Search Projects: Group Project

Results 1 - 10 of 2171

Results

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Presentation-attack-robust biometrics systems via computational imaging of physiology and materials

Many physical characteristics, such as face, fingerprints, and iris as well as behavioral characteristics such as voice, gait, and keystroke dynamics, are believed to be unique to an individual. Hence, biometric analysis offers a reliable solution to the problem of identity verification. It is now widely acknowledged that biometric systems are vulnerable to manipulation where the true biometric is falsified using various attack strategies; such attacks are referred to as Presentation Attacks (PAs).

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Presentation-attack-robust biometrics systems via computational imaging of physiology and materials

Many physical characteristics, such as face, fingerprints, and iris as well as behavioral characteristics such as voice, gait, and keystroke dynamics, are believed to be unique to an individual. Hence, biometric analysis offers a reliable solution to the problem of identity verification. It is now widely acknowledged that biometric systems are vulnerable to manipulation where the true biometric is falsified using various attack strategies; such attacks are referred to as Presentation Attacks (PAs).

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Presentation-attack-robust biometrics systems via computational imaging of physiology and materials

Many physical characteristics, such as face, fingerprints, and iris as well as behavioral characteristics such as voice, gait, and keystroke dynamics, are believed to be unique to an individual. Hence, biometric analysis offers a reliable solution to the problem of identity verification. It is now widely acknowledged that biometric systems are vulnerable to manipulation where the true biometric is falsified using various attack strategies; such attacks are referred to as Presentation Attacks (PAs).

group_project

Visible to the public TWC: Small: Physiological Information Leakage: A New Front on Health Information Security

With the growing use of implantable and wearable medical devices, information security for such devices has become a major concern. Prior work in this area mostly focuses on attacks on the wireless communication channel among these devices and health data stored in online databases. The proposed work is a departure from this line of research and is motivated by acoustic and electromagnetic physiological information leakage from the medical devices. This type of information leakage can also directly occur from the human body, thus raising privacy concerns.

group_project

Visible to the public SaTC: CORE: Small: Models and Measurements for Website Fingerprinting

Many private interactions between individuals and their friends, families, employers, and institutions are now carried out on the Internet; disclosure of the contents of these interactions or even the mere associations between these parties can expose people to real financial or physical risks. As a result, encryption and services such as virtual private networks or the Tor project that conceal the connection between a user and the websites they visit are growing in popularity.

group_project

Visible to the public SaTC: CORE: Small: Consistent and Private Group Communication

Texting and social media-based messaging applications have become nearly as common as face-to-face communications for conversation between individuals and groups. While it is known how to provide privacy for conversations between two individuals, there is a gap in extending these techniques to group conversations. This project is developing new communication techniques and open-source software for private communication among groups of users.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Understanding Law-Enforcement Cyber Investigations

Numerous challenges confront law enforcement investigations and prosecutions of cybercrime offenses, including under-reporting by victims, jurisdictional conflicts and limitations, insufficient resources, training, and expertise, as well as organizational constraints. This research is a study of cybercrime investigators, their departments, and the challenges they face in fighting cybercrime. The research consists of social scientific research on how law enforcement investigators and their units conduct cybercrime investigations.

group_project

Visible to the public EAGER: Digital Inequalities in the Heartland: Exploring the Information Security Experiences of Marginalized Internet Users

This project aims to understand how Internet technology may affect patrons' privacy and data security when they use public access computers, and to develop technical solutions that will enable these individuals to go online more safely and securely. The project concentrates especially on people who are economically poor and vulnerable to risk, such as very young or old people, people of color, immigrants, Native people, non-English speakers, and the disabled. Often these patrons must rely on public libraries for their broadband Internet access.

group_project

Visible to the public STARSS: Small: Design of Light-weight RRAM based Hardware Security Primitives for IoT devices

Our society has become increasingly dependent on electronic information exchange between personal devices and the cloud. Unfortunately, the number of identity and secure information leaks is on the rise. Many of the security breaches are due to insecure access channels to the cloud. The security problem is likely to be exacerbated in the Internet-of-Things (IoT) era where billions of devices in our homes, offices and cars are digitally connected.

group_project

Visible to the public SaTC: NSF-BSF: CORE: Small: Attacking and Defending the Lifespan of Mobile and Embedded Flash Storage

This project explores approaches to attack and defend the lifespan of flash storage in small mobile devices. While the project focuses on smartphones, the research is applicable to any small flash-based device that allows users to install applications, including smart watches, Internet-of-Things (IoT) devices, computerized medical equipment, and computer-managed critical infrastructure. It is well understood that, over time, writing to flash storage will physically wear out the device. This problem is considered a nonissue with respect to enterprise Solid State Drives (SSDs).