Search SaTC Projects

Project Title Lead PI Project Abstract Keywords Last Updatedsort icon
SaTC: CORE: Medium: Collaborative: Understanding and Discovering Illicit Online Business Through Automatic Analysis of Online Text Traces XiaoFeng Wang Unlawful online business often leaves behind human-readable text traces for interacting with its targets (e.g., defrauding victims, advertising illicit products to intended customers) or coordinating among the criminals involved. Such text content is... Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE Jul 23 2020 - 12:15pm
SaTC: CORE: Small: Trustworthy System-On-Chip Design using Secure On-Chip Communication Architecture Prabhat Mishra System-on-Chip (SoC) is the driving force behind computing and communication in a wide variety of electronic systems, ranging from simple devices in smart homes to complex systems in satellites. Network-on-Chip (NoC) is a commonly used solution for on-... Small, Division of Computer and Network Systems (CNS), CORE Jul 7 2020 - 12:04pm
SaTC: CORE: Small: Modular, Efficient, Homomorphic Cryptography Daniele Micciancio Modern computer applications require not only to protect data using encryption, but also to perform computations on data in encrypted form, e.g., in a cloud computing setting where private data is stored and processed on a remote, untrusted server.... Small, Division of Computer and Network Systems (CNS), CORE Jul 6 2020 - 4:11pm
SaTC: CORE: Small: Cybersecurity Big Data Research for Hacker Communities: A Topic and Language Modeling Approach Hsinchun Chen It is estimated that cybercrime costs the global economy around $445 billion annually, particularly due to intellectual property theft and financial fraud using stolen consumer data. Incidents of large-scale hacking and data theft occur regularly, with... Small, Division of Computer and Network Systems (CNS), CORE Jul 6 2020 - 4:07pm
SaTC: CORE: Small: Black-Box Flaw Discovery in Web Authentication and Authorization Mechanisms Jason Polakis Technical advancements in modern smartphones and the widespread availability of Internet on-the-go have resulted in the world wide web becoming an inextricable part of everyday lives, pervading professional, social and personal activities. At the core of... Small, Division of Computer and Network Systems (CNS), CORE Jul 6 2020 - 4:03pm
SaTC: CORE: Medium: Securing the Voice Processing Pipeline Against Adversarial Audio Patrick Traynor In a world in which many new computing devices have limited or no traditional user interface (e.g., smart thermostats, personal digital assistants including Amazon's Alexa, etc), voice interfaces are becoming a primary means of interaction. Such systems... Medium, Division of Computer and Network Systems (CNS), CORE Jul 6 2020 - 3:55pm
SaTC: CORE: Small: Collaborative: Trustworthy Hierarchical Edge Computing Yanchao Zhang Edge computing has quickly risen as an effective paradigm to capture, process, gain insights from, and act upon the massive amount of Internet of Things (IoT) data close to where it is generated. Future edge computing systems are expected to be... Small, Collaborative, Division of Computer and Network Systems (CNS), CORE Jul 6 2020 - 3:32pm
SaTC: CORE: Small: Collaborative: Trustworthy Hierarchical Edge Computing Rui Zhang Edge computing has quickly risen as an effective paradigm to capture, process, gain insights from, and act upon the massive amount of Internet of Things (IoT) data close to where it is generated. Future edge computing systems are expected to be... Small, Collaborative, Division of Computer and Network Systems (CNS), CORE Jul 6 2020 - 3:26pm
SaTC: CORE: Small: Meta Coding and Applications in Cryptography Dana Dachman-Soled The fields of coding theory and cryptography are intertwined, with each field influencing the other: Certain error correcting codes from coding theory are equivalent to a type of secret sharing scheme used in cryptography to achieve secure multiparty... Small, Division of Computer and Network Systems (CNS), CORE Jul 6 2020 - 3:23pm
SaTC: CORE: Small: Finding and Mitigating Side-channel Leakage in Embedded Architectures Paul Ampadu Electronic devices found in a smart home, automobile, airplane, medical, and industrial applications are becoming more capable of on-the-spot processing information with their own embedded processors. While embedded processors make life easier, they also... Small, Division of Computer and Network Systems (CNS), CORE Jul 6 2020 - 2:29pm
