Search Projects: Group Project
Results 1 - 10 of 2245
Results
group_project
Submitted by Katie Dey on Mon, 03/19/2018 - 9:10pm
POLICY ANALYTICS FOR CYBERSECURITY OF CYBER-PHYSICAL SYSTEMS
group_project
Submitted by jgomez91 on Tue, 05/03/2022 - 10:47am
This research examines the scientific foundations for modeling security and privacy trade-offs in cyber-physical systems, focusing in particular on settings where privacy-protection technologies might be abused by malicious parties to hide their attacks. The goal is to provide both security and privacy guarantees for a variety of cyber-physical systems including intelligent transportation systems, smart energy, and autonomous vehicles.
group_project
Submitted by clairemcgonigle on Tue, 04/05/2022 - 5:17pm
This is a test for creating a project to recreate the Dissipation of Stop and Go Waves.
group_project
Submitted by Heather Lucas on Wed, 01/29/2020 - 4:44pm
Although human users can greatly affect the security of systems intended to be resilient, we lack a detailed understanding of their motivations, decisions, and actions. The broad aim of this project is to provide a scientific basis and techniques for cybersecurity risk assessment. This is achieved through development of a general-purpose modeling and simulation approach for cybersecurity aspects of cyber-systems and of all human agents that interact with those systems. These agents include adversaries, defenders, and users.
group_project
Submitted by XiaoFeng Wang on Tue, 10/24/2017 - 1:02pm
Support for research on distributed data sets is challenged by stakeholder requirements limiting sharing. Researchers need early stage access to determine whether data sets are likely to contain the data they need. The Broker Leads project is developing privacy-enhancing technologies adapted to this discovery phase of data-driven research. Its approach is inspired by health information exchanges that are based on a broker system where data are held by healthcare providers and collected in distributed queries managed by the broker.
group_project
Submitted by XiaoFeng Wang on Tue, 12/19/2017 - 2:36pm
Mobile computing technologies are rapidly evolving and phone (and other mobile device) manufacturers are under constant pressure to offer new product models. Each manufacturer customizes operating system software for its devices and often changes this software to support its new models. Given the many manufacturers in the mobile device marketplace and the many different generations of products, there are many customized branches of mobile operating systems in use at any time.
group_project
Submitted by XiaoFeng Wang on Wed, 12/20/2017 - 3:50pm
The ongoing effort to move data intensive computation to low-cost public clouds has been impeded by privacy concerns, as today's cloud providers offer little assurance for the protection of sensitive user data. This problem cannot be addressed by existing cryptographic techniques alone, which are often too heavyweight to manage the computation involving a large amount of data. As a result, many computing tasks have to be run on individual organizations? internal systems whenever they touch even a very small amount of sensitive information.
group_project
Submitted by XiaoFeng Wang on Wed, 12/20/2017 - 3:47pm
With the Internet becoming the dominant channel for marketing and promotion, online advertisements (ad for short) are also increasingly used for propagating malware, committing scams, click frauds and other illegal activities. These activities, which we call malvertising, systematically deliver malicious ad content and victimize visitors through an infrastructure, which includes malicious advertisers, ad networks, redirection servers, exploit servers and others.
group_project
Submitted by XiaoFeng Wang on Thu, 03/08/2018 - 2:10pm
With the increasing popularity of third-party services integrated in hybrid web applications, come new security challenges posed by the complexity in coordinating these individual services and the web client. Such complexity often brings in program logic flaws that can be exploited to induce inconsistencies among different services' internal states, causing the security control within these applications to fail.
group_project
Submitted by XiaoFeng Wang on Wed, 03/14/2018 - 2:51pm
With software-as-a-service (SaaS) rapidly becoming mainstream, web applications increasingly substitute for desktop software. A web application is a two-part program, with its components deployed both in the browser and in the web server. The interactions between these two components inevitably reveal the program's internal states to any observer of the communication stream, simply through the pattern of packet lengths and the timing of interactions, even if stream is entirely encrypted.