•  About
    • About the Lab
    • Director’s Note
    • Our Vision
    • Founding Donor
    • Advisory Board
    • Principal Investigators
  • People
    • Associated Faculty
    • Executive Committee
    • Students
    • Program Directorate
  • TrustNet
  •  Projects
  • î®˝ Resources
    • Pre-Doctoral Program
    • Internships
    • Early Career Award
    • Trust Lab Grant
    • Trust Lab Fellowship
  •  News
    • Trust Matters
    • Quick Updates
  •  Events
    • Talks
    • Trust Summit
    • TL CTF
    • Schools
    • All Events
  • îźľ Engage
  •  About
    • About the Lab
    • Director’s Note
    • Our Vision
    • Founding Donor
    • Advisory Board
    • Principal Investigators
  • People
    • Associated Faculty
    • Executive Committee
    • Students
    • Program Directorate
  • TrustNet
  •  Projects
  • î®˝ Resources
    • Pre-Doctoral Program
    • Internships
    • Early Career Award
    • Trust Lab Grant
    • Trust Lab Fellowship
  •  News
    • Trust Matters
    • Quick Updates
  •  Events
    • Talks
    • Trust Summit
    • TL CTF
    • Schools
    • All Events
  • îźľ Engage

Projects

Latency Sensitive Blockchain Networks:Incentives and Attacks
Knock Knock! Who? Crypto Folks Securing Secure Randomized Caches
Innovative Learning Material and Evaluation Platform Development for Trustworthy AI
Data trustworthiness and the emerging data extraction landscape with AdTech and Real Time Bidding: Evolving a policy response for India
Don’t Block My Light: Internet Censorship and Collateral Damage
Are CPUs and GPUs Secure in the CPUs+GPUs based Modern Heterogeneous Systems?
Friend or Foe: Belady Pursuers and Randomized Secure Last-level Caches
Container Honeypots: Collecting Threat Intelligence to Testing Software Vulnerabilities
Security Structure of Quantum Networks: Quantum-safe and Quantum-resistant Regions
Software Design for a Rich, Robust and Configurable Access Control in Complex Multi-User Networked Application
Adversarial Machine Learning under Perturbation of a Subset of Training Instances
Data Brokering Practices and Data Trustworthiness: A Policy Evaluation
Efficient Automated Synthesis of Heart Pacemaker from Logical Specifications
Game Theoretic Studies of Trust for Multiagent Systems
Trust and Public AI: A Policy Analysis
Vajra: Endpoints security solution
Physical Unclonable Functions for Smart Applications
Explaining Decision Making in (Semi) Autonomous Vehicles
Certified Information Flow Security
Game theoretic viewpoint of communication in the presence of an adversary
Information in Socio-Technical Systems
End Point Detection and Response for Linux Systems
Configurable Access Control Policy Implementation for Complex Online Applications
Differential Privacy
Twitter Facebook-f Linkedin Youtube
  • trustlabcse.iitb.ac.in
  • +91-22-2159-6725
  • First Floor, New CSE Building
    Department of Computer Science and Engineering,
    Indian Institute of Technology Bombay,
    Powai, Mumbai 400076
IITB logo