Search Projects: Group Project, March, 2018

Results 151 - 159 of 159



Visible to the public TWC: Small: Extensible Web Browsers and User Privacy

Modern Web browsers provide a "private browsing" mode, wherein the browser does not record the user's behavior such as which sites they visited. This mode is valuable to users of all stripes, from the privacy-conscious to those those worried about persecution by totalitarian regimes. Browser implementers therefore take great care to try to ensure these modes function correctly. However, modern browsers are highly extensible: users can install extensions to customize their browser, and millions have done so.


Visible to the public TWC: Small: Abstract Semantic Processing for Script Security

Much of the internet's business is conducted with dynamically generated documents --- HTML pages, SQL queries, and execution scripts --- that are generated on-the-fly by document-generator scripts written in PHP, Javascript, and JSP. The situation is a threat to internet security because the document-generator scripts are often faulty, generating malformed documents that are vulnerable to attackers.


Visible to the public Student Travel Support for IEEE Symposium on Security and Privacy 2012

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. The students, supported by this travel award, are provided a unique opportunity to participate in this symposium and a forum in which to meet and interact with the leading international researchers in cyber security. This research experience will encourage these promising graduate students to pursue careers in cyber security.


Visible to the public EAGER: Outsourcing and Automating Cryptography in the Cloud

As the amount of digital information explodes, two new trends are emerging. First, data is increasingly being stored and managed in the "cloud", an untrusted trove of computing power and storage space for rent. Second, computer devices (e.g., cars, cell phones, medical implants) are everywhere and continuously exchanging messages.


Visible to the public EAGER: Collaborative Research: Towards Context-Aware Security and Privacy for RFID Systems

Despite their increasingly ubiquitous deployment, RFID systems are plagued with a wide variety of security and privacy threats. A large number of these threats arise due to the tag?s promiscuous response to any reader requests. This renders sensitive tag information easily subject to unauthorized reading. It also incites different forms of relay attacks whereby a colluding pair, by relaying information between a legitimate tag and reader, can successfully impersonate the legitimate tag without actually possessing it.


Visible to the public TC: Small: THWART: Trojan Hardware in Wireless ICs - Analysis and Remedies for Trust

Towards enhancing trustworthiness of wireless integrated circuits, this project investigates the problem of hardware Trojans in the analog/RF domain. Hardware Trojans are maliciously-intended modifications to fabricated integrated circuits, making them capable of additional functionality which is unknown to the designer and user, but which can be exploited by the perpetrator after chip deployment to sabotage or incapacitate it, or to steal sensitive information.


Visible to the public EAGER: Man-at-the-End Attacks: Defenses and Evaluation Techniques

This research considers a scenario in which a piece of software needs to be protected against an attacker (the man-at-the-end, MATE) who has physical access to the software and so is able to inspect, modify, and execute it. The goal is to prevent the attacker from extracting sensitive information from the software, to prevent him from making changes to the behavior of the software, or, at least, to detect and report when such attacks are underway.


Visible to the public EAGER: Towards Next Generation Anonymous Communication Networks

Anonymous communication has received increasing attention in the past decade because of concerns on privacy issues of communication through the Internet. Although these existing anonymous communication networks can greatly help protect communication privacy, these networks, especially the low-latency anonymous communication networks, are vulnerable to a number of traffic analysis attacks.


Visible to the public CT-ISG: Collaborative Research: Towards Trustworthy Database Systems

Answers to database queries often form the basis for critical decision-making. To improve efficiency and reliability, answers to these queries can be provided by distributed servers close to the querying clients. However, because of the servers' ubiquity, the logistics associated with fully securing them may be prohibitive; moreover, when the servers are run by third parties, the clients may not trust them as much as they trust the original data owners. Thus, the authenticity of the answers provided by servers in response to clients' queries must be verifiable by the clients.