- About
- Events
- Calendar
- Graduation Information
- Cornell Learning Machines Seminar
- Student Colloquium
- BOOM
- Fall 2024 Colloquium
- Conway-Walker Lecture Series
- Salton 2024 Lecture Series
- Seminars / Lectures
- Big Red Hacks
- Cornell University - High School Programming Contests 2024
- Game Design Initiative
- CSMore: The Rising Sophomore Summer Program in Computer Science
- Explore CS Research
- ACSU Research Night
- Cornell Junior Theorists' Workshop 2024
- People
- Courses
- Research
- Undergraduate
- M Eng
- MS
- PhD
- Admissions
- Current Students
- Computer Science Graduate Office Hours
- Advising Guide for Research Students
- Business Card Policy
- Cornell Tech
- Curricular Practical Training
- A & B Exam Scheduling Guidelines
- Fellowship Opportunities
- Field of Computer Science Ph.D. Student Handbook
- Graduate TA Handbook
- Field A Exam Summary Form
- Graduate School Forms
- Instructor / TA Application
- Ph.D. Requirements
- Ph.D. Student Financial Support
- Special Committee Selection
- Travel Funding Opportunities
- Travel Reimbursement Guide
- The Outside Minor Requirement
- Diversity and Inclusion
- Graduation Information
- CS Graduate Minor
- Outreach Opportunities
- Parental Accommodation Policy
- Special Masters
- Student Spotlights
- Contact PhD Office
"The nation's security and economy rely on infrastructures for communication, finance, energy distribution and transportation - all increasingly dependent on networked information systems. When these networked information systems perform badly or do not work at all, they put life, liberty and property at risk." —National Research Council, Trust in Cyberspace (F.B. Schneider, editor)
Cornell has one of the largest and most visible groups of security researchers found anywhere, tackling the fundamental problems of security and privacy in modern computing systems. Cornell has been a leader in computer security for decades, making widely recognized contributions that range from theoretical foundations to practical implementations to influence on government policy.
Cornell researchers are exploring the full space of security and privacy topics and working at at every level of the computing stack, with research on operating system and distributed system security, cryptography, language-based security, hardware-based security, network security, and security and privacy policies. We have a strong presence both in research that develops new methods for building secure computing systems and in research that identifies new kinds of security and privacy vulnerabilities. Security is a cross-cutting concern, and our work draws on the synergy with groups working on programming languages, operating systems, and logic and formal methods.