Search Projects: June, 2018

Results 21 - 30 of 43

Results

group_project

Visible to the public CT-ER: A Framework for Live Security Exercises and Challenges

Computer security is a critical issue that affects our everyday life. For this reason, most colleges and other educational institutions are devoting an increasing amount of resources to develop courses and curricula that involve security training. Typical courses include cryptography, general computer security, network security, and specialized topics, such as security of wireless networks and web security.

group_project

Visible to the public CT-ISG: Improving System Security with a Compiler-based Virtual Machine for Operating System Kernels

The Secure Virtual Architecture (SVA, formerly called LLVA forlow-level virtual architecture) project is developing a novel framework to improve operating system security and reliability. The two broad goals of the project are (a) to develop a compiler-enforced virtual machine that is safe, low-level, efficient, and capable of hosting a standard C/C++-based operating system and all its applications; and (b) to investigate how this organization can improve overall system security and provide new security capabilities.

group_project

Visible to the public CAREER: Foundational Theories and Enforcement Tools for Secure Software Systems

This project addresses the problem that, to be trustworthy yet practical, mechanisms for enforcing software security must (1) undergo rigorous analysis that provides formal security guarantees and (2) be developed quickly. The project addresses this problem by creating (1) formal, foundational theories of software security and (2) convenient tools for quickly generating provably sound enforcement mechanisms.

group_project

Visible to the public CAREER: Protecting Privacy in Untrusted Environments

Information about individuals and organizations is increasingly collected in massive databases, sent over public networks and shared across organizational boundaries. This presents serious threats to privacy: even if individual pieces of data are cryptographically protected, sensitive information may still leak out due to mismatches between privacy policies of different components. This project aims to develop tools and techniques for protecting privacy of sensitive data, focusing on three main research thrusts.

group_project

Visible to the public CAREER: Flexible Multi-Core Substrate for Trustworthy Computing Systems

Multi-core architecture with 4 to 8 cores on a die is a reality today and future generations of processors are expected to contain even more cores per chip. This project targets to realize the full potential of large-scale multi-core processors as a secure and trustworthy computing substrate. First, in "many-core" processors, the availability of a large number of processing elements together with constraints on power consumption alleviates the need for heavy time-sharing of resources, which often results in various types of side-channels.

group_project

Visible to the public CAREER: Non-Conventional Solutions for Ensuring Security in Cognitive Radio Networks

The PHY and MAC layers of cognitive radio networks are very different from those of conventional wireless networks. The distinguishing attributes of cognitive radio networks such as cooperative spectrum sensing, on-demand spectrum contention, incumbent- and self-coexistence mechanisms, and spectrum etiquette mechanisms raise new security implications that have not been studied previously.

group_project

Visible to the public CAREER: Collaborative Optimization with Limited Information Disclosure

With the rapid increase in computing, storage and networking resources, data is not only collected and stored but also analyzed. This creates a serious privacy problem which often inhibits the use of this data. This project explores the problem of performing optimization analysis over distributed data without conflicting with privacy and security concerns. This is especially challenging due to the complexity and iterative nature of the solutions.

group_project

Visible to the public CAREER: Securing Active Information

When multiple parties attempt to collaborate, they often end up having to compromise the confidentiality of their private information. Cryptographic primitives like secure multiparty computation and obfuscation are aimed at mitigating this situation.

group_project

Visible to the public CAREER: Decentralizing Trust in Open Distributed Systems

Distributed systems that allow any user to enroll his node as a participant must resolve two main challenges to achieve reliability: selecting trustworthy participants, and detecting and containing the damage of deviant nodes. This research addresses these challenges by (a) presenting a new system architecture, F2F, that incorporates decentralized trust relationships among users in determining trustworthy nodes and (b) devising new techniques to detect and contain faults of misbehaving nodes in the context of concrete applications using this new architecture.

group_project

Visible to the public CAREER: Trust and Privacy Management for Online Social Networks

Online social networks greatly expand the scale of people's social connections, and have the potential to become an open computing platform, where new services can be quickly offered and propagated. Mechanisms for trust management and privacy protection are integral to the future success of online social networks. A trustworthy social network should allow users to flexibly control who can access their social information and to what extend. Online social networks also broaden the scope and scale of social science.