelle L. Mazurek, Damon McCoy, Blase Ur
Conference: (proceedings of 2025 IEEE Symposium on Security and Privacy)
Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups
Authors: Christof Ferreira Torres, Albin Mamuti, Ben Weintraub, Cristina Nita-Rotaru, Shweta Shinde
Conference: (proceedings of 2024 ACM SIGSAC)
Related labs and groups
Faculty members
-
David Choffnes
Associate Professor, Executive Director – Cybersecurity and Privacy Institute
David Choffnes is an associate professor at Khoury College and the executive director of the Cybersecurity and Privacy Institute. He works to improve the privacy, security, performance, and reliability of internet systems, and designs new models to measure these systems.
-
Christo Wilson
Professor, Associate Dean of Undergraduate Programs
Christo Wilson is an associate professor and associate dean of undergraduate programs at Khoury College. His research, which draws on computational, political, and economic methods, delves into the data, security, and privacy issues at the heart of our internet use.
-
Michael Ann DeVito
Assistant Professor
Michael Ann DeVito is an assistant professor at Khoury College, jointly appointed with the College of Arts, Media and Design. Her AI and machine learning research aims to address inequalities and unfairness toward marginalized populations through inclusive, equitable design.
-
Kevin Fu
Professor
Kevin Fu is a professor at Khoury College and the College of Engineering, and founder and director of the Archimedes Center for Health Care and Medical Device Cybersecurity. He strives to understand and improve the security of embedded systems and devices, particularly in health care.
-
Joshua Gancher
Assistant Professor
Joshua Gancher is an assistant professor at Khoury College. His research into cryptographic software and formal methods seeks to mathematically verify the security of foundational software, and to create tools to do that process at scale.
-
Zhengzhong Jin
Assistant Professor
Zhengzhong Jin is an assistant professor at Khoury College. He is interested in cryptography, teaching courses on the subject, and researching a proof system to delegate heavy computation to an untrusted server while ensuring the computation is correct.
-
Cristina Nita-Rotaru
Professor
Cristina Nita-Rotaru is a professor at Khoury College and a founding member of the Cybersecurity and Privacy Institute. In her research, she designs and builds secure, resilient distributed systems and network protocols.
-
Alina Oprea
Professor
Alina Oprea is a professor at Khoury College specializing in cloud security, applied cryptography, and security analytics. Over many years in industry and academia, she has researched and designed machine learning techniques to predict and protect against hacker behavior.
-
Cheng Tan
Assistant Professor
Cheng Tan is an assistant professor at Khoury College. His systems and security research focuses on building verifiable outsourced services and certified neural networks.
-
Ziming Zhao
Associate Professor
Ziming Zhao is an associate professor at Khoury College. His passion for hacking informs his research into systems and software security, network security, and web security, as well as his use of capture the flag (CTF) cybersecurity competitions as a teaching tool.