Kiron Lebeck

Learn More
The increasing popularity of wearable devices that continuously capture video, and the prevalence of third-party applications that utilize these feeds have resulted in a new threat to privacy. In many situations, sensitive objects/regions are maliciously (or accidentally) captured in a video frame by third-party applications. However, current solutions do(More)
This paper presents Kahawai<sup>1</sup>, a system that provides high-quality gaming on mobile devices, such as tablets and smartphones, by offloading a portion of the GPU computation to server-side infrastructure. In contrast with previous thin-client approaches that require a server-side GPU to render the entire content, Kahawai uses collaborative(More)
Users are increasingly vulnerable to inadvertently leaking sensitive information through cameras. In this paper, we investigate an approach to mitigating the risk of such inadvertent leaks called privacy markers. <i>Privacy markers</i> give users fine-grained control of what visual information an app can access through a device's camera. We present two(More)
Augmented reality (AR) technologies, such as those in head-mounted displays like Microsoft HoloLens or in automotive windshields, are poised to change how people interact with their devices and the physical world. Though researchers have begun considering the security, privacy, and safety issues raised by these technologies, to date such efforts have(More)
Augmented reality (AR) technologies, such as Microsoft's HoloLens head-mounted display and AR-enabled car windshields, are rapidly emerging. AR applications provide users with immersive virtual experiences by capturing input from a user's surroundings and overlaying virtual output on the user's perception of the real world. These applications enable users(More)
The proliferation of camera-equipped computers creates a dilemma. On one hand, cameras enable many useful applications, including video chat, document scanning, and QR-code reading. At the same time, sensitive information in the physical environment can inadvertently leak through image data shared with applications. Preventing leaks by a determined attacker(More)
Throughout the developing world, countless people live without access to basic financial services, and physical banking infrastructure is often inaccessible. These constraints have led to the rise of mobile money, or branchless banking, systems that offer financial services to people who may not have access to conventional banks. Despite their utility,(More)
  • 1