EAGER

group_project

Visible to the public EAGER: Measuring the Stability of Web Links

With every passing day, the Internet becomes more and more integrated in society. Our reliance on online web services in our professional and personal lives continuously increases. Recognizing this, attackers take advantage of the web's popularity to mount a wide range of web application attacks, compromising systems, and stealing private and financial information.

group_project

Visible to the public EAGER: Collaborative: BystanderBots: Automated Bystander Intervention for Cyberbullying Mitigation

Bullying has lasting negative psychological and physical effects on victims, bystanders, and bullies alike; online settings can magnify both the scale and impact of these effects, as anonymity can embolden people to make hostile posts about individuals or groups. This project aims to reduce the prevalence of such posts through the design of active, automated "bystander interventions" in online comment threads.

group_project

Visible to the public EAGER: Factoring User Behavior into Network Security Analysis

The project will investigate human factors in network security. The security of network systems relies on proper protection from not only known vulnerabilities, but also new vulnerabilities resulting from unexpected human behavior. The project will directly address a user's situational behavior and its consequence on network security. It engages in the challenges of modeling decision-making process and integrating it in the human-network interaction.

group_project

Visible to the public EAGER: Privacy Compliance by Design: Ideation Techniques to Facilitate System Design Compliant with Privacy Laws and Regulations

The explosion in data gathering has greatly exacerbated existing privacy issues in computing systems and created new ones due to the increase in the scale and the scope of available data as well as the advances in the capabilities of computational data analysis. Software professionals typically have no formal training or education on sociotechnical aspects of privacy. As a result, addressing privacy issues raised by a system is frequently an afterthought and/or a matter of compliance-check during the late phases of the system development lifecycle.

group_project

Visible to the public EAGER: PUF-Locked Circuit Obfuscation for Counterfeit and Piracy Prevention

The economic impacts and security hazards of hardware piracy is not apt to be neglected compared to software, but is even more severe. The loss due to global hardware piracy has now reached the level of billions per month, with a major share in almost all electronic devices. It was reported by the Alliance for Gray Market and Counterfeit Abatement that about 10% of the start-of-the-art technology products available on market are counterfeits.

group_project

Visible to the public EAGER: Number Theory and Cryptograpghy

This award supports the principal investigator's research in number theory and its cryptographic applications. Number theory serves as the basis for modern cryptography and internet security. The underlying mathematical theories, of elliptic curves and integer factorization, have been studied for centuries. This project includes components of basic research, concerning the relationship between geometry and number theory, as well as foundational research in cryptographic applications, with an eye toward the advent of quantum computers.

group_project

Visible to the public EAGER: Collaborative: Towards Understanding the Attack Vector of Privacy Technologies

Advances in privacy-enhancing technologies, including cryptographic mechanisms, standardized security protocols, and infrastructure, significantly improved privacy and had a significant impact on society by protecting users. At the same time, the success of such infrastructure has attracted abuse from illegal activities, including sophisticated botnets and ransomware, and has become a marketplace for drugs and contraband; botnets rose to be a major tool for cybercrime and their developers proved to be highly resourceful.

group_project

Visible to the public EAGER: USBRCCR: Researching Internet Routing Security in the Wild

The Internet provides a control plane to establish routes to destinations and a data plane to send traffic, and the protocols for both lack authentication. The lack of authentication allows networks to claim ownership of routes to other networks' addresses in order to siphon traffic (prefix hijacking), and allows devices to claim that their traffic came from a different source (source spoofing). These vulnerabilities form the basis for denial-of-service attacks, traffic interception and snooping, Bitcoin theft, and compromises of Tor's anonymity.

group_project

Visible to the public EAGER: Designing Novel Polymorphic Gates as Hardware Security Primitives

Conventional digit logic gates will generate a deterministic output signal for a given set of input signals (called input vector). Polymorphic gates are different in the sense that their output for the same input vector may vary depending on the operating environment such as temperature, voltage, and humidity. So we can consider polymorphic gates as logic gates that can implement multiple functions and behave as one of them according to certain controllable factors. This happens because polymorphic gates have unconventional structure at the transistor level.

group_project

Visible to the public EAGER: Secure Workflow Provenance for Collaborative Data Analytics

Collaborative data analysis has become a necessity and trend in the era of big data. In such collaborative environments, intellectual property protection mechanisms are critical to maintain and encourage research partnerships. Such mechanisms shall protect not only data sources and data analysis algorithms, but also protect data provenance, i.e., data processing history. For example, participating parties may request to secure their access and sharing of various kinds of data products (source, intermediate, and final), processing steps, and their inter-dependencies.