Use the filters below to find projects. You may search by Title, Keyword, Principal Investigator or Award ID. The expired filter allows you to narrow your results to only active or expired awards. The default is for all awards to show. Select ‘false’ to see active awards only or ‘true’ to see only expired awards.

Add Project

 

Project Title PI Project Abstract All terms
SaTC: TTP: Small: Collaborative: Privacy-Aware Wearable-Assisted Continuous Authentication Framework selcuk The login process for a mobile or desktop device does not guarantee that the person using it is necessarily the intended user. If one is logged in for a long period of time, the user's identity should be periodically re-verified throughout the session... Small, Collaborative, Division of Computer and Network Systems (CNS), TTP
8th Workshop on Computational Cybersecurity in Compromised Environments (C3E) Daniel Wolf The Computational Cybersecurity in Compromised Environments (C3E) workshop series identifies recent challenges in the changing cybersecurity landscape and explores different possible courses of research action. The workshops stimulate discussion and... Division of Computer and Network Systems (CNS)
A Workshop US-Brazil on Cyber Security and Privacy Daniela Oliveira The goal of this workshop is to bring together American and Brazilian cyber security researchers to discuss the main challenges of the field, and to promote cross-collaboration and the building of ties among the attendees. The workshop will be organized... Division of Computer and Network Systems (CNS)
ACSAC 2013 Student Support balenson This award will provide travel funding and conference registration fees for US-based undergraduate and graduate students to attend the 2013 Annual Computer Security Applications Conference (ACSAC) to be held in New Orleans, LA on December 9-13, 2013.... Division of Computer and Network Systems (CNS)
Annual Computer Security Applications Conference (ACSAC) 2015 Student Support balenson This project supports 10-15 students for their travel to attend the 2015 Annual Computer Security Applications Conference (ACSAC). ACSAC, which just celebrated its 30th year, is a top-tier academic security conference that attracts averages about 250... Division of Computer and Network Systems (CNS)
CAREER: Research and Education: Number Theory, Geometry and Cryptography Katherine Stange This project advances the understanding of number theory, geometry, and cryptography. Number theory and geometry are among the oldest and most central topics in mathematics, while their application to cryptography underlies modern cybersecurity. The... Cryptography, theory, Foster Multidisciplinary Approach, Mathematics and statistics, Risk Management, CAREER, Division of Computer and Network Systems (CNS), Protect
CAREER: Scale and Performance in Anonymous Communication Nikita Borisov This project targets an important aspect of online privacy by giving users the ability to hide their communication patterns through anonymous communication. Anonymous communication mitigates the "dossier effect," where third parties can accumulate enough... CAREER, Division of Computer and Network Systems (CNS)
CCSS: Collaborative Research: Developing A Physical-Channel Based Lightweight Authentication System for Wireless Body Area Networks Shucheng Yu Non-intrusive and ambulatory health monitoring of patients? vital signs over Wireless Body Area Networks (WBANs) provides an economical solution to rising costs in the healthcare system. However, due to the lack of security in the operation and... Division Of Electrical, Commun & Cyber Systems (ECCS), Collaborative, CCSS
CIF: Small: Alignment for Secrecy: One-Time-Pads in the Air without Keys Sennur Ulukus In today's communication networks, most data flow through wireless links which are particularly vulnerable to eavesdropping attacks. While currently available cryptographic algorithms provide useful protection against computationally limited eavesdroppers... Small, Division of Computing and Communication Foundations (CCF), CIF
CIF: Small: Statistical Data Privacy: Fundamental Limits and Efficient Algorithms pramodviswanath Privacy is a fundamental individual right. In the era of big data, large amounts of data about individuals are collected both voluntarily (e.g., frequent flier/shopper incentives) and involuntarily (e.g. US Census or medical records). With the ready... Small, Division of Computing and Communication Foundations (CCF), CIF
CRII: SaTC: A Principled Approach Aiding the Development of a Compliant Internet PKI Omar Haider Chowd... Transport layer security (TLS) and secure socket layer (SSL) protocols aim to establish a secure channel with confidentiality and integrity guarantees over an insecure network. SSL/TLS is currently being used to protect a large number of servers and... Division of Computer and Network Systems (CNS), CRII
CRII: SaTC: Expanding the Frontiers of Cryptographic Technologies Sanjam Garg As all our data moves to the cloud many new security and privacy concerns arise and traditional cryptographic primitives prove insufficient in such scenarios. A key focus of this research is to advance the state of the art on cryptographic techniques that... Develop System Design Methods, Assure Information Flows, Cryptography, theory, Scientific Foundations, Deter, Division of Computer and Network Systems (CNS), Protect, CRII
CRII: SaTC: Practical Cryptographic Coding Schemes Against Memory Attacks Feng-Hao Liu The goal of this project is to develop practical non-malleable codes, which are encoding schemes that have the property that modifying an encoded message results in either decoding the original message or a totally unrelated message. This will improve... Division of Computer and Network Systems (CNS), CRII
CT-ISG: I-BLOCK: Understanding and Filtering of Malicious IP Traffic Athina Markopoulou How can network infrastructure be protected from malicious traffic, such as scanning, malicious code propagation, spam, and distributed denial-of-service attacks? This project investigates mechanisms at the network layer for blocking malicious traffic.... Division of Computer and Network Systems (CNS), ISG
CT-M: Theory and Practice of Accountable Systems Harold Abelson The project on the Theory and Practice of Accountable Systems investigates computational and social properties of information networks necessary to provide reliable assessments of compliance with rules and policies governing the use of information. In... Division of Computer and Network Systems (CNS)
DIMACS Special Focus on Algorithmic Foundations of the Internet Fred Roberts The Internet has become a part of our everyday lives. We use it to conduct much of our business, government, and social interactions. However, the scale and heterogeneity of the Internet have far surpassed anyone's expectations, and the Internet is... Division of Computer and Network Systems (CNS)
EAGER: Age-Targeted Automated Cueing Against Cyber Social Engineering Attacks Daniela Oliveira Online social engineering attacks have been often used for cybercrime activities. These attacks are low cost and complicate attack attribution. Pure technical defense solutions cannot counter them, which rely on human gullibility. Humans often engage in... Foster Multidisciplinary Approach, Human Aspects, Risk Management, security for vulnerable populations, Social, behavioral and economic science, Usability, Protect, Division of Social and Economic Sciences (SES), EAGER
EAGER: Data Privacy for Smart Meter Data: A Scenario-Based Study Jason Dedrick Smart electric meters comprise one key technology element in an overall strategy to modernize the nation's energy infrastructure. Smart meters capture data on household energy usage at frequent intervals and transmit those data to utility companies, who... Division of Social and Economic Sciences (SES), EAGER
EAGER: Digital Interventions for Reducing Social Networking Risks in Adolescents Bogdan Carbunar Adolescents are at higher risk of engaging in risky behaviors in online social networks. This project develops digital intervention solutions to motivate, educate, support and engender safe social networking behaviors among adolescents. It significantly... Develop Approaches, Foster Multidisciplinary Approach, Human Aspects, Privacy, applied, Risk Management, Small, Social networks, Social, behavioral and economic science, Protect, Division of Social and Economic Sciences (SES), EAGER
EAGER: The Role of Emotion in Risk Communication and Warning: Application to Risks of Failures to Update Software Mohammad Khan End-users' online behavior can significantly affect the reliability and security of next-generation software systems. For instance, skipping repeated requests to update software or ignoring security warnings while visiting unknown websites, while... Human Aspects, Risk Management, Scientific Foundations, Usability, Division of Computer and Network Systems (CNS), Protect, EAGER