Search Projects: Group Project, May, 2018

Results 31 - 40 of 42

Results

group_project

Visible to the public CT-ISG: Collaborative Research: Key Generation from Physical Layer Characteristics in Wireless Networks

This project focuses on the development of a new class of secret key generation and renewal algorithms for securing wireless networks by taking advantage of physical layer characteristics. The basis of the approach is the identification of measurable quantities of the wireless channel between a pair of nodes that are highly correlated exclusively between them (albeit not identical).

group_project

Visible to the public CT-ISG: Collaborative Research: Tamper Proofing Cryptographic Operations

This research project focuses on the development of cryptographic mathematical models and constructions that address realistic security requirements at the implementation level. This is a fundamental problem as cryptographic security formalisms are often criticized for lack of relevance given the wide range of attacks available at the implementation level.

group_project

Visible to the public CT-ISG Collaborative Research: Trusted Cooperative Transmission: Turning a Security Weakness into a Security Enhancement

Cooperative transmission is an emerging wireless communication paradigm that improves wireless channel capacity by creating multi-user cooperation in the physical layer. In cooperative transmission, when the source node transmits a message to the destination node, the nearby nodes that overheard this transmission will "help" the source and destination by relaying the replicas of the message, and the destination will combine the multiple received waveforms so as to improve the link quality.

group_project

Visible to the public Collaborative Research: CT-ER MiMANSaS: Metrics, Models and Analysis of Network Security and Survivability

Information and Communications Technology (ICT) infrastructure failures and cyber attacks are realities that can have catastrophic societal effects. Information Assurance (IA) can be defined as the operations undertaken to protect and defend ICT systems by ensuring their dependability and security. There is a critical need for systematic IA methods that enable ICT systems to adapt and survive any type of disruption or attack. A major hurdle in the development of IA techniques is the lack of models and metrics which enable one to determine the effectiveness of IA mechanisms.

group_project

Visible to the public CT-ISG: Collaborative Research: Fault Tolerance in Crypto Hardware via Dynamic Assertion Checking

Secure applications require trustworthy hardware for successful deployment. A trustworthy hardware device (e.g., a smart card) should maintain its security properties even against efforts at probing and reverse engineering; moreover, sensitive data stored on a trustworthy hardware device should be protected at all times. Side-channels attacks are used to learn the secrets stored by a device through monitoring the side effects of its computation. The well known power side-channel attack uses the effect that a cryptographic key has on the power waveform as the cipher runs.

group_project

Visible to the public CT-M: Collaborative Research: Securing Dynamic Online Social Networks

Considering the popularity and wide adoption of social network systems and the competitive edge these systems provide, there has been a rapid growth in use of these systems to access, store, and exchange personal attribute information in distributed and/or federated environments and this trend is expected to continue. Efficient, secure, and user-centric techniques are important for the successful deployment of such systems.

group_project

Visible to the public CT-M: Usable Security for Digital Home Storage

This project explores an architecture, mechanisms, and interfaces for helping users manage access control in the digital home. The home is a challenging, yet critical, target for usable security. It requires abstractions that are intuitive for laypeople, interfaces that allow users to manipulate those abstractions, and access-control and storage infrastructure that can support the abstractions.

group_project

Visible to the public CT-M: Understanding the Underground Economy

Recent years have witnessed a dramatic change in the goals and modus operandi of malicious hackers. In particular, hackers realized the potential monetary gains associated with Internet fraud. As a result, there has been an integration of sophisticated computer attacks with well-established fraud mechanisms devised by organized crime. This process has created a vibrant underground economy. Recent research has mostly focused on the visible aspects of the underground economy, such as botnets, spam, and phishing.

group_project

Visible to the public CT-M: Implementable Privacy and Security for Resource-Constrained Devices

A variety of emerging microelectronics applications target portable systems with tight constraints on the related metrics of power, form factor, and longevity. For many of these applications, there are severe constraints on the energy consumption for the electronics in the system. In particular, passive RFID tags rely on power received from readers so low power consumption is necessary to enable long-range reads.

group_project

Visible to the public CT-M: Meta-Environments for Experiments on Diverse Topics in Network Security

In order to address the continued escalation in the diversity, sophistication and quantity of malicious activity in the Internet, new methods for systematic testing and evaluation of next generation security systems and techniques are required. The objective of this research is to investigate and develop meta-environments for Emulab-based testbeds. A meta-environment is a set of testbed configurations, tools and processes developed for a specific security domain that enables experiments to be conducted in a simplified, realistic and consistent fashion.