Search Projects: Group Project, 2018

Results 51 - 60 of 874

Results

group_project

Visible to the public CT-ISG: COLLABORATIVE RESEARCH: SecureWORM: Strong Regulatory-Compliant Storage

Digital societies and markets increasingly mandate consistent procedures for the access, processing and storage of information. In the United States alone, over 10,000 such regulations can be found in financial, life sciences, health-care and government sectors, including the Gramm-Leach-Bliley Act, Health Insurance Portability and Accountability Act, and Sarbanes-Oxley Act.

group_project

Visible to the public CT-ISG: Alternate representation of NIDS/NIPS signatures for fast matching

Network intrusion prevention systems (IPSes) play an important role in protecting computers against attacks originating from thenetwork. Signature matching is a performance-critical operation that each IPS must perform: after storing a reassembled TCP-level byte stream or a field of a higher level protocol in a buffer, the IPS needs to decide whether it matches any of the signatures that describe known attacks. This project investigates methods for representingsignatures that allow fast matching, require little memory, and can support complex signatures expressed as regular expressions.

group_project

Visible to the public CT-ISG: BIRT - Biometric Identification Red Team

The BIRT methodology will aid biometric system designers in making effective refinements in their systems. The measurement of biological characteristics (biometrics) such as fingerprints and facial images provides a means of identification that neither needs to be carried nor remembered. Evaluation of biometrics has traditionally been focused on the ability of biometric systems to identify members from a population, e.g., for purposes of authentication.

group_project

Visible to the public COLLABORATIVE RESEARCH: CT-ISG - A Context-Aware Approach to the Design and Evaluation of Privacy Preservation Techniques in Location-Based Services

Privacy protection challenges arising from location-based services (LBS) are critical to users as well as service providers. This project concentrates on designing and evaluating privacy protection techniques in LBS. The important departure of this project from the existing research is in its emphasis of the role of request contexts. A context refers to the external information/knowledge that the attacker may use, together with the requests themselves, to gain user private information.

group_project

Visible to the public Collaborative Research: CT-ISG: Efficient Cryptography Based on Lattices

Only two number-theoretic assumptions --- hardness of factoring and of computing discrete logarithms --- underlie essentially all public-key cryptosystems in widespread use today. For lower-level primitives such as hash functions, random number generators, and stream ciphers, the situation is even worse: existing provably-secure constructions are too inefficient to compete with practical alternatives such as SHA-1 or AES, and so the primitives in use today have no rigorous justification for their security.

group_project

Visible to the public CT-T: Keystroke Forensics - Fingerprints in the CyberWorld

This research asks, "What is the cyber-equivalent of a fingerprint -- that staple of forensic investigation in the physical world?" If one is able to identify users forensically by their "fingerprints" in cyberspace, what would correspond to the familiar loops, whorls and minutiae of physical evidence? It is hypothesized that just as a person may be identified by his handwriting, or by his manner of expression in prose, so may a person be identified by his typing style -- the particular rhythm of a user's keystrokes.

group_project

Visible to the public CT-ISG: Collaborative Research: Non-bypassable Kernel Services for Execution Security

Society is dependent on many engineered systems whose increasing complexity and inter-connectedness have, in turn, increased their vulnerability to adversarial attacks. In many of these systems, protecting the execution of their computations is as crucial as ensuring the security of their data. This research investigates how to maintain survivable operation of such systems, even in the face o finvasive attacks where computations are intentionally subverted to interfere with other computations' execution constraints.

group_project

Visible to the public CT-ISG: Collaborative Research: A Framework for the Modeling and Management of Obligations in Security Policies

The correct behavior and reliable operation of an information system relies not only on what users are permitted to do, but often times on what users are required to do. Such obligatory actions are integral to the security procedures of many enterprises. The management of obligations in security policies imposes significant technical challenges since obligations bear quite different properties from traditional access control. For example, obligations assigned to users often cannot be enforced.

group_project

Visible to the public CT-ER: A Framework for Live Security Exercises and Challenges

Computer security is a critical issue that affects our everyday life. For this reason, most colleges and other educational institutions are devoting an increasing amount of resources to develop courses and curricula that involve security training. Typical courses include cryptography, general computer security, network security, and specialized topics, such as security of wireless networks and web security.

group_project

Visible to the public CT-ISG: Improving System Security with a Compiler-based Virtual Machine for Operating System Kernels

The Secure Virtual Architecture (SVA, formerly called LLVA forlow-level virtual architecture) project is developing a novel framework to improve operating system security and reliability. The two broad goals of the project are (a) to develop a compiler-enforced virtual machine that is safe, low-level, efficient, and capable of hosting a standard C/C++-based operating system and all its applications; and (b) to investigate how this organization can improve overall system security and provide new security capabilities.