SaTC: CORE: Small: Cybersecurity Big Data Research for Hacker Communities: A Topic and Language Modeling Approach |
Hsinchun Chen |
It is estimated that cybercrime costs the global economy around $445 billion annually, particularly due to intellectual property theft and financial fraud using stolen consumer data. Incidents of large-scale hacking and data theft occur regularly, with... |
Small, Division of Computer and Network Systems (CNS), CORE |
Jul 6 2020 - 4:07pm |
SaTC: CORE: Medium: Securing the Voice Processing Pipeline Against Adversarial Audio |
Patrick Traynor |
In a world in which many new computing devices have limited or no traditional user interface (e.g., smart thermostats, personal digital assistants including Amazon's Alexa, etc), voice interfaces are becoming a primary means of interaction. Such systems... |
Medium, Division of Computer and Network Systems (CNS), CORE |
Jul 6 2020 - 3:55pm |
SaTC: TTP: Medium: Collaborative: Exposing and Mitigating Security/Safety Concerns of CAVs: A Holistic and Realistic Security Testing Platform for Emerging CAVs |
Zhuoqing Mao |
Connected and Automated Vehicle (CAV) technologies enable real-time information sharing and driving automation, with the potential of significantly improving safety and efficiency of the transportation system. However, cyber-security threats may... |
Medium, Collaborative, Division of Computer and Network Systems (CNS), TTP |
Jul 6 2020 - 12:18pm |
SaTC: TTP: Medium: Collaborative: Exposing and Mitigating Security/Safety Concerns of CAVs: A Holistic and Realistic Security Testing Platform for Emerging CAVs |
Qi Chen |
Connected and Automated Vehicle (CAV) technologies enable real-time information sharing and driving automation, with the potential of significantly improving safety and efficiency of the transportation system. However, cyber-security threats may... |
Medium, Collaborative, Division of Computer and Network Systems (CNS), TTP |
Jul 6 2020 - 12:14pm |
SaTC: TTP: Medium: Collaborative: Deployment-quality and Accessible Solutions for Cryptography Code Development |
Barton Miller |
Vulnerabilities in cryptographic implementations seriously reduce the security guarantees of algorithms in practice and lead to attacks. An effective fix to the vulnerable code problem is automatic code checking. However, existing code verification tools... |
Medium, Collaborative, Division of Computer and Network Systems (CNS), TTP |
Jul 6 2020 - 12:12pm |
SaTC: TTP: Medium: Collaborative: Deployment-quality and Accessible Solutions for Cryptography Code Development |
Danfeng Yao |
Vulnerabilities in cryptographic implementations seriously reduce the security guarantees of algorithms in practice and lead to attacks. An effective fix to the vulnerable code problem is automatic code checking. However, existing code verification tools... |
Medium, Collaborative, Division of Computer and Network Systems (CNS), TTP |
Jul 6 2020 - 11:59am |
SaTC: CORE: Medium: Collaborative: New Directions in Public-Key and Identity-Based Encryption |
Sanjam Garg |
Developments in public-key encryption (PKE) and identity-based encryption (IBE) have revolutionized the field of cryptography and secure communication in general. PKE allowed remote parties to establish secure channels in front of eavesdropping... |
Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE |
Aug 27 2019 - 11:47am |
SaTC: CORE: Medium: Collaborative: New Directions in Public-Key and Identity-Based Encryption |
Mohammad Mahmoody |
Developments in public-key encryption (PKE) and identity-based encryption (IBE) have revolutionized the field of cryptography and secure communication in general. PKE allowed remote parties to establish secure channels in front of eavesdropping... |
Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE |
Aug 27 2019 - 11:16am |
SaTC: CORE: Medium: Collaborative: RADAR: Real-time Advanced Detection and Attack Reconstruction |
Ramasubramanian Sekar |
There has been a rapid escalation of targeted cyber-attacks, called Advanced Persistent Threats (APTs), on high-profile enterprises. These skilled attacks routinely bypass widely deployed protection mechanisms. Existing second-line cyber defenses (e.g.,... |
Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE |
Aug 26 2019 - 3:54pm |
SaTC: CORE: Medium: Collaborative: RADAR: Real-time Advanced Detection and Attack Reconstruction |
V. Venkatakrishnan |
There has been a rapid escalation of targeted cyber-attacks, called Advanced Persistent Threats (APTs), on high-profile enterprises. These skilled attacks routinely bypass widely deployed protection mechanisms. Existing second-line cyber defenses (e.g.,... |
Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE |
Aug 26 2019 - 3:47pm |
CAREER: Enhancing Mobile Authentication by Measuring the Authentication Life-Cycle |
Adam Aviv |
This CAREER research focuses on human factors in authentication using mobile devices. Mobile authentication is a crucial component of authentication, especially as mobile devices become ever more connected to the broader security ecosystem. A major... |
CAREER, Division of Computer and Network Systems (CNS) |
Aug 26 2019 - 2:58pm |
CAREER: Securing Cyberspace: Gaining Deep Insights into the Online Underground Ecosystem |
Yanfang Ye |
As the Internet becomes increasingly ubiquitous, it offers a low-risk harbor for cybercrime -- illegal activities such as hacking and online scams. Cybercrime is increasingly enabled by an online underground ecosystem, within which are anonymous forums... |
CAREER, Division of Computer and Network Systems (CNS) |
Aug 13 2019 - 1:12pm |
SaTc: EDU: Collaborative: An Assessment Driven Approach to Self-Directed Learning in Secure Programming (SecTutor) |
Matt Bishop |
The field of software development needs developers to write secure code, as well as to continuously respond to evolving threats and adapt system designs to meet new security needs. This requires developers to gain a deep understanding of foundational... |
Collaborative, Division of Graduate Education (DGE), EDU |
Aug 13 2019 - 12:16pm |
SaTC: CORE: Medium: Collaborative: Toward Enforceable Data Usage Control in Cloud-based IoT Systems |
Ning Zhang |
In the upcoming evolution of the Internet of Things (IoT), it is anticipated that billions of devices will be connected to the Internet. While IoT promises a more connected and smarter world, this pervasive large-scale data collection, storage, sharing,... |
Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE |
Aug 7 2019 - 4:16pm |
SaTC: CORE: Medium: Collaborative: Toward Enforceable Data Usage Control in Cloud-based IoT Systems |
Wenjing Lou |
In the upcoming evolution of the Internet of Things (IoT), it is anticipated that billions of devices will be connected to the Internet. While IoT promises a more connected and smarter world, this pervasive large-scale data collection, storage, sharing,... |
Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE |
Aug 7 2019 - 4:13pm |
SaTC: CORE: Medium: Collaborative: Doctor WHO: Investigation and Prevention of Online Content Management System Abuse |
Brendan Saltaformaggio |
Over half of the world's 1.8 billion websites run on Content Management Systems (CMS). Unfortunately, CMS deployments make easy targets for attackers, as they are built from an amalgam of layered software and interpreters, with varying degrees of network... |
Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE |
Aug 7 2019 - 4:03pm |
SaTC: CORE: Medium: Collaborative: Doctor WHO: Investigation and Prevention of Online Content Management System Abuse |
Jyu Hyung Lee |
Over half of the world's 1.8 billion websites run on Content Management Systems (CMS). Unfortunately, CMS deployments make easy targets for attackers, as they are built from an amalgam of layered software and interpreters, with varying degrees of network... |
Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE |
Aug 7 2019 - 4:00pm |
SaTC: CORE: Medium: Collaborative: Doctor WHO: Investigation and Prevention of Online Content Management System Abuse |
Yonghwi Kwon |
Over half of the world's 1.8 billion websites run on Content Management Systems (CMS). Unfortunately, CMS deployments make easy targets for attackers, as they are built from an amalgam of layered software and interpreters, with varying degrees of network... |
Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE |
Aug 7 2019 - 3:53pm |
SaTC: CORE: Medium: Collaborative: Taming Memory Corruption with Security Monitors |
William Robertson |
Modern computing systems are under constant attack by organized crime syndicates, nation-state adversaries, and regular cyber-criminals alike. Among the most damaging attacks are those that exploit so-called memory corruption vulnerabilities which often... |
Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE |
Aug 7 2019 - 3:50pm |
SaTC: CORE: Medium: Collaborative: Taming Memory Corruption with Security Monitors |
Manuel Egele |
Modern computing systems are under constant attack by organized crime syndicates, nation-state adversaries, and regular cyber-criminals alike. Among the most damaging attacks are those that exploit so-called memory corruption vulnerabilities which often... |
Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE |
Aug 7 2019 - 1:59pm |