Search SaTC Projects

Project Title Lead PI Project Abstract Keywords Last Updatedsort icon
SaTC: CORE: Small: Cybersecurity Big Data Research for Hacker Communities: A Topic and Language Modeling Approach Hsinchun Chen It is estimated that cybercrime costs the global economy around $445 billion annually, particularly due to intellectual property theft and financial fraud using stolen consumer data. Incidents of large-scale hacking and data theft occur regularly, with... Small, Division of Computer and Network Systems (CNS), CORE Jul 6 2020 - 4:07pm
SaTC: CORE: Medium: Securing the Voice Processing Pipeline Against Adversarial Audio Patrick Traynor In a world in which many new computing devices have limited or no traditional user interface (e.g., smart thermostats, personal digital assistants including Amazon's Alexa, etc), voice interfaces are becoming a primary means of interaction. Such systems... Medium, Division of Computer and Network Systems (CNS), CORE Jul 6 2020 - 3:55pm
SaTC: TTP: Medium: Collaborative: Exposing and Mitigating Security/Safety Concerns of CAVs: A Holistic and Realistic Security Testing Platform for Emerging CAVs Zhuoqing Mao Connected and Automated Vehicle (CAV) technologies enable real-time information sharing and driving automation, with the potential of significantly improving safety and efficiency of the transportation system. However, cyber-security threats may... Medium, Collaborative, Division of Computer and Network Systems (CNS), TTP Jul 6 2020 - 12:18pm
SaTC: TTP: Medium: Collaborative: Exposing and Mitigating Security/Safety Concerns of CAVs: A Holistic and Realistic Security Testing Platform for Emerging CAVs Qi Chen Connected and Automated Vehicle (CAV) technologies enable real-time information sharing and driving automation, with the potential of significantly improving safety and efficiency of the transportation system. However, cyber-security threats may... Medium, Collaborative, Division of Computer and Network Systems (CNS), TTP Jul 6 2020 - 12:14pm
SaTC: TTP: Medium: Collaborative: Deployment-quality and Accessible Solutions for Cryptography Code Development Barton Miller Vulnerabilities in cryptographic implementations seriously reduce the security guarantees of algorithms in practice and lead to attacks. An effective fix to the vulnerable code problem is automatic code checking. However, existing code verification tools... Medium, Collaborative, Division of Computer and Network Systems (CNS), TTP Jul 6 2020 - 12:12pm
SaTC: TTP: Medium: Collaborative: Deployment-quality and Accessible Solutions for Cryptography Code Development Danfeng Yao Vulnerabilities in cryptographic implementations seriously reduce the security guarantees of algorithms in practice and lead to attacks. An effective fix to the vulnerable code problem is automatic code checking. However, existing code verification tools... Medium, Collaborative, Division of Computer and Network Systems (CNS), TTP Jul 6 2020 - 11:59am
SaTC: CORE: Medium: Collaborative: New Directions in Public-Key and Identity-Based Encryption Sanjam Garg Developments in public-key encryption (PKE) and identity-based encryption (IBE) have revolutionized the field of cryptography and secure communication in general. PKE allowed remote parties to establish secure channels in front of eavesdropping... Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE Aug 27 2019 - 11:47am
SaTC: CORE: Medium: Collaborative: New Directions in Public-Key and Identity-Based Encryption Mohammad Mahmoody Developments in public-key encryption (PKE) and identity-based encryption (IBE) have revolutionized the field of cryptography and secure communication in general. PKE allowed remote parties to establish secure channels in front of eavesdropping... Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE Aug 27 2019 - 11:16am
SaTC: CORE: Medium: Collaborative: RADAR: Real-time Advanced Detection and Attack Reconstruction Ramasubramanian Sekar There has been a rapid escalation of targeted cyber-attacks, called Advanced Persistent Threats (APTs), on high-profile enterprises. These skilled attacks routinely bypass widely deployed protection mechanisms. Existing second-line cyber defenses (e.g.,... Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE Aug 26 2019 - 3:54pm
SaTC: CORE: Medium: Collaborative: RADAR: Real-time Advanced Detection and Attack Reconstruction V. Venkatakrishnan There has been a rapid escalation of targeted cyber-attacks, called Advanced Persistent Threats (APTs), on high-profile enterprises. These skilled attacks routinely bypass widely deployed protection mechanisms. Existing second-line cyber defenses (e.g.,... Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE Aug 26 2019 - 3:47pm
