{"id":398567,"date":"2017-07-10T21:57:58","date_gmt":"2017-07-11T04:57:58","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-group&#038;p=398567"},"modified":"2026-03-10T10:01:22","modified_gmt":"2026-03-10T17:01:22","slug":"security","status":"publish","type":"msr-group","link":"https:\/\/www.microsoft.com\/en-us\/research\/group\/security\/","title":{"rendered":"MSR Redmond Security Research Group"},"content":{"rendered":"<section class=\"mb-3 moray-highlight\">\n\t<div class=\"card-img-overlay mx-lg-0\">\n\t\t<div class=\"card-background  has-background-grey card-background--full-bleed\">\n\t\t\t\t\t<\/div>\n\t\t<!-- Foreground -->\n\t\t<div class=\"card-foreground d-flex mt-md-n5 my-lg-5 px-g px-lg-0\">\n\t\t\t<!-- Container -->\n\t\t\t<div class=\"container d-flex mt-md-n5 my-lg-5 align-self-center\">\n\t\t\t\t<!-- Card wrapper -->\n\t\t\t\t<div class=\"w-100 w-lg-col-5\">\n\t\t\t\t\t<!-- Card -->\n\t\t\t\t\t<div class=\"card material-md-card py-5 px-md-5\">\n\t\t\t\t\t\t<div class=\"card-body \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/lab\/microsoft-research-redmond\/\" class=\"icon-link icon-link--reverse mb-2\" data-bi-cN=\"Return to Microsoft Research Lab - Redmond\">\n\t\t\t\t\t\t\t\t\t<span class=\"c-glyph glyph-chevron-left\" aria-hidden=\"true\"><\/span>\n\t\t\t\t\t\t\t\t\tReturn to Microsoft Research Lab &#8211; Redmond\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\n<h1 class=\"wp-block-heading h2\" id=\"security-research-group\">Security Research Group<\/h1>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n\n\n\n<p>MSR Redmond Security Research Group is devoted to both advancing the state of the art in security research and developing innovative solutions to safeguard real-world systems, services and sensitive data.<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>We are interested in all perspectives of security and privacy.\u00a0Our current projects focus on trusted cloud, software security, and systems security.<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_group_start":"","footnotes":""},"research-area":[13558],"msr-group-type":[243694],"msr-locale":[268875],"msr-impact-theme":[],"class_list":["post-398567","msr-group","type-msr-group","status-publish","hentry","msr-research-area-security-privacy-cryptography","msr-group-type-group","msr-locale-en_us"],"msr_group_start":"","msr_detailed_description":"","msr_further_details":"","msr_hero_images":[],"msr_research_lab":[199565],"related-researchers":[{"type":"user_nicename","display_name":"Jay Bosamiya","user_id":43413,"people_section":"Current Members","alias":"jayb"},{"type":"user_nicename","display_name":"Weiteng Chen","user_id":42519,"people_section":"Current Members","alias":"weitengchen"},{"type":"user_nicename","display_name":"Landon Cox","user_id":37527,"people_section":"Current Members","alias":"lacox"},{"type":"user_nicename","display_name":"Weidong Cui","user_id":34789,"people_section":"Current Members","alias":"wdcui"},{"type":"user_nicename","display_name":"Sai Deng","user_id":44127,"people_section":"Current Members","alias":"saideng"},{"type":"user_nicename","display_name":"Sangho Lee","user_id":37905,"people_section":"Current Members","alias":"sanghle"},{"type":"user_nicename","display_name":"Marcus Peinado","user_id":32804,"people_section":"Current Members","alias":"marcuspe"},{"type":"user_nicename","display_name":"Sathvik Prasad","user_id":43889,"people_section":"Current Members","alias":"satprasad"},{"type":"user_nicename","display_name":"Srinath Setty","user_id":33709,"people_section":"Current Members","alias":"srinath"},{"type":"user_nicename","display_name":"Ioanna Tzialla","user_id":44125,"people_section":"Current Members","alias":"itzialla"},{"type":"user_nicename","display_name":"Ziqiao Zhou","user_id":40390,"people_section":"Current Members","alias":"ziqiaozhou"}],"related-publications":[424992,422070,419436,955560,1148309,1137315,1054806,1054785,1054779,1054770,1034787,955569,502166,955545,882912,771232,739885,698971,698668,676938,665673,664413,508247],"related-downloads":[],"related-videos":[662193],"related-projects":[476181],"related-events":[],"related-opportunities":[1150955,1160829,1161145],"related-posts":[957600,1138612],"tab-content":[],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-group\/398567","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-group"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-group"}],"version-history":[{"count":10,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-group\/398567\/revisions"}],"predecessor-version":[{"id":1054953,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-group\/398567\/revisions\/1054953"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=398567"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=398567"},{"taxonomy":"msr-group-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-group-type?post=398567"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=398567"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=398567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}