Search Projects: Group Project, June, 2018

Results 31 - 40 of 43

Results

group_project

Visible to the public CAREER: Tolerating Access Control Misconfiguration

Access control is a multi-faceted area that has been advanced by a wide range of computer science research communities including programming languages, human-computer interaction, computer

architecture, and operating systems. In general, this body of work has either sought to improve the expressiveness of access control logic or introduce novel mechanisms for enforcing policies. Each

group_project

Visible to the public CAREER: Secure Multi-Party Protocols

In this project we design efficient secure algorithms for various multi-party protocol tasks. The protocols must be provably secure based on well-understood cryptographic assumptions, they need to satisfy requirements imposed by the real-world applications of these protocols, and they need to be efficient enough to be usable in practice.

group_project

Visible to the public CyberTrust Center: Security Through Interaction Modeling (STIM)

Computer misuse is often easier to recognize in particular instances than it is to specify in general, and is highly sensitive to experience and context. Nevertheless, few computer security technologies, if any, adequately utilize models of experience and context in defending against misuse. This research explores the thesis that many computer defenses can be dramatically improved, in both efficacy and usability, by modeling experience and context in a way that allows the models to become an integral element for defending the system.

group_project

Visible to the public Collaborative Research: CT-T: Cryptographic Techniques for Searching and Processing Encrypted Data

In this proposal we consider the question of what constitutes identities in cryptography. Typical examples of identities include your name and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-revoked) Public-Key coming from some trusted public-key infrastructure. In many situations, however, where you are defines your identity. For example, we know the role of a bank-teller behind a bullet-proof bank window not because he or she shows us her credentials but by merely knowing her location.

group_project

Visible to the public An In-Depth Study of Homomorphic Encryption in Cryptography

In today's digital age almost all aspects of both federal and commercial day-to-day operations are cyber-based. This heavy reliance on cyber-infrastructure requires security, as without security modern networks are susceptible to both internal and external attacks. This project will result in the advancement of our state of knowledge and our understanding of a number of fundamental cryptographic tasks needed for securing cyber-infrastructure.

group_project

Visible to the public CT-ISG: Population Studies in Computer Security via DNS Monitoring

This project seeks to understand and analyze the global demography of cybersecurity threats and solutions. It is structured as a population study, in three majors parts. First, a real time monitoring infrastructure captures a new dataset on the population characteristics of malicious software, and of security tools, as they are actually found across the world.

group_project

Visible to the public Collaborative Research: CT-M: Hardware Containers for Software Components

This project focuses on hardware features to improve the security of software systems. By refining the coarse-grained protections available in today's architectures, the project will aim to protect the integrity of individual software objects or components.The hardware mechanisms force tight controls on the execution of software components, which programmers can define to be as large as entire applications or as small as individual objects. The goal is to rapidly detect and also recover from attacks that improperly access memory or take over the CPU.

group_project

Visible to the public Collaborative Research: CT-M: Hardware Containers for Software Components - Detection and Recovery at the Hardware/Software Interface

This project focuses on hardware features to improve the security of software systems. By refining the coarse-grained protections available in today's architectures, the project will aim to protect the integrity of individual software objects or components. The hardware mechanisms force tight controls on the execution of software components, which programmers can define to be as large as entire applications or as small as individual objects. The goal is to rapidly detect and also recover from attacks that improperly access memory or take over the CPU.

group_project

Visible to the public CT-ISG: Power to the People: Tools for Explaining Access-Control Consequences

Without their realizing it, end-users have been turned into authors of access-control policies. Everywhere from Google to Facebook to Microsoft HealthVault and beyond, these policies are usually hidden behind simple user interfaces, but ultimately the users are responsible for setting and then taking responsibility for the consequences of these policies. Indeed, the apparent simplicity of the interfaces sometimes belie the significance of the outcomes.

group_project

Visible to the public CT-ISG: Power to the People: Tools for Explaining Access-Control Consequences

Without their realizing it, end-users have been turned into authors of access-control policies. Everywhere from Google to Facebook to Microsoft HealthVault and beyond, these policies are usually hidden behind simple user interfaces, but ultimately the users are responsible for setting and then taking responsibility for the consequences of these policies. Indeed, the apparent simplicity of the interfaces sometimes belie the significance of the outcomes.