Lujo Bauer

Professor, Electrical and Computer Engineering Carnegie Mellon University

  • Pittsburgh PA

Lujo Bauer's research examines many aspects of computer security and privacy.

Contact

Carnegie Mellon University

View more experts managed by Carnegie Mellon University

Biography

Lujo Bauer is a Professor of Electrical and Computer Engineering, and of Computer Science, at Carnegie Mellon University. He received his B.S. in Computer Science from Yale University in 1997 and his Ph.D., also in Computer Science, from Princeton University in 2003. Dr. Bauer is a member of CyLab, Carnegie Mellon's computer security and privacy institute, and serves as the director of CyLab's Cyber Autonomy Research Center.

Dr. Bauer's research examines many aspects of computer security and privacy, including developing high-assurance access-control systems, building systems in which usability and security co-exist, and designing practical tools for identifying software vulnerabilities. Bauer and fellow CMU researchers Lujo Bau and Larry Pileggi are calling on the research and policy communities to develop more comprehensive and accurate grid evaluation frameworks and datasets, and for updating threat models and grid resiliency requirements to match cyber attackers realistic capabilities. His other recent work focuses on developing tools and guidance to help users stay safer online and on examining how advances in machine learning can (or might not) lead to a more secure future.

Dr. Bauer served as the program chair for the flagship computer security conferences of the IEEE (S&P 2015) and the Internet Society (NDSS 2014) and is an associate editor of ACM Transactions on Privacy and Security.

Areas of Expertise

IoT Security and Privacy
Network Security
Cybersecurity and Privacy
Internet of Things (IoT)
AI and ML for Security
System Security
Data/Network Science Systems
Cyberphysical Systems (CPS)

Media Appearances

CMU Experts at the Intersection of Energy and Innovation

CMU News  online

2025-07-11

From reimagining AI data centers to modernizing and securing the electric grid, CMU researchers are working on practical solutions to pressing challenges in how the U.S. produces, moves and secures energy.

Lujo Bauer, Larry Pileggi and Vyas Sekar are calling on the research and policy communities to develop more comprehensive and accurate grid evaluation frameworks and datasets, and for updating threat models and grid resiliency requirements to match cyber attackers realistic capabilities.

View More

Researchers develop adversarial training methods to improve machine learning-based malware detection software

CyLab  online

2023-09-13

"For some of the newest machine learning technologies, like generative AI, we don't fully understand how they can be attacked, so the first step is to figure out what the threat model looks like," said Lujo Bauer, professor in Carnegie Mellon’s Electrical and Computer Engineering

View More

Q&A with Lujo Bauer on how the pandemic is affecting individuals' privacy and security

Tech Xplore  online

2020-04-17

Many Americans have been working remotely for over a month now in response to the COVID-19 pandemic, which has resulted in new paradigms in their own and their employers' cybersecurity and privacy. CyLab's Lujo Bauer, a professor in the department of Electrical and Computer Engineering and the Institute for Software Research, has been monitoring the situation.

View More

Show All +

Social

Industry Expertise

Computer/Network Security
Education/Learning

Education

Princeton University

Ph.D.

Computer Science

2003

Yale University

B.S.

Computer Science

1997

Affiliations

  • CyLab
  • Societal Computing

Articles

“Did you know this camera tracks your mood?”: Understanding Privacy Expectations and Preferences in the Age of Video Analytics

Proceedings on Privacy Enhancing Technologies

2021

Cameras are everywhere, and are increasingly coupled with video analytics software that can identify our face, track our mood, recognize what we are doing, and more. We present the results of a 10-day in-situ study designed to understand how people feel about these capabilities, looking both at the extent to which they expect to encounter them as part of their everyday activities and at how comfortable they are with the presence of such technologies across a range of realistic scenarios. Results indicate that while some widespread deployments are expected by many (e.g., surveillance in public spaces), others are not, with some making people feel particularly uncomfortable. Our results further show that individuals’ privacy preferences and expectations are complicated and vary with a number of factors such as the purpose for which footage is captured and analyzed, the particular venue where it is captured, and whom it is shared with. Finally, we discuss the implications of people’s rich and diverse preferences on opt-in or opt-out rights for the collection and use (including sharing) of data associated with these video analytics scenarios as mandated by regulations. Because of the user burden associated with the large number of privacy decisions people could be faced with, we discuss how new types of privacy assistants could possibly be configured to help people manage these decisions.

View more

Prevalence of third-party tracking on abortion clinic web pages

JAMA Internal Medicine

2022

In this cross-sectional study, we extracted the uniform resource locator (URL) of each National Abortion Federation member facility on May 6, 2022. 5 We visited each unique URL using webXray (Timothy Libert), 4 which detects third-party tracking (eAppendix and eFigure in the Supplement). For each web page, we recorded data transfers to thirdparty domains. Transfers typically include a user’s IP (internet protocol) address and the web page being visited. We also recorded the presence of third-party cookies, data stored on a user’s computer that can facilitate tracking across multiple websites. In accordance with the Common Rule, this study was exempt from institutional review board review because it did not involve human participant research. We followed the STROBE reporting guideline.

Deceiving ML-Based Friend-or-Foe

Cyber Deception: Techniques, Strategies, and Human Aspects

2023

Deceiving an adversary who may, eg, attempt to reconnoiter a system before launching an attack, typically involves changing the system's behavior such that it deceives the attacker while still permitting the system to perform its intended function. For example, if a system hosting a database is using deception to defend against attack, it may employ measures that cause the attacker to believe that the system is running a different version of a database or that it is running other services. At the same time, legitimate clients of the system should continue to be able to interact with the database.

View more

Show All +