Search Projects: Group Project, 2018

Results 31 - 40 of 874

Results

group_project

Visible to the public Collaborative Research: CT-T: Towards a More Accountable Internet

The goal of this project is to design, implement, and test an internetwork architecture called the Accountable Internet Protocol (AIP). AIP retains much of the elegance and simplicity of IP, but is far better equipped to thwart malicious adversaries. To provide this protection, AIP incorporates three kinds of accountability: source accountability, control-plane accountability, and dataplane accountability. Together, these three forms of accountability ensure that any host, router, and autonomous network can identify misbehaving components.

group_project

Visible to the public Computational Cybersecurity in Compromised Environments (C3E) Workshop Support

The Computational Cybersecurity in Compromised Environments (C3E) is a community of interest that has annually gathered, since its inception in 2009, to address some of the most arduous challenges of cybersecurity. Through these annual workshops, organizers bring together a diverse group of top academic, commercial, and government experts to discuss innovative approaches to the cybersecurity challenges facing our Nation. This travel grant will support an estimated twenty-five travelers to the 2014 C3E workshop.

group_project

Visible to the public CT-M: Realizing Verifiable Security Properties on Untrusted Computing Platforms

This project is motivated by the fundamental question of whether it is possible to achieve verifiable end-to-end security properties by adding suitable security mechanisms on top of commercially available applications executing on an untrusted computing platform. A concrete example of such a scenario is provided by a user interacting with a bank's web server using a web browser running SSL.

group_project

Visible to the public CRII: SaTC: Hardware based Authentication and Trusted Platform Module functions (HAT) for IoTs

Crucial and critical needs of security and trust requirements are growing in all classes of applications such as in automobiles and for wearable devices. Traditional cryptographic primitives are computation-intensive and rely on secrecy of shared or session keys, applicable on large systems like servers and secure databases. This is unsuitable for embedded devices with fewer resources for realizing sufficiently strong security. This research addresses new hardware-oriented capabilities and mechanisms for protecting Internet of Things (IoT) devices.

group_project

Visible to the public TWC: Small: Collaborative: Towards Privacy Preserving Online Image Sharing

On-line sharing of images has become a key enabler of users' connectivity. Various types of images are shared through social media to represent users' interests and experiences. While extremely convenient and socially valuable, this level of pervasiveness introduces acute privacy concerns. First, once shared images may go anywhere, as copying / resharing images is straightforward. Second, the information disclosed through an image reveals aspects of users' private lives, affecting both the owner and other subjects in the image.

group_project

Visible to the public SaTC: TTP: Medium: Collaborative: RESULTS: Reverse Engineering Solutions on Ubiquitous Logic for Trustworthiness and Security

Due to the globalization of the integrated circuit (IC) supply chain, the reduction of manufacturing costs and the need for shorter time to market, commercial-off-the-shelf ICs are now prevalent in modern electronic systems. However, the wide usage of such components breeds major security and trust concerns. Validating the security and trustworthiness of these components is extremely challenging since the end user does not have access to the design details.

group_project

Visible to the public CRII: SaTC: Automated Proof Construction and Verification for Attribute-based Cryptography

This project develops a comprehensive proof construction and verification framework for a well-defined class of cryptographic protocols: attribute-based cryptosystems. In particular, existing automated proof construction and verification frameworks, such as EasyCrypt and CryptoVerif, are extended to provide support for attribute-based cryptography. The extensions consist of libraries of simple transformations, algebraic manipulations, commonly used abstractions and constructs, and proof strategies, which will help in generation and verification of proofs in attribute-based cryptography.

group_project

Visible to the public CIF:Small:Collaborative Research:Security in Dynamic Environments: Harvesting Network Randomness and Diversity

The project aims at quantifying a general network's inner potential for supporting various forms of security by achieving secret common randomness between pairs or groups of its nodes. Statistical and computational secrecy measures are being considered against a general passive adversary. Common-randomness-achieving protocols are classified into two groups: culture-building and crowd-shielding. The former achieves common randomness between nodes situated in close proximity of each other, from correlated observations of specific (natural or induced) network phenomena.

group_project

Visible to the public SHF: Medium: PRISM: Platform for Rapid Investigation of efficient Scientific-computing & Machine-learning

Today's systems demand acceleration in processing and learning using massive datasets. Unfortunately, because of poor energy scaling and power limits, performance and power improvements due to technology scaling and instruction level parallelism in general-purpose processors have ended. It is well known that full custom, application-specific hardware accelerators can provide orders-of-magnitude improvements in energy/op for a variety of application domains.

group_project

Visible to the public CT-T: Modeling and Analyzing Trust in Service-Oriented Architectures

Service-oriented architectures (SOAs) enable the dynamic integration of services implemented on heterogeneous computer systems. An advantage of SOAs is that they provide high-level, semantically-rich services by abstracting the low-level details of their implementation. The availability of useful services such as Google's and Amazon's web service APIs has fostered applications that integrate a number of services to provide novel, more complex functionality.