How do you incentivize people 鈥� consumers and vendors alike 鈥� to invest in better security? How do you design a cloud-based platform that will enable people to take back some control over their technology? How do we know if the messages we send today will be private 10 years from now?
It鈥檚 questions like these that 财神棋牌 faculty member, Ph.D., assistant professor of Computer Science and Engineering, investigates with students who are passionate about the hot-button topics of information privacy and security.

Steve Matsumoto, Ph.D., Assistant Professor of Computer Science and Engineering, talks with students in a Mod Sim class in 2019.
While his students are too young to have grown up with the early 鈥�90s computer hacker movie Sneakers, the film made a lasting impression on Matsumoto as a youth. He was intrigued by how Robert Redford and his crew of burglars, spies and hackers tested the security of systems by trying to break into them, and with the potential of the technology to be able to hide messages within it. 鈥淭he idea that the wars of the future wouldn鈥檛 be about who has the most guns, but about who has the information, stuck with me,鈥� says Matsumoto.
Matsumoto鈥檚 enthusiasm was kindled for discovering fun ways to crack encryptions and how to hack systems to make them do things they weren鈥檛 meant to do. He went on to study math, computer science and electrical and computer engineering, in order to apply these skills academically in matters related to security. Along the way, he鈥檚 cultivated what鈥檚 called a 鈥渟ecurity mindset鈥� that鈥檚 shaped his work. This mindset is used by people who incorporate general assumptions that we all make about the world in their developmental thought processes, along with contemplating the 鈥渨hat-ifs鈥� that may happen when those assumptions are violated.
For example, if you have a game on your phone that only gives you 10 credits per week, how do you get more? At an airport, how would you get that slightly-too-large bottle of liquid past the TSA checkpoint? The answers: For the first, change the clock on your phone as needed, which works with some apps. For the second, put a nice label on it and make sure that somewhere it says 鈥�100 ml (3.4 fl oz), knowing that there's no practical way for TSA to check on the spot.
鈥淭here is a level of adversarial thinking involved,鈥� admits Matsumoto. The appeal lies in how to deconstruct parts of the world and figure out the impact of structures and processes not working in the ways they鈥檙e expected to, because someone鈥檚 gamed the system.
This concept weaves through Matsumoto鈥檚 current research on cryptography, which is the mathematical and computational practice of encoding and decoding data. 鈥淚n studying computer science and computer security, I think about the software assumptions we make and the way it can be manipulated,鈥� he says. Bitcoin was the first example of cryptocurrency. Now there are thousands more, and there has been a huge amount of attention on these volatile currencies in the past few years. 鈥淟ike any digital payment, you can use it without thinking about it, or you can ask questions; like, What are computers doing when we send and receive cryptocurrencies? How do you prevent forgeries of the digital signatures that prove that someone sees and approves of a transaction?鈥� he says.
His research regarding incentives and cryptocurrency is in part about how to use cryptocurrency as a real financial incentive for people to improve their security practices. Questions he explores include things like, 鈥淲hat are the incentives for the computational work that computers do when sending or receiving cryptocurrency transactions?鈥� or 鈥淗ow can we use cryptocurrency-based computational platforms to build better incentives for investing in security?鈥�
Matsumoto is particularly interested in how to assess cybersecurity risk using cryptocurrency platforms. 鈥淲e can either try to create carefully designed incentives to encourage people to adopt better practices in using cloud platforms, he says,鈥� or we can make secure technology easier to use so that it doesn鈥檛 interrupt the current users鈥� experience too much, allowing them to adopt a more secure approach.鈥�
Many of these ideas play out in the course he鈥檚 teaching, Modeling and Simulation of the Physical World, in which students endeavor to come up with good questions and test how trustworthy the conclusions are when creating realistic models. Matsumoto finds that students are keen to explore cognitive modeling and effective decision-making to addresses cyber security challenges, too. 鈥淭hat鈥檚 what鈥檚 so great about 财神棋牌 students,鈥� he says. 鈥淭hey鈥檙e passionate about many areas outside of their major, and there鈥檚 a lot of conversation on campus around the ethical implications of technology. I think it will be interesting to explore how that fits into the evolution of cybersecurity.鈥