Search Projects: Group Project

Results 1 - 10 of 2243

Results

group_project

Visible to the public TWC: Medium: Collaborative: Broker Leads for Privacy-Preserving Discovery in Health Information Exchange

Support for research on distributed data sets is challenged by stakeholder requirements limiting sharing. Researchers need early stage access to determine whether data sets are likely to contain the data they need. The Broker Leads project is developing privacy-enhancing technologies adapted to this discovery phase of data-driven research. Its approach is inspired by health information exchanges that are based on a broker system where data are held by healthcare providers and collected in distributed queries managed by the broker.

group_project

Visible to the public TWC: Small: Understanding and Mitigating the Security Hazards of Mobile Fragmentation

Mobile computing technologies are rapidly evolving and phone (and other mobile device) manufacturers are under constant pressure to offer new product models. Each manufacturer customizes operating system software for its devices and often changes this software to support its new models. Given the many manufacturers in the mobile device marketplace and the many different generations of products, there are many customized branches of mobile operating systems in use at any time.

group_project

Visible to the public TWC: Small: Secure Data-Intensive Computing on Hybrid Clouds

The ongoing effort to move data intensive computation to low-cost public clouds has been impeded by privacy concerns, as today's cloud providers offer little assurance for the protection of sensitive user data. This problem cannot be addressed by existing cryptographic techniques alone, which are often too heavyweight to manage the computation involving a large amount of data. As a result, many computing tasks have to be run on individual organizations? internal systems whenever they touch even a very small amount of sensitive information.

group_project

Visible to the public TWC: Small: Knowing Your Enemy: Understanding and Counteracting Web Malvertising

With the Internet becoming the dominant channel for marketing and promotion, online advertisements (ad for short) are also increasingly used for propagating malware, committing scams, click frauds and other illegal activities. These activities, which we call malvertising, systematically deliver malicious ad content and victimize visitors through an infrastructure, which includes malicious advertisers, ad networks, redirection servers, exploit servers and others.

group_project

Visible to the public TC: Small: Plugging Logic Loopholes in Hybrid Web Applications to Secure Web Commerce

With the increasing popularity of third-party services integrated in hybrid web applications, come new security challenges posed by the complexity in coordinating these individual services and the web client. Such complexity often brings in program logic flaws that can be exploited to induce inconsistencies among different services' internal states, causing the security control within these applications to fail.

group_project

Visible to the public TC: Small: Reining in Side-Channel Information Leaks in the Software-as-a-Service Era

With software-as-a-service (SaaS) rapidly becoming mainstream, web applications increasingly substitute for desktop software. A web application is a two-part program, with its components deployed both in the browser and in the web server. The interactions between these two components inevitably reveal the program's internal states to any observer of the communication stream, simply through the pattern of packet lengths and the timing of interactions, even if stream is entirely encrypted.

group_project

Visible to the public  TWC: Small: Safeguarding Mobile Cloud Services: New Challenges and Solutions

Mobile cloud technologies have begun to rely heavily on services known as Mobile Back-end as a Service (MBaaS), including push messaging, data synchronization, and mobile identity management. Many of today's popular apps have already integrated push messaging services such as Google Cloud Messaging (GCM), Amazon Device Messaging (ADM), and third parties like Baidu, to enable the apps to receive notifications such as private messages, financial secrets or family members' locations.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Understanding and Discovering Illicit Online Business Through Automatic Analysis of Online Text Traces

Unlawful online business often leaves behind human-readable text traces for interacting with its targets (e.g., defrauding victims, advertising illicit products to intended customers) or coordinating among the criminals involved. Such text content is valuable for detecting various types of cybercrimes and understanding how they happen, the perpetrator's strategies, capabilities and infrastructures and even the ecosystem of the underground business.

group_project

Visible to the public SaTC: CORE: Small: Trustworthy System-On-Chip Design using Secure On-Chip Communication Architecture

System-on-Chip (SoC) is the driving force behind computing and communication in a wide variety of electronic systems, ranging from simple devices in smart homes to complex systems in satellites. Network-on-Chip (NoC) is a commonly used solution for on-chip communication between components in complex SoCs. To meet cost and time-to-market constraints, SoCs are designed using various hardware components, often gathered from untrusted third-party vendors. Despite increasing importance of trusted communication in overall system security, NoC security is relatively under-investigated.

group_project

Visible to the public SaTC: CORE: Small: RUI: An Exploratory Study of Technology Adoption in K-12: Educational Benefits vs Privacy Costs

This project explores technology adoption practices and interactions and the digital data literacy of education technology adoption decision makers in California K-12 public school districts. Data profiles constructed from the comingling of data from many sources (school, home, mobile technology) can follow the individual through his or her lifetime.