Search SaTC Projects

Project Title Lead PI Project Abstract Keywords Last Updatedsort icon
CAREER: Non-Commutative Cryptography from Hard Learning Problems: Theory and Practice Antonio Nicolosi The resiliency of much of the modern information technology ecosystem is predicated on the strength of the cryptographic constructions at its core. Uncovering new intractable problems suitable for cryptosystem design enhances the robustness of the overall... CAREER, Division of Computer and Network Systems (CNS) Sep 10 2019 - 3:17pm
CAREER: Centralized Authorities in Internet Security: Risk Assessment, Mitigation, and New Architectures Sharon Goldberg In response to serious vulnerabilities that plague many of the Internet's core protocols, the last two decades have seen various security infrastructures layered on top of originally insecure protocols (DNSSEC on top of the domain name system, SSL and its... Large, CAREER, Division of Computer and Network Systems (CNS) Sep 10 2019 - 2:21pm
CAREER: Verifiable Outsourcing of Data Mining Computations Hui Wang Spurred by developments such as cloud computing, there has been considerable interest in the data-mining-as-a-service (DMaS) paradigm in which a client outsources his/her data mining needs to a third-party service provider. However, this raises a few... Data science, Scientific Foundations, CAREER, Division of Computer and Network Systems (CNS), Protect Sep 10 2019 - 2:20pm
CAREER: Using Analytics on Security Data to Understand Negative Innovations Samuel Ransbotham The world increasingly relies on computer systems and associated software, yet attackers continue to exploit vulnerabilities in this software to threaten security in new and sophisticated ways. This research views exploitations of software vulnerabilities... Data science, Human Aspects, Social, behavioral and economic science, Deter, CAREER, Division of Computer and Network Systems (CNS) Sep 10 2019 - 2:19pm
TWC: Frontier: Collaborative: Rethinking Security in the Era of Cloud Computing Jeffrey Chase There are at least two key features of the move to cloud computing that introduce the opportunity for significant leaps forward in computer security for tenant services. First, a compute cloud provides a common software, hardware and management basis for... Collaborative, Division of Computer and Network Systems (CNS), Frontier Sep 10 2019 - 2:18pm
TWC: Frontier: Collaborative: Rethinking Security in the Era of Cloud Computing Michael Reiter There are at least two key features of the move to cloud computing that introduce the opportunity for significant leaps forward in computer security for tenant services. First, a compute cloud provides a common software, hardware and management basis for... Develop System Design Methods, Access control, Adapt, Assure Information Flows, Authentication, Cloud Computing, Cryptography, applied, Cybersecurity Workforce, Data science, Intrusion detection, Networking, wired, Privacy, applied, Reduce Privacy Risks, Scientific Foundations, Software, Systems, Detect, Large, Collaborative, Division of Computer and Network Systems (CNS), Protect, Frontier Sep 9 2019 - 3:12pm
TWC SBE: Option: Frontier: Collaborative: Towards Effective Web Privacy Notice and Choice: A Multi-Disciplinary Prospective Norman Sadeh Natural language privacy policies have become a de facto standard to address expectations of notice and choice on the Web. Yet, there is ample evidence that users generally do not read these policies and that those who occasionally do struggle to... Develop System Design Methods, Assure Information Flows, Cyber-Physical Systems (CPS), Foster Multidisciplinary Approach, Human Aspects, Increase Transparency of Data, privacy assistants, Privacy, applied, Privacy, theory, Reduce Privacy Risks, Scientific Foundations, Social networks, Social, behavioral and economic science, Software, Transition to Practice, Understand and Measure Privacy, Usability, usable security and privacy, Detect, Deter, Collaborative, Division of Computer and Network Systems (CNS), Protect, Frontier, SBE, TWC Sep 9 2019 - 3:11pm
TWC: Frontier: Collaborative: Rethinking Security in the Era of Cloud Computing William Enck There are at least two key features of the move to cloud computing that introduce the opportunity for significant leaps forward in computer security for tenant services. First, a compute cloud provides a common software, hardware and management basis for... Collaborative, Division of Computer and Network Systems (CNS), Frontier Sep 9 2019 - 3:10pm
TWC: Frontier: Collaborative: Enabling Trustworthy Cybersystems for Health and Wellness Carl Gunter This frontier project tackles many of the fundamental research challenges necessary to provide trustworthy information systems for health and wellness, as sensitive information and health-related tasks are increasingly pushed into mobile devices and cloud... Division of Computer and Network Systems (CNS), Frontier Sep 9 2019 - 3:09pm
TWC: Frontier: Collaborative: Enabling Trustworthy Cybersystems for Health and Wellness Aviel Rubin This frontier project tackles many of the fundamental research challenges necessary to provide trustworthy information systems for health and wellness, as sensitive information and health-related tasks are increasingly pushed into mobile devices and cloud... Develop System Design Methods, Access control, Adapt, Assure Information Flows, Authentication, Biometrics, Cryptography, applied, Cyber-Physical Systems (CPS), Cybersecurity Workforce, Develop Approaches, Foster Multidisciplinary Approach, Human Aspects, Increase Transparency of Data, Networking, wired, Privacy, applied, Privacy, theory, Reduce Privacy Risks, Risk Management, Software, Transition to Practice, Understand and Measure Privacy, Detect, Deter, Collaborative, Division of Computer and Network Systems (CNS), Protect, Frontier Aug 29 2019 - 1:42pm
