Authentication

group_project

Visible to the public EAGER: Exploring the Use of Deception to Enhance Cyber Security

Our computing systems are constantly under attack, by everyone from pranksters to agents of hostile nations. Many of those systems and networks make the task of the adversary easier by responding to attacks with useful information. This is because software and protocols have been written for decades to provide informative feedback for error detection and correction. It is precisely this behavior that enhances the chances of success by attackers, by allowing them to map networks and determine system flaws.

group_project

Visible to the public TWC: Small: Collaborative: RUI: Towards Energy-Efficient Privacy-Preserving Active Authentication of Smartphone Users

Common smartphone authentication mechanisms such as PINs, graphical passwords, and fingerprint scans offer limited security. They are relatively easy to guess or spoof, and are ineffective when the smartphone is captured after the user has logged in. Multi-modal active authentication addresses these challenges by frequently and unobtrusively authenticating the user via behavioral biometric signals, such as touchscreen interaction, hand movements, gait, voice, and phone location.

group_project

Visible to the public Forum on Cyber Resilience

This project provides support for a National Academies Roundtable, the Forum on Cyber Resilience. The Forum will facilitate and enhance the exchange of ideas among scientists, practitioners, and policy makers concerned with the resilience of computing and communications systems, including the Internet, critical infrastructure, and other societally important systems.

group_project

Visible to the public TWC: TTP Option: Small: Collaborative: Scalable Techniques for Better Situational Awareness: Algorithmic Frameworks and Large-Scale Empirical Analyses

Attacks on computer networks are an all too familiar event, leaving operators with little choice but to deploy a myriad of monitoring devices to ensure dependable and stable service on the networks they operate. However, as networks grow bigger and faster, staying ahead of the constant deluge of attack traffic is becoming increasingly difficult. A case in point is the attacks on enterprise name servers that interact with the Domain Name System (DNS). These name servers are critical infrastructure, busily translating human readable domain names to IP addresses.

group_project

Visible to the public  SBE: Option: Small: Safety for the Ages: Generational Differences in Motivations to Use Security Protections in an Online Banking Context

How does the average user cope with the threats they encounter while engaged in the most sensitive of all online activities, online banking? Online Safety for the Ages (OSA) examines generational differences in motivations to use risky online services and self-protective measures in the context of online banking. An influx of older adults attracted to the Internet by social media but at times unfamiliar with dealing with the hazards of online life, as well as younger users who are sometimes oblivious to those dangers, pose distinct challenges to the preservation of online safety.

group_project

Visible to the public TWC: Small: Middleware for Certificate-Based Authentication

Every time someone uses a phone or computer to connect to an Internet site, software determines whether the connection is safe or being intercepted by attackers. Unfortunately, this software is error-prone, leaving users vulnerable to having their privacy violated or their personal information stolen due to phishing attacks, identity theft, and unauthorized inspection of their encrypted traffic. A number of solutions are being proposed, but the software is fragmented across many platforms and redundantly or incorrectly implemented.

group_project

Visible to the public SaTC: STARSS: Design of Secure and Anti-Counterfeit Integrated Circuits

Hardware security, whether for attack or defense, differs from software, network, and data security in that attackers may find ways to physically tamper with devices without leaving a trace, and mislead the user to believe that the hardware is authentic and trustworthy. Furthermore, the advent of new attack modes, illegal recycling, and hard-to-detect Trojans make hardware protection an increasingly challenging task. Design of secure hardware integrated circuits requires novel approaches for authentication that are ideally based on multiple layers of protection.

group_project

Visible to the public TWC: Medium: Secure and Resilient Vehicular Platooning

The goal of the project is to provide a secure foundation for a transportation system that increasingly relies on the cooperation, connectedness, and automation of vehicles to achieve increases in safety, efficiency, and capacity. The financial losses attributable to congestion in America's transportation infrastructure are more than $1 trillion annually and the parallel loss of life in vehicle collisions is 40,000 deaths per year.

group_project

Visible to the public CAREER: EASE: Enhancing the Security of Pervasive Wireless Networks by Exploiting Location

Wireless systems have become an inseparable part of our social fabric, which allow users to move around and access the services from different locations while on the move. However, wireless security is often cited as a major technical barrier that must be overcome before widespread adoption of mobile services can occur. Traditional approaches have focused on addressing security threats on a case-by-case basis in an ad-hoc manner as new and specialized threats are uncovered.

group_project

Visible to the public EAGER: Model Driven Framework for Audio Forensics

The goal of this project is to investigate the reliability, robustness, and computationally efficiency of digital audio forensic methods under various adversarial conditions, e.g., lossy compression attack. We aim to identify and develop mathematical tools for modeling and characterizing of microphone nonlinearities (fingerprints), statistical methods for acoustic environment estimation, and system identification based framework for linking an acquisition device to the audio recording.