Search Projects: April, 2018

Results 1 - 10 of 112

Results

group_project

Visible to the public CT-ISG: SPEAR: Space Encryption based Query Processing for Privacy-Aware Location-based Services

As a result of recent wireless technology advances, mobile devices with significant computational abilities, gigabytes of storage capacities, and wireless communication capabilities have increasingly become popular. In addition, positioning techniques like GPS are incorporated into an increasing number of mobile devices. Emerging mobile applications allow users to issue location-dependent queries in a ubiquitous manner. It is believed that location privacy preservation represents important security and privacy problems in mobile computing environments.

group_project

Visible to the public Collaborative Proposal Cybertrust: Center for Internet Epidemiology and Defenses

The combination of widespread software homogeneity and the Internet's unrestricted communication model creates an ideal climate for infectious, self-propagating pathogens - "worms" and "viruses" - with each new generation of outbreaks demonstrating increasing speed, virulence, and sophistication. The Center for Internet Epidemiology and Defenses aims to address twin fundamental needs: to better understand the behavior and limitations of Internet epidemics, and to develop systems that can automatically defend against new outbreaks in real-time.

group_project

Visible to the public Collaborative Research: Cybertrust Center for Internet Epidemiology and Defenses

The combination of widespread software homogeneity and the Internet's unrestricted communication model creates an ideal climate for infectious, self-propagating pathogens - "worms" and "viruses" - with each new generation of outbreaks demonstrating increasing speed, virulence, and sophistication. The Center for Internet Epidemiology and Defenses aims to address twin fundamental needs: to better understand the behavior and limitations of Internet epidemics, and to develop systems that can automatically defend against new outbreaks in real-time.

group_project

Visible to the public TC: Large: Collaborative Research: Towards Trustworthy Interactions in the Cloud

As one of the most promising emerging concepts in Information Technology, outsourced computation (also known as cloud computing) is transforming our perception of how IT is consumed and managed, yielding improved cost efficiencies and delivering flexible, on-demand scalability. Cloud computing reduces IT resources and services to commodities acquired and paid-for on-demand through a fast-growing set of infrastructure, platform, and service providers.

group_project

Visible to the public  TC: Medium: Collaborative Research: Side-Channel-Proof Embedded Processors with Integrated Multi-Layer Protection

Embedded digital systems are ubiquitous and may contain sensitive information that could be used for malicious purposes if fallen into the wrong hands. Therefore, strong cryptographic algorithms have been incorporated inside these devices. However, attackers have switched their targets from the cryptographic algorithms themselves to the hardware/software implementations of these algorithms, through ?side-channel? chip measurements. From a hardware perspective, such side-channel attacks can be implemented at both the circuit-level and architecture-level.

group_project

Visible to the public TC: Medium: From Statistics to Circuits: Foundations for Future On-chip Fingerprints

In a world where everybody and everything is electronically connected, identity is essential to support trustworthy transactions. This project investigates novel techniques to design and implement on-chip fingerprints. Such fingerprints establish the hardware identity of an electronic system. The on-chip fingerprints are based on the existing, small and random manufacturing variations of electronic chips.

group_project

Visible to the public CAREER: An Integrated Approach For Efficient Privacy Preserving Distributed Data Analytics

Increasingly, different organizations need to securely share their private data to execute many critical tasks. Recently, several different approaches based on secure multi-party computation (SMC) and data sanitization techniques have emerged to enable privacy preserving distributed data analytics. Although SMC based privacy-preserving protocols allow the participating parties to learn only the final (accurate) result, they do not scale well for large amounts of data.

group_project

Visible to the public TC: Medium: Collaborative Research: Pay-as-you-Go: Security and Privacy for Integrated Transportation Payment Systems

Pay-as-you-Go investigates security and privacy for Integrated Transportation Payment Systems (ITPS). The research addresses integrated payments for trains, subways, buses, ferries, and recharging of electric cars, as well as toll collection for roads, bridges, and tunnels. Multi-disciplinary aspects include novel cryptographic protocols and lightweight implementations of privacy-preserving payment systems. Challenges include providing security and privacy in a low-cost, usable, and reliable manner.

group_project

Visible to the public CAREER: Control of Information Security Risk Using Economic Incentives

Security risks associated with software that communicates over networks have become an increasingly costly problem for consumers, firms, and governments. A key characteristic of any interconnected system (e.g., network software such as Apache HTTP server, the smart grid, and airline baggage operations) is that choices made in the design, deployment, and usage of these systems can have significant implications for security risk.

group_project

Visible to the public CT-ER: Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks

With the rapid growth of the Internet, online advertisement plays a more and more important role in the advertising market and has become a billion-dollar business ($19.5 billon in 2007). One of the current and widely used revenue models for online advertising is Pay-per-click (PPC), which involves charging for each click based on the popularity of keywords and the number of competing advertisers. However, the pay-per-click model leaves room for individuals or rival companies to generate false clicks (i.e., click fraud) due to the lack of verifiable engagement in PPC requests.