Search Projects: 2018

Results 21 - 30 of 1027

Results

group_project

Visible to the public Foundations for Cyber-Physical System Resilience

The goals of this project are to develop the principles and methods for designing and analyzing resilient CPS architectures that deliver required service in the face of compromised components. A fundamental challenge is to understand the basic tenets of CPS resilience and how they can be used in developing resilient architectures. The proposed approach integrates redundancy, diversity, and hardening methods for designing either passive resilience methods that are inherently robust against attacks and active resilience methods that allow responding to attacks.

group_project

Visible to the public Coordinated Machine Learning-Based Vulnerability & Security Patching for Resilient Virtual Computing Infrastructure

This research aims at aiding administrators of virtualized computing infrastructures in making services more resilient to security attacks through applying machine learning to reduce both security and functionality risks in software patching by continually monitoring patched and unpatched software to discover vulnerabilities and triggering proper security updates.

group_project

Visible to the public TWC SBE: Option: Frontier: Collaborative: Towards Effective Web Privacy Notice and Choice: A Multi-Disciplinary Prospective

Natural language privacy policies have become a de facto standard to address expectations of notice and choice on the Web. Yet, there is ample evidence that users generally do not read these policies and that those who occasionally do struggle to understand what they read. Initiatives aimed at addressing this problem through the development of machine implementable standards or other solutions that require website operators to adhere to more stringent requirements have run into obstacles, with many website operators showing reluctance to commit to anything more than what they currently do.

group_project

Visible to the public TWC: Frontier: Collaborative: Enabling Trustworthy Cybersystems for Health and Wellness

This frontier project tackles many of the fundamental research challenges necessary to provide trustworthy information systems for health and wellness, as sensitive information and health-related tasks are increasingly pushed into mobile devices and cloud-based services.

group_project

Visible to the public  CRII: SaTC: Practical Cryptographic Coding Schemes Against Memory Attacks

The goal of this project is to develop practical non-malleable codes, which are encoding schemes that have the property that modifying an encoded message results in either decoding the original message or a totally unrelated message. This will improve upon previous constructions and create practical methods to secure against memory attacks for both computers and portable devices. The practical designs developed in this project would immediately improve the performance in applications that use non-malleable codes.

group_project

Visible to the public EAGER: Digital Inequalities in the Heartland: Exploring the Information Security Experiences of Marginalized Internet Users

This project aims to understand how Internet technology may affect patrons' privacy and data security when they use public access computers, and to develop technical solutions that will enable these individuals to go online more safely and securely. The project concentrates especially on people who are economically poor and vulnerable to risk, such as very young or old people, people of color, immigrants, Native people, non-English speakers, and the disabled. Often these patrons must rely on public libraries for their broadband Internet access.

group_project

Visible to the public EAGER: TWC: Collaborative: iPrivacy: Automatic Recommendation of Personalized Privacy Settings for Image Sharing

The objective of this project is to investigate a comprehensive image privacy recommendation system, called iPrivacy (image Privacy), which can efficiently and automatically generate proper privacy settings for newly shared photos that also considers consensus of multiple parties appearing in the same photo. Photo sharing has become very popular with the growing ubiquity of smartphones and other mobile devices.

group_project

Visible to the public CT-ISG: User-Aided Secure Association of Wireless Devices

The popularity of personal gadgets opens up many new services for ordinary users. Many everyday usage scenarios involve two or more devices "working together". (Emerging scenarios are beginning to involve sensors and personal RFID tags.) Before working together, devices must be securely "paired" to enable secure and private communication.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: A New Approach to Federated Network Security

Modern networks are often federated in nature---i.e., they are an interoperation between independent networks spanning multiple administrative domains. For example, in many enterprises, different business units control various logical segments of the network, but share common resources, such as routers, firewalls, and load-balancers. In such federated systems, the correct enforcement of network security policies relies on interactions that span multiple administrative domains.

group_project

Visible to the public SaTC: STARSS: Collaborative: IPTrust: A Comprehensive Framework for IP Integrity Validation

To reduce production cost while meeting time-to-market constraints, semiconductor companies usually design hardware systems with reusable hardware modules, popularly known as Intellectual Property (IP) blocks. Growing reliance on these hardware IPs, often gathered from untrusted third-party vendors, severely affects the security and trustworthiness of the final system. The hardware IPs acquired from external sources may come with deliberate malicious implants, undocumented interfaces working as hidden backdoor, or other integrity issues.