Search Projects: 2014

Results 41 - 50 of 58



Visible to the public Studying Latency and Stability of Closed-Loop Sensing-Based Security Systems

In this project, our focus is on understanding a class of security systems in analytical terms at a certain level of abstraction. Specifically, the systems we intend to look at are (I) multipath routing (for increasing reliability), (ii) dynamic firewalls. For multipath routing, the threat scenario is jamming - the nodes that are disabled due to the jamming take the place of compromised components in that they fail to perform their proper function. The multipath and diverse path mechanisms are inten


Visible to the public Spatiotemporal Security Analytics and Human Cognition

A key concern in security is identifying differences between human users and "bot" programs that emulate humans. Users with malicious intent will often utilize wide-spread computational attacks in order to exploit systems and gain control. Conventional detection techniques can be grouped into two broad categories: human observational proofs (HOPs) and human interactive proofs (HIPs).


Visible to the public Towards a Scientific Basis for User Center Security Design

Human interaction is an integral part of any system. Users have daily interactions with a system and make many decisions that affect the overall state of security. The fallibility of users has been shown but there is little research focused on the fundamental principles to optimize the usability of security mechanisms. We plan to develop a framework to design, develop and evaluate user interaction in a security context.


Visible to the public Quantifying Mobile Malware Threats

In this project, we aim to systematize the knowledge base about existing mobile malware (especially on Android) and quantify their threats so that we can develop principled solutions to provably determine their presence or absence in existing marketplaces. The hypothesis is that there exist certain fundamental commonalities among existing mobile malware.


Visible to the public Attaining Least Privilege Through Automatic Partitioning of Hybrid Programs

This project investigates the hard problem of resilient architectures from the standpoint of enabling new potential for incorporating privilege separation into computing systems. However, privilege separation alone is insufficient to achieve strong security guarantees. It must also include a security policy for separated components without impacting the functional requirements of the system.


Visible to the public Developing a User Profile to Predict Phishing Susceptibility and Security Technology Acceptance

Phishing has become a serious threat in the past several years, and combating it is increasingly important. Why do certain people get phished and others do not? In this project, we aim to identify the factors that cause people to be susceptible and resistant to phishing attacks. In doing so, we aim to deploy adaptive anti-phishing measures.


Visible to the public Empirical Privacy and Empirical Utility of Anonymized Data


PI: Ting Yu
Students: Xi Gong, Entong Shen


Visible to the public Argumentation as a Basis for Reasoning about Security

This project involves the application of argumentation techniques for reasoning about policies, and security decisions in particular. Specifically, we are producing a security-enhanced argumentation framework that (a) provides not only inferences to draw but also actions to take; (b) considers multiparty argumentation; (c) measures the mass of evidence on both attacking and supporting arguments in order to derive a defensible conclusion with confidence; and (d) develops suitable critical questions as the basis for argumentation.


Visible to the public An Investigation of Scientific Principles Involved in Software Security Engineering

Fault elimination part of software security engineering hinges on pro-active detection of potential vulnerabilities during software development stages.


Visible to the public Normative Trust Toward a Principled Basis for Enabling Trustworthy Decision Making

This project seeks to develop a deeper understanding of trust than is supported by current methods, which largely disregard the underlying relationships based on which people trust or not trust each other. Accordingly, we begin from the notion of what we term normative relationships--or norms for short--directed from one principal to another. An example of a normative relationship is a commitment: is the first principal committed to doing something for the second principal?