Search Projects: Group Project, March, 2018

Results 41 - 50 of 159

Results

group_project

Visible to the public TC: Small: Collaborative Research: Strengthening Forensic Science for Network Investigations

The standard instrumentality for the criminal acquisition and distribution of images and video of child sexual exploitation is peer-to-peer (p2p) networks. Over 160,000 users based in the US are sharing child pornography (CP) using Gnutella alone. Past studies have found that: 21% of CP possessors had images depicting sexual violence to children such as bondage, rape, and torture; 28% had images of children younger than 3 years old; and that 16% of investigations of CP possession ended with discovery of persons who directly victimized children.

group_project

Visible to the public TC: Small: Collaborative Research: Improved Privacy though Exposure Control

With the advent of sensor-rich mobile devices such as smartphones, an increasing number of people are sharing personal "contextual" information like location, activity, and health/fitness information with members of their social network. To enhance privacy for people sharing such information, a large body of research has focused on ways for users to specify who should be authorized to access their information. This research improves end-user privacy by addressing the related question of "Who is accessing my information and to what extent?".

group_project

Visible to the public TC: Small: Collaborative: Protocols for Privacy-Preserving Scalable Record Matching and Ontology Alignment

Many application domains, such as intelligence, counter-terrorism, forensics, disease control, often need to cross-match multiple very large datasets, such as watch lists. Because those datasets may contain privacy-sensitive or confidential information, the use of efficient privacy-preserving protocols for cross-matching different datasets is crucial. The problem of privacy-preserving record matching has been addressed by the use of Secure Multi-party Computation (SMC) protocols. Under these protocols, the data are converted to series of functions with private inputs.

group_project

Visible to the public TC: Small : Privacy-Aware Design Strategies for Mobile Communications and Computing

The objective of this research program is the development of privacy-aware design practices for information networks. The program is based on the recognition that an information network that collects personal information about its users can have both technical and moral implications, creating serious downstream consequences to the individual and to society. This program establishes the moral obligations of systems designers to protect consumers, creates rules and algorithms for technical designs that protect consumers?

group_project

Visible to the public TC: Small: Trustworthy Distribution and Retrieval Network

This research addresses the trustworthy distribution and retrieval of information across the Internet. Specifically, it concerns the distribution of metadata and requests, the matching of requests and metadata, and the retrieval of information corresponding to the metadata. In the Internet today, this functionality is provided by centralized search engines and search indexes. However, such centralized mechanisms can be easily subverted to prevent the distribution and retrieval of information.

group_project

Visible to the public TC: Small: EDICT: Evaluation and Design of IC's for Trustworthiness

High cost differentials are causing many steps of IC manufacturing to increasingly move overseas. This project considers the problem of evaluating trustworthiness of digital ICs fabricated by untrusted vendors who may insert hardware Trojans. The proposed EDICT framework (Evaluation and Design of IC's for Trustworthiness) tackles two main challenges, namely the unavailability of a gold-standard chip combined with high process variations, and the fact that Trojans are introduced by intelligent adversaries.

group_project

Visible to the public TC: Small: LockBox: Enabling Users to Keep Data Safe

Modern computer security requires bug-free code at every layer of the software stack. But in a world where operating systems and hypervisors are increasingly buggy, it can be dangerous to assume these components are trustworthy. LockBox provides an additional layer of security such that if the operating system or other system management software fails, certain portions of the system remain resistant to attack.

group_project

Visible to the public TC: Small: Collaborative Research: Symbiosis in Byzantine Fault Tolerance and Intrusion Detection

Two principal components for providing protection in large-scale distributed systems are Byzantine fault-tolerance (BFT) and intrusion detection systems (IDS). BFT is used to implement strictly consistent replication of state in the face of arbitrary failures, including those introduced by malware and Internet pathogens. Intrusion detection relates to a broad set of services that detect events that could indicate the presence of an ongoing attack. IDSs are far from perfect -- they can both miss attacks or misinterpret events as being malicious.

group_project

Visible to the public TC: Small: Collaborative Research: Strengthening Forensic Science for Network Investigations

The standard instrumentality for the criminal acquisition and distribution of images and video of child sexual exploitation is peer-to-peer (p2p) networks. Over 160,000 users based in the US are sharing child pornography (CP) using Gnutella alone. Past studies have found that: 21% of CP possessors had images depicting sexual violence to children such as bondage, rape, and torture; 28% had images of children younger than 3 years old; and that 16% of investigations of CP possession ended with discovery of persons who directly victimized children.

group_project

Visible to the public TC: Small: Trustworthy Mobile Sensing

Consumer mobile devices such as smartphones have been proposed for use in a wide range of settings, including citizen journalism, citizen science, and domestic eldercare. Re-purposing consumer devices in these domains is appealing because consumer devices offer a low-cost, highly-scalable platform for mobile sensing that can expand coverage and reduce costs.