Search Projects: February, 2018

Results 1 - 10 of 220

Results

group_project

Visible to the public  CRII: SaTC: Practical Cryptographic Coding Schemes Against Memory Attacks

The goal of this project is to develop practical non-malleable codes, which are encoding schemes that have the property that modifying an encoded message results in either decoding the original message or a totally unrelated message. This will improve upon previous constructions and create practical methods to secure against memory attacks for both computers and portable devices. The practical designs developed in this project would immediately improve the performance in applications that use non-malleable codes.

group_project

Visible to the public EAGER: Digital Inequalities in the Heartland: Exploring the Information Security Experiences of Marginalized Internet Users

This project aims to understand how Internet technology may affect patrons' privacy and data security when they use public access computers, and to develop technical solutions that will enable these individuals to go online more safely and securely. The project concentrates especially on people who are economically poor and vulnerable to risk, such as very young or old people, people of color, immigrants, Native people, non-English speakers, and the disabled. Often these patrons must rely on public libraries for their broadband Internet access.

group_project

Visible to the public CRII: SaTC: Hardware based Authentication and Trusted Platform Module functions (HAT) for IoTs

Crucial and critical needs of security and trust requirements are growing in all classes of applications such as in automobiles and for wearable devices. Traditional cryptographic primitives are computation-intensive and rely on secrecy of shared or session keys, applicable on large systems like servers and secure databases. This is unsuitable for embedded devices with fewer resources for realizing sufficiently strong security. This research addresses new hardware-oriented capabilities and mechanisms for protecting Internet of Things (IoT) devices.

group_project

Visible to the public TWC: Small: Collaborative: Towards Privacy Preserving Online Image Sharing

On-line sharing of images has become a key enabler of users' connectivity. Various types of images are shared through social media to represent users' interests and experiences. While extremely convenient and socially valuable, this level of pervasiveness introduces acute privacy concerns. First, once shared images may go anywhere, as copying / resharing images is straightforward. Second, the information disclosed through an image reveals aspects of users' private lives, affecting both the owner and other subjects in the image.

group_project

Visible to the public SaTC: TTP: Medium: Collaborative: RESULTS: Reverse Engineering Solutions on Ubiquitous Logic for Trustworthiness and Security

Due to the globalization of the integrated circuit (IC) supply chain, the reduction of manufacturing costs and the need for shorter time to market, commercial-off-the-shelf ICs are now prevalent in modern electronic systems. However, the wide usage of such components breeds major security and trust concerns. Validating the security and trustworthiness of these components is extremely challenging since the end user does not have access to the design details.

group_project

Visible to the public CRII: SaTC: Automated Proof Construction and Verification for Attribute-based Cryptography

This project develops a comprehensive proof construction and verification framework for a well-defined class of cryptographic protocols: attribute-based cryptosystems. In particular, existing automated proof construction and verification frameworks, such as EasyCrypt and CryptoVerif, are extended to provide support for attribute-based cryptography. The extensions consist of libraries of simple transformations, algebraic manipulations, commonly used abstractions and constructs, and proof strategies, which will help in generation and verification of proofs in attribute-based cryptography.

group_project

Visible to the public Synergy: Collaborative: CPS-Security: End-to-End Security for the Internet of Things

Computation is everywhere. Greeting cards have processors that play songs. Fireworks have processors for precisely timing their detonation. Computers are in engines, monitoring combustion and performance. They are in our homes, hospitals, offices, ovens, planes, trains, and automobiles. These computers, when networked, will form the Internet of Things (IoT). The resulting applications and services have the potential to be even more transformative than the World Wide Web. The security implications are enormous. Internet threats today steal credit cards.

group_project

Visible to the public SaTC: Student Travel Support for IEEE CNS 2018

This proposal supports student travel to attend the 2018 IEEE Communications and Network Security Symposium to be held in Beijing, China in May 2018. CNS is a primer venue for communications and networking researchers to present new research results, focusing on communications and network security. This travel grant will enable career development and learning opportunities for US-based and/or US citizen graduate students. Attending conferences is an important component of graduate school education for our society's future computer security researchers.

group_project

Visible to the public CRII: SaTC: Transparent Capture and Aggregation of Secure Data Provenance for Smart Devices

Computers are increasingly pervasive and diverse, embedded in devices ranging from smart phones and wearable computers to home automation devices and automotive systems. This explosive growth has far outpaced the speed with which device behaviors can be analyzed and understood, creating unprecedented opportunities for "Internet of Things" devices to engage in nefarious activities such as violating users' privacy or spreading malware.

group_project

Visible to the public CRII: SaTC: Repairing Code from Inferred Specifications of Information Flow Security

As more software computes using sensitive user data, it increasingly important to ensure that data flows only where it is permitted. Protecting sensitive data often involves reasoning about how sensitive values and policies are interacting with functionality across the program. The need to reason across the code base makes it difficult not only for programmers to implement computations using sensitive data, but also to make existing code adhere to new policies.