SaTC: CORE: Small: Collaborative: Learning Dynamic and Robust Defenses Against Co-Adaptive Spammers Sihong Xie Online reputation systems are ubiquitous for customers to evaluate businesses, products, people, and organizations based on reviews from the crowd. For example, Yelp and TripAdvisor rank restaurants and hotels based on user reviews, and RateMDs allows... Small, Collaborative, Division of Computer and Network Systems (CNS), CORE Jul 6 2020 - 12:23pm
SaTC: CORE: Small: Collaborative: Learning Dynamic and Robust Defenses Against Co-Adaptive Spammers Philip Yu Online reputation systems are ubiquitous for customers to evaluate businesses, products, people, and organizations based on reviews from the crowd. For example, Yelp and TripAdvisor rank restaurants and hotels based on user reviews, and RateMDs allows... Small, Collaborative, Division of Computer and Network Systems (CNS), CORE Jul 6 2020 - 12:20pm
SaTC: TTP: Medium: Collaborative: Exposing and Mitigating Security/Safety Concerns of CAVs: A Holistic and Realistic Security Testing Platform for Emerging CAVs Zhuoqing Mao Connected and Automated Vehicle (CAV) technologies enable real-time information sharing and driving automation, with the potential of significantly improving safety and efficiency of the transportation system. However, cyber-security threats may... Medium, Collaborative, Division of Computer and Network Systems (CNS), TTP Jul 6 2020 - 12:18pm
SaTC: TTP: Medium: Collaborative: Exposing and Mitigating Security/Safety Concerns of CAVs: A Holistic and Realistic Security Testing Platform for Emerging CAVs Qi Chen Connected and Automated Vehicle (CAV) technologies enable real-time information sharing and driving automation, with the potential of significantly improving safety and efficiency of the transportation system. However, cyber-security threats may... Medium, Collaborative, Division of Computer and Network Systems (CNS), TTP Jul 6 2020 - 12:14pm
SaTC: TTP: Medium: Collaborative: Deployment-quality and Accessible Solutions for Cryptography Code Development Barton Miller Vulnerabilities in cryptographic implementations seriously reduce the security guarantees of algorithms in practice and lead to attacks. An effective fix to the vulnerable code problem is automatic code checking. However, existing code verification tools... Medium, Collaborative, Division of Computer and Network Systems (CNS), TTP Jul 6 2020 - 12:12pm
SaTC: CORE: Medium: ADIDS: An Air-gapped Distributed Intrusion Detection System for the Power Grid Raheem Beyah The power grid is a highly complex control system and one of the most impressive engineering feats of the modern era. Nearly every facet of modern society critically relies on the proper operation of the power grid such that long or even short... Medium, Division of Computer and Network Systems (CNS), CORE Jul 6 2020 - 12:01pm
SaTC: TTP: Medium: Collaborative: Deployment-quality and Accessible Solutions for Cryptography Code Development Danfeng Yao Vulnerabilities in cryptographic implementations seriously reduce the security guarantees of algorithms in practice and lead to attacks. An effective fix to the vulnerable code problem is automatic code checking. However, existing code verification tools... Medium, Collaborative, Division of Computer and Network Systems (CNS), TTP Jul 6 2020 - 11:59am
SaTC: CORE: Small: Collaborative: Hardware-assisted Plausibly Deniable System for Mobile Devices Bo Chen Mobile computing devices typically use encryption to protect sensitive information. However, traditional encryption systems used in mobile devices cannot defend against an active attacker who can force the mobile device owner to disclose the key used for... Small, Collaborative, Division of Computer and Network Systems (CNS), CORE Jul 6 2020 - 11:51am
SaTC: CORE: Small: Collaborative: Hardware-assisted Plausibly Deniable System for Mobile Devices Weisong Shi Mobile computing devices typically use encryption to protect sensitive information. However, traditional encryption systems used in mobile devices cannot defend against an active attacker who can force the mobile device owner to disclose the key used for... Small, Collaborative, Division of Computer and Network Systems (CNS), CORE Jul 6 2020 - 11:24am
SaTC-CCRI: Collaborative Research: Sharing Expertise and Artifacts for Reuse through Cybersecurity CommunityHub (SEARCCH) Terry Benzel Cybersecurity research experiments are frequently performed in ad hoc ways, which severely retards scientific progress. Most researchers use a combination of methods and infrastructure to conduct experiments using one-off, painstaking, and error-prone... Collaborative, Division of Computer and Network Systems (CNS) Jul 6 2020 - 11:22am