Search Projects: 2018

Results 1 - 10 of 1018

Results

group_project

Visible to the public EAGER: Digital Inequalities in the Heartland: Exploring the Information Security Experiences of Marginalized Internet Users

This project aims to understand how Internet technology may affect patrons' privacy and data security when they use public access computers, and to develop technical solutions that will enable these individuals to go online more safely and securely. The project concentrates especially on people who are economically poor and vulnerable to risk, such as very young or old people, people of color, immigrants, Native people, non-English speakers, and the disabled. Often these patrons must rely on public libraries for their broadband Internet access.

group_project

Visible to the public EAGER: TWC: Collaborative: iPrivacy: Automatic Recommendation of Personalized Privacy Settings for Image Sharing

The objective of this project is to investigate a comprehensive image privacy recommendation system, called iPrivacy (image Privacy), which can efficiently and automatically generate proper privacy settings for newly shared photos that also considers consensus of multiple parties appearing in the same photo. Photo sharing has become very popular with the growing ubiquity of smartphones and other mobile devices.

group_project

Visible to the public CT-ISG: User-Aided Secure Association of Wireless Devices

The popularity of personal gadgets opens up many new services for ordinary users. Many everyday usage scenarios involve two or more devices "working together". (Emerging scenarios are beginning to involve sensors and personal RFID tags.) Before working together, devices must be securely "paired" to enable secure and private communication.

group_project

Visible to the public Coordinated Machine Learning-Based Vulnerability & Security Patching for Resilient Virtual Computing Infrastructure

This research aims at aiding administrators of virtualized computing infrastructures in making services more resilient to security attacks through applying machine learning to reduce both security and functionality risks in software patching by continually monitoring patched and unpatched software to discover vulnerabilities and triggering proper security updates.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: A New Approach to Federated Network Security

Modern networks are often federated in nature---i.e., they are an interoperation between independent networks spanning multiple administrative domains. For example, in many enterprises, different business units control various logical segments of the network, but share common resources, such as routers, firewalls, and load-balancers. In such federated systems, the correct enforcement of network security policies relies on interactions that span multiple administrative domains.

group_project

Visible to the public SaTC: STARSS: Collaborative: IPTrust: A Comprehensive Framework for IP Integrity Validation

To reduce production cost while meeting time-to-market constraints, semiconductor companies usually design hardware systems with reusable hardware modules, popularly known as Intellectual Property (IP) blocks. Growing reliance on these hardware IPs, often gathered from untrusted third-party vendors, severely affects the security and trustworthiness of the final system. The hardware IPs acquired from external sources may come with deliberate malicious implants, undocumented interfaces working as hidden backdoor, or other integrity issues.

group_project

Visible to the public Collaborative Research: CT-T: Towards a More Accountable Internet

The goal of this project is to design, implement, and test an internetwork architecture called the Accountable Internet Protocol (AIP). AIP retains much of the elegance and simplicity of IP, but is far better equipped to thwart malicious adversaries. To provide this protection, AIP incorporates three kinds of accountability: source accountability, control-plane accountability, and dataplane accountability. Together, these three forms of accountability ensure that any host, router, and autonomous network can identify misbehaving components.

group_project

Visible to the public Computational Cybersecurity in Compromised Environments (C3E) Workshop Support

The Computational Cybersecurity in Compromised Environments (C3E) is a community of interest that has annually gathered, since its inception in 2009, to address some of the most arduous challenges of cybersecurity. Through these annual workshops, organizers bring together a diverse group of top academic, commercial, and government experts to discuss innovative approaches to the cybersecurity challenges facing our Nation. This travel grant will support an estimated twenty-five travelers to the 2014 C3E workshop.

group_project

Visible to the public CT-M: Realizing Verifiable Security Properties on Untrusted Computing Platforms

This project is motivated by the fundamental question of whether it is possible to achieve verifiable end-to-end security properties by adding suitable security mechanisms on top of commercially available applications executing on an untrusted computing platform. A concrete example of such a scenario is provided by a user interacting with a bank's web server using a web browser running SSL.

group_project

Visible to the public Securing Safety-Critical Machine Learning Algorithms

Machine-learning algorithms, especially classifiers, are becoming prevalent in safety and security-critical applications. The susceptibility of some types of classifiers to being evaded by adversarial input data has been explored in domains such as spam filtering, but with the rapid growth in adoption of machine learning in multiple application domains amplifies the extent and severity of this vulnerability landscape.