UC Berkeley

file

Visible to the public Can Competitive Insurers Improve Network Security?

The interdependent nature of security on the Internet causes a negative externality that results in under-investment in technology-based defences.  Previous research suggests that, in such an environment, cyber-insurers affect network security and user welfare.  We utilize a general setting, where the network is populated by identical users with arbitrary risk-aversion and network security is costly for the users.  In our model, a user's probability to incur damage (from being attacked) depends on both his security and the network security.

file

Visible to the public Scarcity of User Information and the Link Between Computer Security and Reliability

This paper studies manufacturer incentives to invest in the improvement of reliability and security of a software system when (i) reliability and security failures are caused by the same errors in the development of the software components and (ii) naive users find it too costly to distinguish between these two classes of system failures.We trace the effects of these informational imperfections and discuss how the resulting supply and demand externalities affect manufacturer investments.

file

Visible to the public Thoughts and Ideas from AI

file

Visible to the public Physical Modeling and Software Synthesis for Self-Reconfigurable Sensors in River Environments

This collaborative research project examines the role of software synthesis for monitoring and planning of autonomous sensors evolving on tidally forced rivers. The goal of the sensors is the coordinated sampling of currents and salinity to reconstruct the distributed state of the river. This project integrates the development of theory for the coordination of autonomous agents in motion-constrained environments, and of algorithms to perform motion planning tasks, with software tools for design, analysis, and code synthesis for implementation, as well as inverse modeling (i.e.