Search Projects: Group Project, 12 Jun 2018

Results 1 - 10 of 25

Results

group_project

Visible to the public CT-ISG: Collaborative Research: Non-bypassable Kernel Services for Execution Security

Society is dependent on many engineered systems whose increasing complexity and inter-connectedness have, in turn, increased their vulnerability to adversarial attacks. In many of these systems, protecting the execution of their computations is as crucial as ensuring the security of their data. This research investigates how to maintain survivable operation of such systems, even in the face o finvasive attacks where computations are intentionally subverted to interfere with other computations' execution constraints.

group_project

Visible to the public CT-ISG: Collaborative Research: A Framework for the Modeling and Management of Obligations in Security Policies

The correct behavior and reliable operation of an information system relies not only on what users are permitted to do, but often times on what users are required to do. Such obligatory actions are integral to the security procedures of many enterprises. The management of obligations in security policies imposes significant technical challenges since obligations bear quite different properties from traditional access control. For example, obligations assigned to users often cannot be enforced.

group_project

Visible to the public CT-ER: A Framework for Live Security Exercises and Challenges

Computer security is a critical issue that affects our everyday life. For this reason, most colleges and other educational institutions are devoting an increasing amount of resources to develop courses and curricula that involve security training. Typical courses include cryptography, general computer security, network security, and specialized topics, such as security of wireless networks and web security.

group_project

Visible to the public CT-ISG: Improving System Security with a Compiler-based Virtual Machine for Operating System Kernels

The Secure Virtual Architecture (SVA, formerly called LLVA forlow-level virtual architecture) project is developing a novel framework to improve operating system security and reliability. The two broad goals of the project are (a) to develop a compiler-enforced virtual machine that is safe, low-level, efficient, and capable of hosting a standard C/C++-based operating system and all its applications; and (b) to investigate how this organization can improve overall system security and provide new security capabilities.

group_project

Visible to the public CAREER: Foundational Theories and Enforcement Tools for Secure Software Systems

This project addresses the problem that, to be trustworthy yet practical, mechanisms for enforcing software security must (1) undergo rigorous analysis that provides formal security guarantees and (2) be developed quickly. The project addresses this problem by creating (1) formal, foundational theories of software security and (2) convenient tools for quickly generating provably sound enforcement mechanisms.

group_project

Visible to the public CAREER: Protecting Privacy in Untrusted Environments

Information about individuals and organizations is increasingly collected in massive databases, sent over public networks and shared across organizational boundaries. This presents serious threats to privacy: even if individual pieces of data are cryptographically protected, sensitive information may still leak out due to mismatches between privacy policies of different components. This project aims to develop tools and techniques for protecting privacy of sensitive data, focusing on three main research thrusts.

group_project

Visible to the public CAREER: Flexible Multi-Core Substrate for Trustworthy Computing Systems

Multi-core architecture with 4 to 8 cores on a die is a reality today and future generations of processors are expected to contain even more cores per chip. This project targets to realize the full potential of large-scale multi-core processors as a secure and trustworthy computing substrate. First, in "many-core" processors, the availability of a large number of processing elements together with constraints on power consumption alleviates the need for heavy time-sharing of resources, which often results in various types of side-channels.

group_project

Visible to the public CAREER: Non-Conventional Solutions for Ensuring Security in Cognitive Radio Networks

The PHY and MAC layers of cognitive radio networks are very different from those of conventional wireless networks. The distinguishing attributes of cognitive radio networks such as cooperative spectrum sensing, on-demand spectrum contention, incumbent- and self-coexistence mechanisms, and spectrum etiquette mechanisms raise new security implications that have not been studied previously.

group_project

Visible to the public CAREER: Collaborative Optimization with Limited Information Disclosure

With the rapid increase in computing, storage and networking resources, data is not only collected and stored but also analyzed. This creates a serious privacy problem which often inhibits the use of this data. This project explores the problem of performing optimization analysis over distributed data without conflicting with privacy and security concerns. This is especially challenging due to the complexity and iterative nature of the solutions.

group_project

Visible to the public CAREER: Securing Active Information

When multiple parties attempt to collaborate, they often end up having to compromise the confidentiality of their private information. Cryptographic primitives like secure multiparty computation and obfuscation are aimed at mitigating this situation.