The Security Privacy &
Democracy Research Laboratory

About

We are an interdisciplinary research laboratory housed in Georgia Tech's College of Computing. Our mission is solve problems in cryptography, systems security, and public policy to improve the future of democracy.

Team

  1. Photo of Dr. Specter

    Michael A. Specter

    Professor & Lab Director

  2. Photo of Grace Abuhamad

    Grace Abuhamad

    Senior Research Scientist

  3. Photo of Harry Oppenheimer

    Harry Oppenheimer

    Cool Guy

  • Photo of Delaney Gomen

    Delaney Gomen

    PhD Student

  • Photo of George Hosono

    George Ari Hosono

    PhD Student

  • Photo of Shreyas Minocha

    Shreyas Minocha

    PhD Student

Publications

  1. Fingerprinting SDKs for Mobile Apps and Where to Find Them: Understanding the Market for Device Fingerprinting
    1. Michael A. Specter
    2. Mihai Christodorescu
    3. Abbie Farr
    4. Bo Ma
    5. Robin Lassonde

    [online]

  2. Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries
    1. Jenny Blessing
    2. Michael A. Specter
    3. Daniel J. Weitzner

  3. Robust, Privacy-Preserving, Transparent, and Auditable On-Device Blocklisting
    1. Kurt Thomas
    2. Sarah Meiklejohn
    3. Michael A. Specter
    4. Xiang Wang
    5. Xavier Llorà
    6. Stephan Somogyi
    7. David Kleidermacher

    [online]

  4. A systematization of voter registration security
    1. Jack Cable
    2. Andrés Fábrega
    3. Sunoo Park
    4. Michael A. Specter

    [online] | 10.1093/cybsec/tyad008

  5. The Android Platform Security Model (2023)
    1. René Mayrhofer
    2. Jeffrey Vander Stoep
    3. Chad Brubaker
    4. Dianne Hackborn
    5. Bram Bonné
    6. Güliz Seray Tuncay
    7. Roger Piqueras Jover
    8. Michael A. Specter

    [online]

  6. Going from bad to worse: from Internet voting to blockchain voting
    1. Sunoo Park
    2. Michael A. Specter
    3. Neha Narula
    4. Ronald L Rivest

    [online] | 10.1093/cybsec/tyaa025

  7. KeyForge: Mitigating Email Breaches with Forward- Forgeable Signatures
    1. Michael A. Specter
    2. Sunoo Park
    3. Matthew Green

    [online]

  8. Security Analysis of the Democracy Live Online Voting System
    1. Michael A. Specter
    2. J. Alex Halderman

  9. The PACT Protocol Specification
    1. Ronald L. Rivest
    2. Jon Callas
    3. Ran Canetti
    4. Kevin Esvelt
    5. Daniel Kahn Gillmor
    6. Yael Tauman Kalai
    7. Anna Lysyanskaya
    8. Adam Norige
    9. Ramesh Raskar
    10. Adi Shamir
    11. Israel Shen
    12. Michael A. Specter
    13. Vanessa Teague
    14. Ari Trachtenberg
    15. Mayank Varia
    16. Marc Viera
    17. Daniel Weitzner
    18. John Wilkinson
    19. Marc Zissman

  10. The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in US Federal Elections
    1. Michael A. Specter
    2. James Koppel
    3. Daniel Weitnzer

    [online]

  11. Explaining Explanations: An Overview of Interpretability of Machine Learning
    1. Leilani H. Gilpin
    2. David Bau
    3. Ben Z. Yuan
    4. Ayesha Bajwa
    5. Michael A. Specter
    6. Lalana Kagal

  12. The Economics of Cryptographic Trust: Understanding Certificate Authorities
    1. Michael A. Specter

  13. Keys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications
    1. Harold Abelson
    2. Ross Anderson
    3. Steven M. Bellovin
    4. Josh Benaloh
    5. Matt Blaze
    6. Whitfield Diffie
    7. John Gilmore
    8. Matthew Green
    9. Susan Landau
    10. Peter G. Neumann
    11. Ronald L. Rivest
    12. Jeffrey I Schiller
    13. Bruce Schneier
    14. Michael A. Specter
    15. Daniel J. Weitzner

  14. Security Analysis of Wearable Fitness Devices (Fitbit)
    1. Britt Cyr
    2. Webb Horn
    3. Daniela Miao
    4. Michael A. Specter