Search Projects: Group Project, March, 2018

Results 21 - 30 of 159

Results

group_project

Visible to the public Coordinated Machine Learning-Based Vulnerability & Security Patching for Resilient Virtual Computing Infrastructure

This research aims at aiding administrators of virtualized computing infrastructures in making services more resilient to security attacks through applying machine learning to reduce both security and functionality risks in software patching by continually monitoring patched and unpatched software to discover vulnerabilities and triggering proper security updates.

group_project

Visible to the public CT-ISG: User-Aided Secure Association of Wireless Devices

The popularity of personal gadgets opens up many new services for ordinary users. Many everyday usage scenarios involve two or more devices "working together". (Emerging scenarios are beginning to involve sensors and personal RFID tags.) Before working together, devices must be securely "paired" to enable secure and private communication.

group_project

Visible to the public TC: Small: RUI: Digital Laser Microscopy Analysis of Active, Altered, and Damaged Storage Media for Security and Digital Forensic Recovery

Digital storage media failure is a common occurrence, but an understanding of the mechanisms for the failure can be elusive and have far reaching implications. This project utilizes a digital laser microscope to investigate the impact of physical and environmental manipulation of digital storage media on failure rates and data recoverability. This investigation into the physical characteristics of digital media is establishing failure thresholds and their suitability for data recovery.

group_project

Visible to the public TC: Small: Collaborative Research:Accountability and Identifiability

The World Wide Web and other networked information systems provide enormous benefits by enabling access to unprecedented amounts of information. However, for many years, users have been frustrated by the fact that these systems also create significant problems. Sensitive personal data are disclosed, confidential corporate data are stolen, copyrights are infringed, and databases owned by one government organization are accessed by members of another in violation of government policy.

group_project

Visible to the public TC: Small: Securing the Router Infrastructure of the Internet

The Internet represents essential communication infrastructure that needs to be protected from malicious attacks. Many existing attacks and corresponding defense mechanisms have focused on the computers connected to the Internet rather than the network infrastructure itself. However, the network can also be attacked since modern network components use software and hardware components that can exhibit vulnerabilities that have not been previously studied.

group_project

Visible to the public EAGER: Exploring the Security Capabilities of Physical Layer Network Coding

As the use of mobile, wireless computing devices continues to grow, so does concern with assuring that communications within these wireless networks is not vulnerable to various kinds of attacks. Physical-layer Network Coding (PNC) was developed as a means for improving communication in wireless networks. This project will conduct exploratory research to determine whether and how the use of PNC can be exploited to detect attacks. The work is organized into three tasks.

group_project

Visible to the public TC: Small: Homomorphic Encryption for Cloud Privacy

This project applies tools from homomorphic encryption to improve security in cloud services. Cloud computing saves money for companies by allowing them to pay for services only if they need them and just at the time that such services are needed, rather than purchasing and maintaining hardware/software that may see little use. The drive to gain these savings may transform both business and personal computing. This new level of resource sharing and complexity naturally generates new problems related to security and privacy, problems that are both novel and challenging.

group_project

Visible to the public TTP: Small: NFS4Sec: An Extensible Security Layer for Network Storage

The Network File System (NFS) is a popular method for computers to access files across networks. The latest major version of this IETF protocol, version 4, is widely accepted and includes numerous new features to improve security, performance, and usability when used over wide-area networks.

group_project

Visible to the public  SBES: Medium: Investigating the Role of Distrust in Unauthorized Online Activities Using an Integrated Sociotechnical Approach

Unauthorized online behavior motivated by social, political, economic and cultural (SPEC) conflicts is increasing. However, research dealing with cyber-attacks has tended to be reactive and to focus on defense, instead of proactive and focused on the root psychological and social causes of such attacks. Despite considerable evidence that trust and distrust impact rule-following behaviors and obedience to the law, little research investigates the role of distrust in promoting unauthorized online behaviors.

group_project

Visible to the public TC: Small: Collaborative Research:Models and Techniques for Enterprise Network Security Metrics

This research investigates efficient and effective quantitative risk analytics methods for enterprise network security. The research uses attack graphs, a widely used and well-tested technique for enterprise network security analysis, as the foundation to build a metric model. It aims to produce a theoretically sound model with extensive empirical evaluation on continuous fresh data from production networks.