Activity Stream

Recent Posts

group_project

Visible to the public Shared Perceptual Visualizations For System Security

We are studying how to harness human visual perception in information display, with a specific focus on ways to combine layers of data in a common, well-understood display framework. Our visualization techniques are designed to present data in ways that are efficient and effective, allowing an analyst to explore large amounts of data rapidly and accurately.

TEAM

PI: Christopher G. Healey
Student: Terry Rogers

group_project

Visible to the public Quantifying Mobile Malware Threats

In this project, we aim to systematize the knowledge base about existing mobile malware (especially on Android) and quantify their threats so that we can develop principled solutions to provably determine their presence or absence in existing marketplaces. The hypothesis is that there exist certain fundamental commonalities among existing mobile malware.

group_project

Visible to the public Towards a Scientific Basis for User Center Security Design

Human interaction is an integral part of any system. Users have daily interactions with a system and make many decisions that affect the overall state of security. The fallibility of users has been shown but there is little research focused on the fundamental principles to optimize the usability of security mechanisms. We plan to develop a framework to design, develop and evaluate user interaction in a security context.

group_project

Visible to the public Spatiotemporal Security Analytics and Human Cognition

A key concern in security is identifying differences between human users and "bot" programs that emulate humans. Users with malicious intent will often utilize wide-spread computational attacks in order to exploit systems and gain control. Conventional detection techniques can be grouped into two broad categories: human observational proofs (HOPs) and human interactive proofs (HIPs).

group_project

Visible to the public Studying Latency and Stability of Closed-Loop Sensing-Based Security Systems

In this project, our focus is on understanding a class of security systems in analytical terms at a certain level of abstraction. Specifically, the systems we intend to look at are (I) multipath routing (for increasing reliability), (ii) dynamic firewalls. For multipath routing, the threat scenario is jamming - the nodes that are disabled due to the jamming take the place of compromised components in that they fail to perform their proper function. The multipath and diverse path mechanisms are inten

group_project

Visible to the public Understanding the Fundamental Limits in Passive Inference of Wireless Channel Characteristics

It is widely accepted that wireless channels decorrelate fast over space, and half a wavelength is the key distance metric used in existing wireless physical layer security mechanisms for security assurance. We believe that this channel correlation model is incorrect in general: it leads to wrong hypothesis about the inference capability of a passive adversary and results in false sense of security, which will expose the legitimate systems to severe threats with little awareness.

group_project

Visible to the public Attaining Least Privilege Through Automatic Partitioning of Hybrid Programs

This project investigates the hard problem of resilient architectures from the standpoint of enabling new potential for incorporating privilege separation into computing systems. However, privilege separation alone is insufficient to achieve strong security guarantees. It must also include a security policy for separated components without impacting the functional requirements of the system.

group_project

Visible to the public Developing a User Profile to Predict Phishing Susceptibility and Security Technology Acceptance

Phishing has become a serious threat in the past several years, and combating it is increasingly important. Why do certain people get phished and others do not? In this project, we aim to identify the factors that cause people to be susceptible and resistant to phishing attacks. In doing so, we aim to deploy adaptive anti-phishing measures.

group_project

Visible to the public Empirical Privacy and Empirical Utility of Anonymized Data

TEAM

PI: Ting Yu
Students: Xi Gong, Entong Shen

group_project

Visible to the public Argumentation as a Basis for Reasoning about Security

This project involves the application of argumentation techniques for reasoning about policies, and security decisions in particular. Specifically, we are producing a security-enhanced argumentation framework that (a) provides not only inferences to draw but also actions to take; (b) considers multiparty argumentation; (c) measures the mass of evidence on both attacking and supporting arguments in order to derive a defensible conclusion with confidence; and (d) develops suitable critical questions as the basis for argumentation.