Visible to the public EAGER: A User-Centric Approach to the Design of Intelligent Fake Website Detection Systems

Fake websites have emerged as a major source of online fraud, accounting for billions of dollars in fraudulent revenue at the expense of unsuspecting Internet users. Existing tools for combating fake websites are not very accurate, are limited in terms of the categories and genres of fake websites they detect, and lack adequate usability?often causing users to disregard their recommendations.


Visible to the public TC: EAGER: Collaborative Research: Parallel Automated Reasoning

The security of the national computing infrastructure is critical for consumer confidence, protection of privacy, protection of valuable intellectual property, and even national security. Logic-based approaches to security have been gaining popularity, in part because they provide a precise way to describe and reason about the kinds of complexity found in real systems. Perhaps even more importantly, automated reasoning techniques can be used to assist users in navigating this complexity. Despite the promise of automated reasoning, its use in practical applications is still limited.


Visible to the public Usability of Voting Systems

This research investigates the usability of a number of remote voting platforms that are among the most viable candidates for fielding as states begin to consider the implementation of remote voting. The main focus of these usability studies is on the use of impoverished-display handheld mobile computers (i.e. smartphones) and traditional landline telephony interfaces delivered using interactive voice response systems, although vote-by-mail, kiosk, personal PC and hybrid systems are also being studied.


Visible to the public Reconciling Post-Election Auditing with the Secret Ballot

A fundamental tension exists between transparency and privacy in electronic voting. Electoral transparency requires access to primary voter records, so observers can be sure that the election was run appropriately. Ballot privacy---keeping ballot contents separate from information that can identify the voter---is required to prevent coercion and vote-selling. If we discard either transparency or privacy, voting becomes much simpler: without transparency, ballots can be perfectly private; with no privacy requirement, elections can be perfectly transparent.


Visible to the public Auditing Voting Systems While Preserving Secrecy and Anonymity

Election auditing verifies that the systems and procedures work as intended, and that the votes have been counted correctly. If a problem arises, forensic techniques enable auditors to determine what happened and how to compensate if possible. Current audit trails record incomplete information, or unnecessary information, thereby hindering validation of the election results and the correctness of the process, and determination of the causes and effects of problems.


Visible to the public Investigating Network Testbed Usage

Network testbeds have revolutionized evaluation practices in computer science.

Over the last decade many diverse testbeds have been built throughout the world, and the trend of building faster, bigger, and more diverse testbeds continues. On the other hand, there have been no studies on testbed use. Specifically, who uses testbeds, for what types of research, and what are the use patterns and practices.

Answering these question would help testbed builders and funders understand the impact of their work and direct their efforts to maximize the payoff.


Visible to the public Eager: Automated Synthesis for System Design

Synthesis is the process of computing an implementation from a specification of the desired behavior, performance, and security and privacy properties. This ideal form of system design has been a long-standing dream in computer science. The goal of this project is to realize the dream of synthesis, in the same way that current tools for program analysis and model checking realize the dream of verifying program correctness.


Visible to the public CNS: EAGER: All Trust is Local: User-Oriented Trust Establishment

For many current Internet applications, users experience a crisis of confidence. Is the website really served from the correct server or was it altered in transit? Is the Facebook invitation really originating from the claimed individual or was it created by an impostor? Is the received email from the claimed individual or was it sent by a spammer? The PI's proposed work is based on the observation that individuals often have physical interactions with resources or other individuals they communicate with. Often, people communicate over the Internet after having met in person.


Visible to the public EAGER: Fingerprinting RFID Tags with Transfer-of-Ownership Capabilities

Passive radio frequency identification (RFID) tags, which do not have on-tag power sources, have become the standard mechanism for identifying countless objects. Currently, two security-related capabilities are missing from these tags: authentication and transfer-of-ownership.

In this project, the PIs propose to re-define the authentication of an RFID tag from being something the tag knows to being something the tag is.


Visible to the public TC: EAGER: New Privacy Preserving Architecture for Security Monitoring in Cloud Computing

This research studies new mechanisms for enabling the consumer of the service to reduce the visibility of consumer computations to the service provider and thereby reduce the trust that the consumer places in the provider. At the same time, the mechanisms allow security of the cloud computing environment to be monitored by a trusted third party. The work also develops a quantified method to evaluate the degree to which a user's privacy is disclosed and tools for monitoring causality relationships.