Search Projects: Group Project, 2018

Results 81 - 90 of 874

Results

group_project

Visible to the public CT-ISG: An Architecture and Policies for Secure Network-facing Applications

The near ubiquity of Internet access has put a wealth of information and ever-increasing opportunities for social interaction at the fingertips of users. Driving this revolution is the modern web browser, which has evolved from a relatively simple client application designed to display static data into a complex networked operating system tasked with managing many facets of a users online experience. Support for dynamic content, multimedia data, and third-party plug-ins has greatly enriched users experiences at the cost of increasing the complexity of the browser itself.

group_project

Visible to the public CT-T: Proactive Techniques for Preserving System Integrity: A Basis for Robust Defense Against Malware

Cyber threats have escalated rapidly over the past decade. "Zero-day attacks" have become significant, delivered increasingly through seemingly innocuous means such as web pages, images, and documents. Malware is rampant, being installed surreptitiously on millions of computers around the world using a combination of spam, phishing, malicious shareware and freeware. Today's defenses use techniques such as signature-based scanning and file integrity monitoring to detect the presence of malware, and then remove them.

group_project

Visible to the public CT-ISG: Usable Cyber Trust Indicators

When systems rely on a "human in the loop" to carry out a security-critical function, cyber trust indicators are often employed to communicate when and how to perform that function. Indicators typically serve as warnings or status indicators that communicate information, remind users of information previously communicated, and influence behavior. They include a variety of security- and privacy-related symbols in the operating system status bar or browser chrome, pop-up alerts, security control panels, or symbols embedded in web content.

group_project

Visible to the public CT-ISG: SPEAR: Space Encryption based Query Processing for Privacy-Aware Location-based Services

As a result of recent wireless technology advances, mobile devices with significant computational abilities, gigabytes of storage capacities, and wireless communication capabilities have increasingly become popular. In addition, positioning techniques like GPS are incorporated into an increasing number of mobile devices. Emerging mobile applications allow users to issue location-dependent queries in a ubiquitous manner. It is believed that location privacy preservation represents important security and privacy problems in mobile computing environments.

group_project

Visible to the public Collaborative Proposal Cybertrust: Center for Internet Epidemiology and Defenses

The combination of widespread software homogeneity and the Internet's unrestricted communication model creates an ideal climate for infectious, self-propagating pathogens - "worms" and "viruses" - with each new generation of outbreaks demonstrating increasing speed, virulence, and sophistication. The Center for Internet Epidemiology and Defenses aims to address twin fundamental needs: to better understand the behavior and limitations of Internet epidemics, and to develop systems that can automatically defend against new outbreaks in real-time.

group_project

Visible to the public Collaborative Research: Cybertrust Center for Internet Epidemiology and Defenses

The combination of widespread software homogeneity and the Internet's unrestricted communication model creates an ideal climate for infectious, self-propagating pathogens - "worms" and "viruses" - with each new generation of outbreaks demonstrating increasing speed, virulence, and sophistication. The Center for Internet Epidemiology and Defenses aims to address twin fundamental needs: to better understand the behavior and limitations of Internet epidemics, and to develop systems that can automatically defend against new outbreaks in real-time.

group_project

Visible to the public TC: Large: Collaborative Research: Towards Trustworthy Interactions in the Cloud

As one of the most promising emerging concepts in Information Technology, outsourced computation (also known as cloud computing) is transforming our perception of how IT is consumed and managed, yielding improved cost efficiencies and delivering flexible, on-demand scalability. Cloud computing reduces IT resources and services to commodities acquired and paid-for on-demand through a fast-growing set of infrastructure, platform, and service providers.

group_project

Visible to the public TC: Small: RUI: Digital Laser Microscopy Analysis of Active, Altered, and Damaged Storage Media for Security and Digital Forensic Recovery

Digital storage media failure is a common occurrence, but an understanding of the mechanisms for the failure can be elusive and have far reaching implications. This project utilizes a digital laser microscope to investigate the impact of physical and environmental manipulation of digital storage media on failure rates and data recoverability. This investigation into the physical characteristics of digital media is establishing failure thresholds and their suitability for data recovery.

group_project

Visible to the public Synergy: Collaborative: CPS-Security: End-to-End Security for the Internet of Things

Computation is everywhere. Greeting cards have processors that play songs. Fireworks have processors for precisely timing their detonation. Computers are in engines, monitoring combustion and performance. They are in our homes, hospitals, offices, ovens, planes, trains, and automobiles. These computers, when networked, will form the Internet of Things (IoT). The resulting applications and services have the potential to be even more transformative than the World Wide Web. The security implications are enormous. Internet threats today steal credit cards.

group_project

Visible to the public SaTC: CORE: Small: Practical Whole Kernel Memory Safety Enforcement

The operating system (OS) kernel is the security-critical foundation of a computer system. Unfortunately, errors in the kernel software of commodity operating systems like Windows and Linux can allow a malicious attacker to take over the whole system. This research project is developing new techniques to eliminate certain types of critical errors from commodity OS kernels in a way that is both mathematically provable and efficient.