Search Projects: June, 2018

Results 1 - 10 of 43

Results

group_project

Visible to the public Collaborative Research: CT-T: Towards a More Accountable Internet

The goal of this project is to design, implement, and test an internetwork architecture called the Accountable Internet Protocol (AIP). AIP retains much of the elegance and simplicity of IP, but is far better equipped to thwart malicious adversaries. To provide this protection, AIP incorporates three kinds of accountability: source accountability, control-plane accountability, and dataplane accountability. Together, these three forms of accountability ensure that any host, router, and autonomous network can identify misbehaving components.

group_project

Visible to the public CT-T: Modeling and Analyzing Trust in Service-Oriented Architectures

Service-oriented architectures (SOAs) enable the dynamic integration of services implemented on heterogeneous computer systems. An advantage of SOAs is that they provide high-level, semantically-rich services by abstracting the low-level details of their implementation. The availability of useful services such as Google's and Amazon's web service APIs has fostered applications that integrate a number of services to provide novel, more complex functionality.

group_project

Visible to the public CT-ISG: Collaborative Research: A Framework for the Modeling and Management of Obligations in Security Policies

The correct behavior and reliable operation of an information system relies not only on what users are permitted to do, but oftentimes on what users are required to do. Such obligatory actions are integral to the security procedures of many enterprises. The management o fobligations in security policies imposes significant technical challenges since obligations bear quite different properties from traditional access control. For example, obligations assigned to users often cannot be enforced.

group_project

Visible to the public Collaborative Research: CT-ISG: Error-resistant, Accountable, RFID-assisted Wireless Sensor Networks for Elder Cardiac Tele-Healthcare

Tele-healthcare could largely reduce national healthcare cost through remote self-managed patient monitoring. Cardiac Sensor Networks (CSNs) could be used to deploy such a system. Moreover, the integration of RFID into CSN could play an important role for elder healthcare because RFID could be used to monitor elders' medicine taking behaviors. On the other hand, the disclosure of RFID information during RFID tag-to-reader communications can cause the violation of patients' privacy. This research aims to achieve trustworthiness in a practical RFID-assisted CSN platform.

group_project

Visible to the public CT-ISG: Compiler-Enabled Adaptive Security Monitoring on Networked Embedded Systems

Hardware technologies have made steady progress in miniaturization of sensors and computing/communication devices, which has driven a trend towards pervasive computing, which is a way to let computing devices directly interact with the physical world to monitor the natural environment, to provide building safety, and so on.

group_project

Visible to the public Collaborative Research: CT-ISG: Secure Capacity of Wireless Networks

The last decade has witnessed an amazing growth in wireless communications and networking applications. More and more subscribers are relying solely on their wireless communication and computing devices for communicating sensitive information. Preserving the security of wirelessly transmitted information is becoming ever more challenging, yet essential.

group_project

Visible to the public CT-ISG: Dynamic Covert Channels: Generation and Detection of Hidden Messages

The secure transmission of information from a source to a destination is typically handled via encryption algorithms. In many instances, data that may or may not undergo encryption prior to transmission can be manipulated to encode messages. With successful encodings, seemingly innocuous channels, e.g., documents, data streams, audio, video, can operate covertly for secret message transmission in various applications, e.g., collusion in finance, electronic information/auction markets, transaction sequences, advertising applets, simulation.

group_project

Visible to the public CT-ISG: Collaborative Research: A New Approach to Testing and Verification of Security Policies

Policy-based access control is one of the most fundamental and widely used mechanisms for achieving privacy and security at both application and network levels. Given the high importance and delicacy of security policies, ensuring the correctness of these policies is important, and yet difficult. A tiny error in security policies could lead to irreparable, if not tragic, consequences. Therefore, identifying discrepancies between policy specifications and their intended function is a crucial task.

group_project

Visible to the public CT-ISG: Robust and Efficient Tamper-Resistant Software

Increasingly, society relies on software systems to provide vital services. Consequently, it is critically important that this software be protected from unauthorized modification. For example, a malicious user may modify or tamper with a binary to circumvent protection or license mechanisms or introduce vulnerabilities that can be later exploited.

group_project

Visible to the public Collaborative Research: CT-T: Logic and Data Flow Extraction for Live and Informed Malware Execution

Malicious activity on the Internet is a significant threat to both individuals and institutions. Over the past few years, network honeypots have emerged as an important tool for measuring and understanding the details of cyber attacks. The objective of the proposed research is to stimulate the development of next generation Internet security systems and forensic tools based on automated, indepth analysis of malicious activity and malicious software (malware) observed in network honeypots.