Search Projects: Group Project, March, 2018

Results 31 - 40 of 159

Results

group_project

Visible to the public TC: Small: Collaborative Research: Provable Security from Group Theory and Applications

Information technology is an established component of the infrastructure of modern societies, and cryptography is a cornerstone of information security. Provable security quantifies the resilience of cryptographic constructions to attacks. This quantification is often relative to the hardness of a handful of reference "intractable" problems like integer factorization. Because of the intrinsic strength of heterogeneity, diversifying the set of intractable problems enhances the robustness of the overall structure.

group_project

Visible to the public TWC: Small: Redesigning Mobile Privacy: Helping Developers to Protect Users

The objective of this project is to help developers in making applications? usage of personal information transparent to mobile phone users, system integrators, and other evaluators. Recent well-publicized mobile privacy incidents have demonstrated all these parties have lost count of what information mobile devices collect, store, and transmit. A successful project would lead to improved privacy and application transparency, and would help prevent future privacy compromises. Project results could be adopted into mobile operating systems and could guide FTC policy on mobile privacy.

group_project

Visible to the public TC: Small: Increasing The Cost of Malware

As seen by the proliferation of commercial-grade malware, attacking networked applications is a profitable enterprise. There are two advantages malware authors currently have against us. The first advantage is that because users run a diverse set of applications on their systems, anti-virus and anti-malware programs must exhaustively search for specific malware instances across all pieces of software on a system.

group_project

Visible to the public EAGER: TC: Collaborative Research: Experimental Study of Accountability in Existing Anonymous Networks

To stop anonymous tools designed for free speech from being abused by criminals, this project investigates practical solutions to trace back criminals while support free speech for benign users, by exploiting two unique perspectives. First, it utilizes the resource advantages of law enforcement to explore the limitations of anonymous tools. As criminals operated from remote locations usually do not have resources to build large-scale systems, they have to rely on existing anonymous tools with third-party resources to hide their traces.

group_project

Visible to the public TWC SBES: Medium: Collaborative: Evolutionary Approaches to Privacy and Information Security

The project explores the influence that offline cues and stimuli, indicating the presence of other human beings in the physical world, and often processed unconsciously by our brains, can have over security and privacy behavior in cyberspace.

group_project

Visible to the public TWC: Small: Critter@home: Content-Rich Traffic Trace Repository from Real-Time, Anonymous, User Contributions

There are very few publicly available network traces that contain application-level data, because of the enormous privacy risk that sharing such data creates. Application-level data is rich with personal and private information, such as human names, social security numbers, etc. that criminals can monetize. Yet such data is necessary for realistic testing of research products, and for understanding trends in the domain of networking and network applications.

group_project

Visible to the public TC: Small: Collaborative Research: User-Centric Privacy Control for Collaborative Social Media

Social-networking sites (e.g., Facebook, MySpace, LinkedIn, etc.) and other online collaborative tools have emerged as places where people can post and share information. This information-sharing has many benefits, ranging from practical (e.g., sharing a business document) to purely social (e.g., communicating with distant friends). At the same time, information sharing inevitably poses significant threats to user privacy. In social-networking sites, for example, documented threats range from identity theft to digital stalking and personalized spam.

group_project

Visible to the public TC: Small: Enemies from Within: Thwarting Sophisticated Insider Attacks in Wireless Networks

Wireless networks are inherently vulnerable to external and internal network attacks, due to the open nature of the wireless medium and the poor physical security of wireless devices. While external attacks can be neutralized through a combination of cryptography-based measures and robustness mechanisms, internal attacks, which are launched from compromised nodes, are much more sophisticated in nature.

group_project

Visible to the public TC: Small: Collaborative Research: Accountability and Identifiability

The World Wide Web and other networked information systems provide enormous benefits by enabling access to unprecedented amounts of information. However, for many years, users have been frustrated by the fact that these systems also create significant problems. Sensitive personal data are disclosed, confidential corporate data are stolen, copyrights are infringed, and databases owned by one government organization are accessed by members of another in violation of government policy.

group_project

Visible to the public TC-Small-Virtual Machine Introspection-based Live Forensics for Detection of Malicious Software

Modern malware is used extensively in computer crime and cyber-warfare and poses a serious threat to the cyber-infrastructure of the United States, at the military, civil, and corporate levels. Malware can employ a number of techniques to gain access to needed resources and to prevent detection, including hooking or modifying system calls, adding new system calls, inserting new kernel modules, and directly patching kernel code.