Search Projects: Group Project, 9 Mar 2018

4 results



Visible to the public TC: Small: A Cryptographic Treatment of the Wiretap Channel

This project provides communication security in a new way, based on channel noise rather than standard cryptographic constructs and algorithms. The idea is old, from work in the 1970s in the information-theory and coding field, but this classical work used weak security metrics and even then was not able to provide any explicit and practical designs. This research bridges the gap between this classical work and modern cryptography.


Visible to the public TC: Small: Automatically Identifying Botnet Command and Control Infrastructures

Unfortunately, cyber crime has become a business today. In contrast to the Internet security situation ten years ago, most of the significant Internet attacks today aim to make a financial profit. A popular and effective choice of criminals today for sending spam, stealing data, and launching attacks are so called bots -- a type of malware that is written with the intent of compromising and taking control of hosts on the Internet. The main distinguishing characteristic of a bot compared to other types of malware is that a bot is able to establish a command and control (C&C) channel.


Visible to the public TC: Small: An Empirical Study of Text-based Passwords and Their Users

Text-based passwords are the most commonly used mechanism for authenticating users to computer systems, but are often easy for attackers to compromise. To mitigate the danger of such attacks, system administrators use password-composition policies, which force newly created passwords to adhere to a set of requirements intended to make them harder to guess.


Visible to the public TC: Small: Collaborative Research: Membership Inference in a Differentially Private World and Beyond

The objective of the proposed research is to systematically understand, evaluate and contribute towards the problem of membership inference in aggregate data publishing, a generic, novel, and dangerous privacy threat in a wide variety of real-world applications. The main idea proposed to address the problem of membership inference is an information-theoretic model of privacy disclosure as a noisy communication channel.