Search SaTC Projects

Project Title Lead PI Project Abstract Keywords Last Updatedsort icon
SaTC: CORE: Small: Cybersecurity Big Data Research for Hacker Communities: A Topic and Language Modeling Approach Hsinchun Chen It is estimated that cybercrime costs the global economy around $445 billion annually, particularly due to intellectual property theft and financial fraud using stolen consumer data. Incidents of large-scale hacking and data theft occur regularly, with... Small, Division of Computer and Network Systems (CNS), CORE Jul 6 2020 - 4:07pm
CAREER: Enhancing Mobile Authentication by Measuring the Authentication Life-Cycle Adam Aviv This CAREER research focuses on human factors in authentication using mobile devices. Mobile authentication is a crucial component of authentication, especially as mobile devices become ever more connected to the broader security ecosystem. A major... CAREER, Division of Computer and Network Systems (CNS) Aug 26 2019 - 2:58pm
SaTc: EDU: Collaborative: An Assessment Driven Approach to Self-Directed Learning in Secure Programming (SecTutor) Matt Bishop The field of software development needs developers to write secure code, as well as to continuously respond to evolving threats and adapt system designs to meet new security needs. This requires developers to gain a deep understanding of foundational... Collaborative, Division of Graduate Education (DGE), EDU Aug 13 2019 - 12:16pm
SaTC: CORE: Medium: Collaborative: Taming Memory Corruption with Security Monitors Manuel Egele Modern computing systems are under constant attack by organized crime syndicates, nation-state adversaries, and regular cyber-criminals alike. Among the most damaging attacks are those that exploit so-called memory corruption vulnerabilities which often... Medium, Collaborative, Division of Computer and Network Systems (CNS), CORE Aug 7 2019 - 1:59pm
CAREER: Formal TOols foR SafEty aNd Security of Industrial Control Systems (FORENSICS) Hoda Mehrpouyan The goal of the project is to develop a multi-layer security framework to provide control technicians and engineers with far superior mechanisms to address the increasing risk of cybersecurity attack on vulnerable water treatment plants and reduce latent... CAREER, Division of Computer and Network Systems (CNS) Aug 7 2019 - 12:42pm
CAREER: Algebraic Methods for the Computation of Approximate Short Vectors in Ideal Lattices Jean-Francois Biasse This project involves research into the computational hardness of the search for short elements of the so-called Euclidean lattices. The hardness of this task is the measure of the security of one of the most promising family of cryptographic protocols... CAREER, Division of Computer and Network Systems (CNS) Aug 7 2019 - 12:40pm
CAREER: Explorable Formal Models of Privacy Policies and Regulations Christopher Martens Data collection and analysis enable great advancements in digital technology, but the stewards of this data have a responsibility to society to ensure that the practices of collection, storage, and user control abide by user expectations. Policies and... CAREER, Division of Computer and Network Systems (CNS) Aug 7 2019 - 12:36pm
CAREER: Efficient Fuzzing with Neural Program Smoothing Suman Jana Fuzzing is an automated software testing technique that involves feeding a stream of invalid, unexpected, or rare data as inputs to a computer program for discovering bugs leading to crashes, assertion failures, or memory corruption. Fuzzing is the de... CAREER, Division of Computer and Network Systems (CNS) Aug 7 2019 - 12:33pm
CAREER: FormalDP: Formally Verified, Private, Accurate and Efficient Data Analysis Marco Gaboardi Data-driven technology is having an impressive impact on society but privacy concerns restrict the way data can be used and released. Differential privacy has emerged as a leading notion supporting efficient and accurate data analyses that respect privacy... CAREER, Division of Computer and Network Systems (CNS) Aug 7 2019 - 12:30pm
CAREER: Amplifying Developer-Written Tests for Code Injection Vulnerability Detection Jonathan Bell Code injection vulnerabilities are a class of security vulnerabilities that have been exploited increasingly often, including in the high-profile 2017 Equifax breach as well as in many recent attacks on our country's election and financial systems. These... CAREER, Division of Computer and Network Systems (CNS) Aug 7 2019 - 12:22pm
