Search Projects: 2012

Results 1 - 10 of 38

Results

group_project

Visible to the public A Language and Framework for Development of Secure Mobile Applications

Mobile applications are a critical emerging segment of the software industry, and security for web-based mobile applications is of increasing concern. We hypothesize that many of the most important security vulnerabilities in web-based mobile applications are a consequence of expressing programs at a low level of abstraction, in which important security properties are implicit and only indirectly related to code. In order to test this hypothesis, we are building a system for expressing web-based mobile applications at a higher level of abstraction, in which security properties a

group_project

Visible to the public Toward a Theory of Resilience in Systems: A Game-Theoretic Approach

ABOUT THE PROJECT:

This project falls within the areas of control theory and game & decision theory, and aims at addressing some foundational issues. It builds on a platform of ongoing research on strategic decision-making that accommodates elements of security, robustness, learning, and adversarial intrusion, using control- and game-theoretic frameworks.

OUR TEAM:

Tamer Basar

group_project

Visible to the public Towards a Science of Securing Network Forwarding

ABOUT THE PROJECT:

In this project, we are formulating a formal science of securing packet forwarding in computer networks. In particular, we are developing a formal algebra of the network's data plane (packet-forwarding) operations. Our approach represents the network's forwarding behavior and state in the form of Boolean satisfiability (SAT) clauses.

group_project

Visible to the public Trust from Explicit Evidence: Integrating Digital Signatures and Formal Proofs

ABOUT THE PROJECT:

This project is developing a common logical framework that will account for two principal sources of trust in software: digital signatures and explicit proof. The framework will allow us to rigorously specify, enforce, and analyze security policies that rely on multiple modes and sources of trust. Based on earlier work by the PI and collaborators, the framework is being cast as a modal type theory that comes equipped with a notation for programs and proofs.

group_project

Visible to the public Scalable Methods for Security Against Distributed Attacks

ABOUT THE PROJECT:

This project is developing methods for resilient, efficient recognition of distributed attacks on clouds, data warehouses, clusters, and other massively parallel systems. Such attacks cannot usually be detected through local monitoring alone. Specifically, we are developing a probabilistic distributed temporal logic for characterizing such attacks and methods of verifying formulas in such a logic. The novel approach of combining probabilistic, distributed, and temporal operators will yield a new representation for system properties.

group_project

Visible to the public The Science of Summarizing Systems: Generating Security Properties Using Data Mining and Formal Analysis

ABOUT THE PROJECT:

In this project, we are using our invariant generation methodologies for security focused applications, like generation of invariants for a new application from the Android app store. We are investigating the science behind re-engineering a system through iterative invariant generation. We are also studying the connections between the machine-learning model used by the data mining and the finite state machine model of the program that is actually learned.