Center for Security and Emerging Technology (CSET)
Cyber AI Research Fellow
Washington, DC
  • Member of the CyberAI Project at CSET examining challenges related to the secure use of artificial intelligence systems and the implications of artificial intelligence on cybersecurity operations.
CyLab Usable Privacy and Security Laboratory
Ph.D. Researcher
Pittsburgh, PA
  • Dissertation research focused on the application of machine learning to large-scale network traffic to evaluate potential privacy harms and security benefits that stem from tracking users’ behavior online.
    • Developed a generalizable long short-term memory model that accurately identifies when users will visit a malicious web page based on their preceding browsing behavior.
    • Applied neural networks, graph neural networks, and large language models to network traffic from a million users to evaluate the efficacy of behavioral tracking and its impact on online anonymity.
    • Identified and empirically demonstrated a novel vulnerability in a major data aggregator that leaked sensitive user browsing information through advertising profiles provided to customers.
    • Assessed how home computer users navigate and spend their time online using a large-scale behavioral dataset collected through a multi-year longitudinal measurement panel of participants.
  • Other non-dissertation research work and experience include:
    • Ran a large-scale interview study to examine the effect of online interview mode on collected data.
    • Conducted two survey studies on user perceptions of authentication methods and personalized ads.
Secure and Trustworthy Cyberspace Research Group
Master's Researcher
Syracuse, NY
  • Member of an interdisciplinary research team on a National Science Foundation funded project.
  • Constructed a framework in java to simulate the effect of cyber-attacks on distributed electricity markets.
  • Devised a method to transform terabyte-sized electricity consumption data for use in the model.
  • Interpreted simulation results and analyzed market vulnerabilities to inform security recommendations.
Maxwell School of Citizenship and Public Affairs
Graduate Assistant
Syracuse, NY
  • Conceived of a project to evaluate the effect of initiatives undertaken by top public policy schools through the measurement of observable changes in web and social media visibility.
  • Developed data mining scripts to capture web traffic metrics and applied time series analysis to assess impact.
  • Proposed recommendations to 8 members of the school’s leadership based on findings.
Eccella Corporation
Senior Consultant
New York, NY
  • Designed and developed technical enterprise-level systems in the field of data management and data science.
  • Developed systems to integrate data from many sources (databases, flat files, unstructured data, big data lakes), applied statistical and machine learning techniques for analysis, and designed reporting mechanisms.
  • Directed two $1M contracts as the project lead at Vestcom International and Michigan State University.
  • Managed the technical interview process, helping the firm grow from 10 employees to over 90 in 4 years.
Clean Stick Mats LLC
New York, NY
  • Founded the company and developed the underlying web platform for cleanroom product sales in 2013.

Kyle Crichton, Nicolas Christin, and Lorrie Faith Cranor. How Do Home Computer Users Browse the Web? ACM Trans. Web 16, 1, Article 3 (February 2022).
Akira Yamada, Kyle Crichton, Yukiko Sawaya, Jin-Dong Dong, Sarah Pearman, Ayumu Kubota, and Nicolas Christin. On Recruiting and Retaining Users for Security Sensitive Longitudinal Measurement Panels. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), pages 347–366, Boston, MA, August 2022. USENIX Association. View Here
Maggie Oates, Kyle Crichton, Lorrie Cranor, Storm Budwig, Erica J. L. Weston, Brigette M. Bernagozzi, and Julie Pagaduan. Audio, video, chat, email, or survey: How much does online interview mode matter? 2022. PLoS ONE 17(2): e0263876.
Akira Yamada, Yukiko Sawaya Shoma Tanaka, Ayumu Kubota, Nicolas Christin, Kyle Crichton, Jin-Dong Dong, Shun Umemoto, Jun Nakajima, So Matsuda, Reo Matsumura. Security Behavior Observation for Smartphone: Longterm Monitoring of Smartphones Comparing Desktop Computers. Extended Abstract. Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). USENIX Association, USA. View Here
Kyle Crichton, Jason Lee, and Meihan Li. Incentives for Enabling Two-Factor Authentication in Online Gaming. Extended Abstract. Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, USA. View Here
In Submission
Kyle Crichton, Nicolas Christin, and Lorrie Faith Cranor. Rethinking Fingerprinting: An Assessment of Behavior-based Methods at Scale and Implications for Browser Fingerprinting. 2023. In Submission.
Kyle Crichton, John Krumm, and Siddharth Suri. Inferring Sensitive Browsing Information from Online Advertising Profiles. 2023. In Submission.
Kyle Crichton, Jin-Dong Dong, Akira Yamada, Yukiko Sawaya, Lorrie Cranor, and Nicolas Christin. Accurate, Generalizable, and Practical Behavioral Models to Identify Impending User Exposure to Malicious Websites. 2023. In Submission.

Carnegie Mellon University
College of Engineering
Ph.D. in Engineering and Public Policy
Robert W. Dunlap Award recipient for best Part B Ph.D. qualifying examination. 2019 Carnegie Bosch Institute Fellowship recipient. First place 2020 VentureWell Virtual Energy Hackathon. Primary research on privacy and security implications of tracking users’ behavior online. GPA: 3.9
Syracuse University
Maxwell School of Citizenship and Public Affairs
Master of Public Administration
Concentration in national security focusing on cybersecurity policy and law. Independent study in data analytics for public policy. GPA: 4.0
College of Engineering and Computer Science
Master of Science in Cybersecurity
Rumsfeld Graduate Fellowship Receipient. Advanced courses in computer and internet security, algorithms, and formal methods. GPA: 4.0
Harvard University
College of Arts and Sciences
A.B. in Government
Major in Government with a focus on international relations and national security policy. Completed a minor in Computer Science. GPA: 3.5

  • Python
  • R
  • Javascript
  • SQL
  • Java
  • Artificial Intelligence
  • Machine Learning
  • Cybersecurity
  • Privacy
  • Data Science
Management and Analysis
  • Statistics
  • Policy Analysis
  • Economic Analysis
  • Agile Methodology
  • Project Management