Search Projects: 2020

Results 11 - 20 of 29

Results

group_project

Visible to the public InTrans: Modular Security on an Open Cloud

This project explores the intriguing possibilities that result from the combination of two tools: cryptographic software that distributes any computing task over several machines with strong security guarantees as long as the machines are isolated, and a multi-provider cloud datacenter that offers to any tenant the ability to rent multiple isolated machines that are administered by different organizations.

group_project

Visible to the public SaTC: CORE: Small: Finding and Mitigating Side-channel Leakage in Embedded Architectures

Electronic devices found in a smart home, automobile, airplane, medical, and industrial applications are becoming more capable of on-the-spot processing information with their own embedded processors. While embedded processors make life easier, they also open the door to theft or corruption of our sensitive data. Malign actors can monitor power or radiation signatures in and around a device, and discover its secrets using side-channel attacks.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Learning Dynamic and Robust Defenses Against Co-Adaptive Spammers

Online reputation systems are ubiquitous for customers to evaluate businesses, products, people, and organizations based on reviews from the crowd. For example, Yelp and TripAdvisor rank restaurants and hotels based on user reviews, and RateMDs allows patients to review doctors and hospitals. These systems can however be leveraged by spammers to mislead and manipulate the inexperienced customers with fake but well-disguised reviews (spams). To comprehensively protect customers and honest businesses, advanced spam detection techniques have been deployed.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Learning Dynamic and Robust Defenses Against Co-Adaptive Spammers

Online reputation systems are ubiquitous for customers to evaluate businesses, products, people, and organizations based on reviews from the crowd. For example, Yelp and TripAdvisor rank restaurants and hotels based on user reviews, and RateMDs allows patients to review doctors and hospitals. These systems can however be leveraged by spammers to mislead and manipulate the inexperienced customers with fake but well-disguised reviews (spams). To comprehensively protect customers and honest businesses, advanced spam detection techniques have been deployed.

group_project

Visible to the public SaTC: TTP: Medium: Collaborative: Exposing and Mitigating Security/Safety Concerns of CAVs: A Holistic and Realistic Security Testing Platform for Emerging CAVs

Connected and Automated Vehicle (CAV) technologies enable real-time information sharing and driving automation, with the potential of significantly improving safety and efficiency of the transportation system. However, cyber-security threats may compromise the efficiency of infrastructure operations and the safety of passengers, posing a significant challenge for CAV deployment. This collaborative project develops a novel CAV testing platform to address the critical needs for assessing the security and safety concerns of the CAV system in an effective and realistic manner.

group_project

Visible to the public SaTC: TTP: Medium: Collaborative: Exposing and Mitigating Security/Safety Concerns of CAVs: A Holistic and Realistic Security Testing Platform for Emerging CAVs

Connected and Automated Vehicle (CAV) technologies enable real-time information sharing and driving automation, with the potential of significantly improving safety and efficiency of the transportation system. However, cyber-security threats may compromise the efficiency of infrastructure operations and the safety of passengers, posing a significant challenge for CAV deployment. This collaborative project develops a novel CAV testing platform to address the critical needs for assessing the security and safety concerns of the CAV system in an effective and realistic manner.

group_project

Visible to the public SaTC: TTP: Medium: Collaborative: Deployment-quality and Accessible Solutions for Cryptography Code Development

Vulnerabilities in cryptographic implementations seriously reduce the security guarantees of algorithms in practice and lead to attacks. An effective fix to the vulnerable code problem is automatic code checking. However, existing code verification tools cannot adequately cover cryptographic properties due to deficiencies in both accuracy, in terms of missed detection and false alarms, and scalability, in terms of complexity and runtime. The technology in this transition-to-practice project is to help secure cryptographic implementations, which are the foundation of many advanced systems.

group_project

Visible to the public SaTC: CORE: Medium: ADIDS: An Air-gapped Distributed Intrusion Detection System for the Power Grid

The power grid is a highly complex control system and one of the most impressive engineering feats of the modern era. Nearly every facet of modern society critically relies on the proper operation of the power grid such that long or even short interruptions can impose significant economic and social hardship on society. The current power grid is undergoing a transformation to a Smart Grid, that seeks to monitor and track diagnostic and operational information so as to enable a more efficient and resilient system.

group_project

Visible to the public SaTC: TTP: Medium: Collaborative: Deployment-quality and Accessible Solutions for Cryptography Code Development

Vulnerabilities in cryptographic implementations seriously reduce the security guarantees of algorithms in practice and lead to attacks. An effective fix to the vulnerable code problem is automatic code checking. However, existing code verification tools cannot adequately cover cryptographic properties due to deficiencies in both accuracy, in terms of missed detection and false alarms, and scalability, in terms of complexity and runtime. The technology in this transition-to-practice project is to help secure cryptographic implementations, which are the foundation of many advanced systems.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Hardware-assisted Plausibly Deniable System for Mobile Devices

Mobile computing devices typically use encryption to protect sensitive information. However, traditional encryption systems used in mobile devices cannot defend against an active attacker who can force the mobile device owner to disclose the key used for decrypting the sensitive information. This is particularly of concern to dissident users who are targets of nation states.