Search Projects: 2014

Results 51 - 58 of 58



Visible to the public Low-level Analytics Models of Cognition for Novel Security Proofs

A key concern in security is identifying differences between human users and "bot" programs that emulate humans. Users with malicious intent will often utilize wide-spread computational attacks in order to exploit systems and gain control. Conventional detection techniques can be grouped into two broad categories: human observational proofs (HOPs) and human interactive proofs (HIPs).


Visible to the public An Adoption Theory of Secure Software Development Tools

Programmers interact with a variety of tools that help them do their jobs, from "undo" to FindBugs' security warnings to entire development environments. However, programmers typically know about only a small subset of tools that are available, even when many of those tools might be valuable to them. In this project, we investigate how and why software developers find out about -- and don't find out about -- software security tools. The goal of the project is to help developers use more relevant security tools, more often.



Visible to the public Modeling the risk of user behavior on mobile devices

It is already true that the majority of users' computing experience is a mobile one. Unfortunately that mobile experience is also more risky: users are often multitasking, hurrying or uncomfortable, leading them to make poor decisions. Our goal is to use mobile sensors to predict when users are distracted in these ways, and likely to behave insecurely. We will study this possibility in a series of lab and field experiments.


PIs: Benjamin Watson, Will Enck, Anne McLaughlin, Michael Rappa


Visible to the public An Investigation of Scientific Principles Involved in Attack-Tolerant Software

High-assurance systems, for which security is especially critical, should be designed to a) auto-detect attacks (even when correlated); b) isolate or interfere with the activities of a potential or actual attack; and (3) recover a secure state and continue, or fail safely. Fault-tolerant (FT) systems use forward or backward recovery to continue normal operation despite the presence of hardware or software failures. Similarly, an attack-tolerant (AT) system would recognize security anomalies, possibly identify user "intent", and effect an appropriate defense and/or isolation.


Visible to the public A Science of Timing Channels in Modern Cloud Environments

The eventual goal of our research is to develop a principled design for comprehensively mitigating access-driven timing channels in modern compute clouds, particularly of the "infrastructure as a service" (IaaS) variety. This type of cloud permits the cloud customer to deploy arbitrary guest virtual machines (VMs) to the cloud. The security of the cloud-resident guest VMs depends on the virtual machine monitor (VMM), e.g., Xen, to adequately isolate guest VMs from one another.


Visible to the public CPS: Synergy: Smart Flexible Camera Sheet: Ultra-Thin Semantic-Guided Cooperative Micro-Camera Array

Project Details
University of Wisconsin-Madison


Develop a smart flexible sheet with a micro-camera array, wherein the cameras can individually or collectively target and track objects at different angles and distances.


Visible to the public Holonic Multi-Agent Control of Intelligent Power Distribution Systems

This project will demonstrate a Holonic Multiagent System Architecture capable of adaptively controlling future electrical power distribution systems (PDS), which are expected to include a large number of renewable power generators, energy storage devices, and advanced metering and control devices. The project will produce a general, extensible, and secure cyber architecture based on holonic multiagent principles to support adaptive PDS.


Visible to the public 2013 Tools (FANG1)