Microsoft Research India – The lab culture
Watch the founder, former and current leaders, and researchers at the Microsoft Research India lab talk about its unique culture. They reflect on their journeys, growth, and what makes the lab such a great place…
Microsoft Research India – The evolution
Learn about Microsoft Research India’s journey from its inception to becoming a leading research center in computer science in India.
Understanding How Users Prepare for and React to Smartphone Theft
Smartphone theft is common, yet little research explores how users prepare for or respond to such incidents. To address this gap in the literature, we conducted 20 semi-structured interviews with victims who had experienced smartphone…
When LLMs Go Online: The Emerging Threat of Web-Enabled LLMs
Recent advancements in Large Language Models (LLMs) have established them as agentic systems capable of planning and interacting with various tools. These LLM agents are often paired with web-based tools, enabling access to diverse sources…
A Formal Analysis of Apple’s iMessage PQ3 Protocol
We present the formal verification of Apple’s iMessage PQ3, a highly performant, device-to-device messaging protocol offering strong security guarantees even against an adversary with quantum computing capabilities. PQ3 leverages Apple’s identity services together with a…
Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability
Email spoofing is a critical technique used in phishing attacks to impersonate a trusted sender. SMTP smuggling is a new vulnerability that allows adversaries to perform email spoofing while bypassing existing authentication protocols such as…
A Framework for Abusability Analysis: The Case of Passkeys in Interpersonal Threat Models
The recent rollout of passkeys by hundreds of web services online is the largest attempt yet to achieve the goal of passwordless authentication. However, new authentication mechanisms can often overlook the unique threats faced by…