Collaborative

group_project

Visible to the public SaTC: EDU: Collaborative: Incorporating Sociotechnical Cybersecurity Learning Within Undergraduate Capstone Courses

All technology professionals require basic proficiency in cybersecurity. However, typical computing curricula do not require any courses in cybersecurity. As a result, a majority of students graduate without any proficiency in cybersecurity relevant to the systems they will develop and use when they join the workforce. Moreover, cybersecurity electives often cover only technical topics, and technology professionals must understand how cybersecurity is influenced by social factors.

group_project

Visible to the public SaTC: EDU: Collaborative: Incorporating Sociotechnical Cybersecurity Learning Within Undergraduate Capstone Courses

All technology professionals require basic proficiency in cybersecurity. However, typical computing curricula do not require any courses in cybersecurity. As a result, a majority of students graduate without any proficiency in cybersecurity relevant to the systems they will develop and use when they join the workforce. Moreover, cybersecurity electives often cover only technical topics, and technology professionals must understand how cybersecurity is influenced by social factors.

group_project

Visible to the public SaTC: EDU: Collaborative: Curriculum to Broaden Participation in Cybersecurity for Middle School Teachers and Students (CyberMiSTS)

The Curriculum to Broaden Participation in Cybersecurity for Middle School Teachers and Students (CyberMiSTS) project will develop and pilot summer workshops that provide middle school Career and Technical Education (CTE) teachers with the knowledge, skills, and tools they need to actively engage their students and expose them to cybersecurity concepts and careers. Bringing in cybersecurity expertise from a variety of sources, the CyberMiSTS curriculum will be accessible to middle school students and teachers because it will emphasize the important role of humans in cybersecurity.

group_project

Visible to the public SaTC: EDU: Collaborative: Curriculum to Broaden Participation in Cybersecurity for Middle School Teachers and Students (CyberMiSTS)

The Curriculum to Broaden Participation in Cybersecurity for Middle School Teachers and Students (CyberMiSTS) project will develop and pilot summer workshops that provide middle school Career and Technical Education (CTE) teachers with the knowledge, skills, and tools they need to actively engage their students and expose them to cybersecurity concepts and careers. Bringing in cybersecurity expertise from a variety of sources, the CyberMiSTS curriculum will be accessible to middle school students and teachers because it will emphasize the important role of humans in cybersecurity.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Exploiting Physical Properties in Wireless Networks for Implicit Authentication

The rapid development of information technology not only leads to great convenience in our daily lives, but also raises significant concerns in the field of security and privacy. Particularly, the authentication process, which serves as the first line of information security by verifying the identity of a person or device, has become increasingly critical. An unauthorized access could result in detrimental impact on both corporation and individual in both secrecy loss and privacy leakage.

group_project

Visible to the public EDU: Collaborative: HACE Lab: An Online Hardware Security Attack and Countermeasure Evaluation Lab

This project addresses the need to train students, researchers, and practitioners on diverse hardware security and trust issues as well as emergent solutions. The primary goal is establishing a set of hardware security courseware and enabling adoption of these courseware through the development of an online Hardware Attack and Countermeasure Evaluation (HACE) Lab.

group_project

Visible to the public EAGER: Collaborative: A Research Agenda to Explore Privacy in Small Data Applications

One of the crucial ideas behind Privacy by Design (PbD) is that privacy should be taken into consideration in the process of design, not merely after-the-fact, as so often happens. Yet, this ideal has failed to gain widespread practical traction, challenged, in part, by the lack of developed methodologies and also because of privacy's conceptual complexity, which hampers its operationalization.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Oblivious ISAs for Secure and Efficient Enclave Programming

Computing on personal data is critical for both personal and social good. For example, we write programs that predict early onset medical conditions and detect the spread of diseases before they become epidemics. However, such computing is fraught with privacy concerns because programs, and the hardware they run on, create a trail of clues that an attacker can observe to reconstruct personal data without ever seeing the data directly. This project will create computer systems that proactively leave no clues, i.e., no side-effects that can leak personal secrets.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Building Sophisticated Services with Programmable Anonymity Networks

This project designs and implements programmable system elements to be run within the anonymity networks, such as Tor (The Onion Routing network). The central idea is that users can inject new code into the network that is then run within a protected execution environment. The motivation is to enable the creation of new and significantly enhanced anonymity services, such as content distribution networks, of use in today's and future anonymity networks.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Building Sophisticated Services with Programmable Anonymity Networks

This project designs and implements programmable system elements to be run within the anonymity networks, such as Tor (The Onion Routing network). The central idea is that users can inject new code into the network that is then run within a protected execution environment. The motivation is to enable the creation of new and significantly enhanced anonymity services, such as content distribution networks, of use in today's and future anonymity networks.