CAREER: Enhancing Mobile Authentication by Measuring the Authentication Life-Cycle Adam Aviv This CAREER research focuses on human factors in authentication using mobile devices. Mobile authentication is a crucial component of authentication, especially as mobile devices become ever more connected to the broader security ecosystem. A major... CAREER, Division of Computer and Network Systems (CNS) Aug 26 2019 - 2:58pm
CAREER: Securing Cyberspace: Gaining Deep Insights into the Online Underground Ecosystem Yanfang Ye As the Internet becomes increasingly ubiquitous, it offers a low-risk harbor for cybercrime -- illegal activities such as hacking and online scams. Cybercrime is increasingly enabled by an online underground ecosystem, within which are anonymous forums... CAREER, Division of Computer and Network Systems (CNS) Aug 13 2019 - 1:12pm
SaTc: EDU: Collaborative: An Assessment Driven Approach to Self-Directed Learning in Secure Programming (SecTutor) Matt Bishop The field of software development needs developers to write secure code, as well as to continuously respond to evolving threats and adapt system designs to meet new security needs. This requires developers to gain a deep understanding of foundational... Collaborative, Division of Graduate Education (DGE), EDU Aug 13 2019 - 12:16pm
SaTC: CORE: Medium: Collaborative: Toward Enforceable Data Usage Control in Cloud-based IoT Systems Ning Zhang In the upcoming evolution of the Internet of Things (IoT), it is anticipated that billions of devices will be connected to the Internet. While IoT promises a more connected and smarter world, this pervasive large-scale data collection, storage, sharing,... Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE Aug 7 2019 - 4:16pm
SaTC: CORE: Medium: Collaborative: Toward Enforceable Data Usage Control in Cloud-based IoT Systems Wenjing Lou In the upcoming evolution of the Internet of Things (IoT), it is anticipated that billions of devices will be connected to the Internet. While IoT promises a more connected and smarter world, this pervasive large-scale data collection, storage, sharing,... Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE Aug 7 2019 - 4:13pm
SaTC: CORE: Medium: Collaborative: Doctor WHO: Investigation and Prevention of Online Content Management System Abuse Brendan Saltaformaggio Over half of the world's 1.8 billion websites run on Content Management Systems (CMS). Unfortunately, CMS deployments make easy targets for attackers, as they are built from an amalgam of layered software and interpreters, with varying degrees of network... Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE Aug 7 2019 - 4:03pm
SaTC: CORE: Medium: Collaborative: Doctor WHO: Investigation and Prevention of Online Content Management System Abuse Jyu Hyung Lee Over half of the world's 1.8 billion websites run on Content Management Systems (CMS). Unfortunately, CMS deployments make easy targets for attackers, as they are built from an amalgam of layered software and interpreters, with varying degrees of network... Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE Aug 7 2019 - 4:00pm
SaTC: CORE: Medium: Collaborative: Doctor WHO: Investigation and Prevention of Online Content Management System Abuse Yonghwi Kwon Over half of the world's 1.8 billion websites run on Content Management Systems (CMS). Unfortunately, CMS deployments make easy targets for attackers, as they are built from an amalgam of layered software and interpreters, with varying degrees of network... Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE Aug 7 2019 - 3:53pm
SaTC: CORE: Medium: Collaborative: Taming Memory Corruption with Security Monitors William Robertson Modern computing systems are under constant attack by organized crime syndicates, nation-state adversaries, and regular cyber-criminals alike. Among the most damaging attacks are those that exploit so-called memory corruption vulnerabilities which often... Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE Aug 7 2019 - 3:50pm
SaTC: CORE: Medium: Collaborative: Taming Memory Corruption with Security Monitors Manuel Egele Modern computing systems are under constant attack by organized crime syndicates, nation-state adversaries, and regular cyber-criminals alike. Among the most damaging attacks are those that exploit so-called memory corruption vulnerabilities which often... Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE Aug 7 2019 - 1:59pm