CAREER: Towards Elastic Security with Safe and Efficient Network Security Function Virtualization Hongxin Hu Traditional network security functions are generally implemented on vendor proprietary appliances or middleboxes, which usually lack a general programming interface, and their versatility and flexibility are also very poor. These traditional network... CAREER, Division of Computer and Network Systems (CNS) Mar 18 2019 - 3:45pm
CAREER: Securing Mobile Devices by Hardening their System Software Sani Ardalan Amiri Modern mobile devices, such as smartphones, tablets, and wearables, are targets of an increasing number of security attacks. Moreover, according to Google, an increasing number of attacks on (Android-based) mobile devices are targeting the operating... CAREER, Division of Computer and Network Systems (CNS) Mar 18 2019 - 3:42pm
CAREER: Trustworthy Machine Learning from Untrusted Models Ting Wang Many of today's machine learning (ML)-based systems are not built from scratch, but are "composed" from an array of pre-trained, third-party models. Paralleling other forms of software reuse, reusing models can both speed up and simplify the development... CAREER, Division of Computer and Network Systems (CNS) Mar 18 2019 - 3:24pm
CAREER: Enhancing the User Experience of Privacy Preference Specification Sameer Patil The privacy settings provided by people's computers and mobile devices are the primary means by which users engage in privacy management. The constant stream of privacy related scandals and controversies highlight the challenges people face in... CAREER, Division of Computer and Network Systems (CNS) Mar 18 2019 - 3:17pm
CAREER: Utilizing Principles of Energy Recovery Computing for Low-Energy and DPA-Resistant IoT Devices Himanshu Thapliyal This project will develop circuit design techniques for energy-recovery circuits and a library of such design cells to facilitate low-power implementation of block cipher for mobile Internet-of-Things (IoT) devices, where reducing power consumption is... CAREER, Division of Computer and Network Systems (CNS) Mar 18 2019 - 2:47pm
CT-ISG: An Architecture and Policies for Secure Network-facing Applications Samuel King The near ubiquity of Internet access has put a wealth of information and ever-increasing opportunities for social interaction at the fingertips of users. Driving this revolution is the modern web browser, which has evolved from a relatively simple client... Division of Computer and Network Systems (CNS), ISG Feb 22 2019 - 3:31pm
CT-T: Proactive Techniques for Preserving System Integrity: A Basis for Robust Defense Against Malware Ramasubramanian Sekar Cyber threats have escalated rapidly over the past decade. "Zero-day attacks" have become significant, delivered increasingly through seemingly innocuous means such as web pages, images, and documents. Malware is rampant, being installed surreptitiously... Division of Computer and Network Systems (CNS) Feb 22 2019 - 3:29pm
CT-ISG: Usable Cyber Trust Indicators Lorrie Cranor When systems rely on a "human in the loop" to carry out a security-critical function, cyber trust indicators are often employed to communicate when and how to perform that function. Indicators typically serve as warnings or status indicators that... Division of Computer and Network Systems (CNS), ISG Feb 22 2019 - 3:27pm
CT-ISG: SPEAR: Space Encryption based Query Processing for Privacy-Aware Location-based Services Wei-Shinn Ku As a result of recent wireless technology advances, mobile devices with significant computational abilities, gigabytes of storage capacities, and wireless communication capabilities have increasingly become popular. In addition, positioning techniques... Division of Computer and Network Systems (CNS), ISG Feb 22 2019 - 3:26pm
TWC: Small: Collaborative: Toward Trusted Third-Party Microprocessor Cores: A Proof Carrying Code Approach Yier Jin Third-party hardware Intellectual Property (IP), written as code in a Hardware Description Language (HDL), is extensively used in modern integrated circuits. Contemporary electronics typically include 75% of third party hardware IP and only 25% in-house... Hardware, Research Infrastructure, Small, Transition to Practice, Deter, Division of Computer and Network Systems (CNS), Protect, TWC Feb 14 2019 - 3:09pm