TWC: Frontier: Collaborative: Enabling Trustworthy Cybersystems for Health and Wellness Kevin Fu This frontier project tackles many of the fundamental research challenges necessary to provide trustworthy information systems for health and wellness, as sensitive information and health-related tasks are increasingly pushed into mobile devices and cloud... Cybersecurity Workforce, Foster Multidisciplinary Approach, Hardware, Software, Systems, Collaborative, Division of Computer and Network Systems (CNS), Protect, Frontier, TWC Aug 29 2019 - 1:38pm
TWC SBE: Option: Frontier: Collaborative: Towards Effective Web Privacy Notice and Choice: A Multi-Disciplinary Prospective Joel Reidenberg Natural language privacy policies have become a de facto standard to address expectations of notice and choice on the Web. Yet, there is ample evidence that users generally do not read these policies and that those who occasionally do struggle to... Collaborative, Division of Computer and Network Systems (CNS), Frontier, SBE Aug 29 2019 - 1:29pm
TWC: Frontier: Collaborative: Rethinking Security in the Era of Cloud Computing Michael Swift There are at least two key features of the move to cloud computing that introduce the opportunity for significant leaps forward in computer security for tenant services. First, a compute cloud provides a common software, hardware and management basis for... Develop System Design Methods, Access control, Assure Information Flows, Authentication, Foster Multidisciplinary Approach, Increase Transparency of Data, Networking, wired, Research Infrastructure, Software, Systems, Large, Collaborative, Division of Computer and Network Systems (CNS), Protect, Frontier Aug 29 2019 - 1:27pm
TWC: Frontier: Collaborative: Beyond Technical Security: Developing an Empirical Basis for Socio-Economic Perspectives Vern Paxson This project tackles the social and economic elements of Internet security: how the motivations and interactions of attackers, defenders, and users shape the threats we face, how they evolve over time, and how they can best be addressed. While security is... abusive surveillance, Adapt, attacker social networks, Data science, Human Aspects, Risk Management, Scientific Foundations, Social networks, Social, behavioral and economic science, Systems, Detect, Deter, Collaborative, Division of Computer and Network Systems (CNS), Protect, Frontier Aug 29 2019 - 1:23pm
CRII: SaTC: Practical Cryptographic Coding Schemes Against Memory Attacks Feng-Hao Liu The goal of this project is to develop practical non-malleable codes, which are encoding schemes that have the property that modifying an encoded message results in either decoding the original message or a totally unrelated message. This will improve... Cryptography, applied, Cryptography, theory, Division of Computer and Network Systems (CNS), CRII Aug 29 2019 - 1:19pm
TC: Small: Towards Automating Privacy Controls for Online Social Networks Ben Zhao For millions of Internet users today, controlling information access on Online Social Networks (OSNs) such as Facebook and LinkedIn is a difficult challenge. Privacy controls in current systems do not provide the necessary level of flexibility and... Small, Division of Information & Intelligent Systems (IIS), TC Aug 27 2019 - 3:54pm
SDCI: Integrated Simulation and Emulation Platform for Security Experimentation Yuan Xue Trustworthiness of cyberphysical systems (CPS) is an essential concern since such systems are routinely employed in critical settings. Currently many components of CPS are built without sufficiently formalized and analyzed properties and guarantees. Such... Office of Advanced Cyberinfrastructure (OAC) Aug 27 2019 - 3:52pm
An Innovative Interdisciplinary Cybersecurity Education Program for Protecting Critical Infrastructure jurban This capacity track project is developing an interdisciplinary, cybersecurity education program for engineers that must be aware of critical design issues for addressing cybersecured control systems for electromechanical devices, more effective techniques... Division of Graduate Education (DGE) Aug 27 2019 - 3:49pm
CAREER: User-Space Protection Domains for Compositional Information Security Gang Tan Attacks on software applications such as email readers and web browsers are common. These attacks can cause damages ranging from application malfunction, loss of private data, to a complete takeover of users' computers. One effective strategy for limiting... Division of Computing and Communication Foundations (CCF), CAREER Aug 27 2019 - 3:26pm
TC: Small: Collaborative Research: Securing Multilingual Software Systems Gang Tan Most real software systems consist of modules developed in multiple programming languages. Different languages differ in their security assumptions and guarantees. Consequently, even if single modules are secure in some language model and with respect to... Small, Division of Computing and Communication Foundations (CCF), Collaborative, TC Aug 27 2019 - 3:22pm