Evaluating Privacy Policies under Modern Privacy Laws At Scale: An LLM-Based Automated Approach
Website privacy policies detail an online service’s information practices, including how they handle user data and rights. For many sites, these disclosures are now necessitated by a growing set of privacy regulations, such as GDPR…
Paraphrase Project
The Paraphrase Project addresses a critical and emerging risk: as generative AI and synthetic biology advance, there is a growing possibility that open-source AI tools could be misused to design biological toxins that evade current…
Detecting Compromise of Passkey Storage on the Cloud
FIDO synced passkeys address account recovery challenges by enabling users to back up their FIDO2 private signing keys to the cloud storage of passkey management services (PMS). However, it introduces a serious security risk —…
Encrypted Access Logging for Online Accounts: Device Attributions without Device Tracking
Despite improvements in authentication mechanisms, compromise of online accounts remains prevalent. Therefore, technologies to detect compromise retroactively are also necessary. Service providers try to help users diagnose the security status of their accounts via account…
Microsoft Research India – The lab culture
Watch the founder, former and current leaders, and researchers at the Microsoft Research India lab talk about its unique culture. They reflect on their journeys, growth, and what makes the lab such a great place…