EAGER

group_project

Visible to the public EAGER: Collaborative: Policies for Enhancing U.S. Leadership in Cyberspace

Cybersecurity is threatened by the zero-day exploits (software vulnerabilities that have not been previously disclosed and are therefore potential vectors for attack). The threat is serious for exploits in the hands of major cyber powers that are potentially hostile nations. Publication of a zero-day exploits can enhance the resilience of domestic cyber-infrastructure (if an adversary has discovered the same exploit), and it could give other countries the opportunity to patch their systems proactively, increasing confidence that they will not be penetrated.

group_project

Visible to the public EAGER: Physical, Social and Situational Factors as Determents of Public WiFi Users Online Behaviors

The proliferation of public WiFi networks allows users to access the Internet from various public locations. Unfortunately, many public WiFi networks are unencrypted and insecure, posing risks to users' security and privacy, and allowing users to potentially initiate illegal online behaviors.

group_project

Visible to the public EAGER: Collaborative: Understanding How Manipulated Images Influence People

As an abundance of hardware and software tools is dramatically decreasing the cost and effort required to manipulate digital images, the risks and dangers associated with malicious attackers easily routing doctored images through computer and social networks to purposefully influence viewers' opinions, attitudes, and actions have never been more severe.

group_project

Visible to the public  EAGER: Age-Targeted Automated Cueing Against Cyber Social Engineering Attacks

Online social engineering attacks have been often used for cybercrime activities. These attacks are low cost and complicate attack attribution. Pure technical defense solutions cannot counter them, which rely on human gullibility. Humans often engage in short-cut decision-making, which can lead to errors. Another expectation is that users should be able to understand complex security tips, which do not consider user demographics. User age has been overlooked in understanding these attacks and user behavior related to them.

group_project

Visible to the public SaTC-EDU: EAGER: Enhancing Cybersecurity Education through Peer Review

Peer-review is a well-known process by which peers evaluate one another's work. In educational settings, peer review involves students evaluating the work of classmates. Peer evaluations can serve many educational purposes: they foster comprehension skills (as students read the work of others), encourage self-assessment and meta-reflection (as students contrast their solutions to others'), demand synthesis of comments from multiple perspectives (as students combine feedback from multiple reviews), and develop professional skills around giving and receiving critique from colleagues.

group_project

Visible to the public  EAGER: Digital Interventions for Reducing Social Networking Risks in Adolescents

Adolescents are at higher risk of engaging in risky behaviors in online social networks. This project develops digital intervention solutions to motivate, educate, support and engender safe social networking behaviors among adolescents. It significantly extends the current understanding of adolescent motivations for engaging in risky online behaviors and the state-of-the-art solutions for reducing adolescent exposure to such behaviors.

group_project

Visible to the public EAGER: Collaborative: Holistic Security for Cloud Computing: Oblivious Computation

One of the main impediment to a wider adoption of cloud storage and computing services is the need to keep data private. Recently, several research communities have begun exploring new techniques that allow a client to outsource storage and computation over private data to a potentially untrusted cloud service, while maintaining the privacy of the data.

group_project

Visible to the public EAGER: Self-Uncertainty in Mechanism Design

Mechanism design aims to make the best decisions when the necessary data is in the hands of selfish players with different motives and incentives. A mechanism specifies what each player may report and a way to select the outcome from the players' reports. Although mechanism design was originally developed to study auctions in the field of finance, interest in mechanism design arose from its potential in the design of protocols for large distributed heterogeneous systems where the preferences of people and organizations influenced the outcome of the protocol.

group_project

Visible to the public EAGER: Collaborative: A Research Agenda to Explore Privacy in Small Data Applications

One of the crucial ideas behind Privacy by Design (PbD) is that privacy should be taken into consideration in the process of design, not merely after-the-fact, as so often happens. Yet, this ideal has failed to gain widespread practical traction, challenged, in part, by the lack of developed methodologies and also because of privacy's conceptual complexity, which hampers its operationalization.

group_project

Visible to the public EAGER: Factoring User Behavior into Network Security Analysis

The project will investigate human factors in network security. The security of network systems relies on proper protection from not only known vulnerabilities, but also new vulnerabilities resulting from unexpected human behavior. The project will directly address a user's situational behavior and its consequence on network security. It engages in the challenges of modeling decision-making process and integrating it in the human-network interaction.