Small

group_project

Visible to the public SaTC: CORE: Small: RUI: An Exploratory Study of Technology Adoption in K-12: Educational Benefits vs Privacy Costs

This project explores technology adoption practices and interactions and the digital data literacy of education technology adoption decision makers in California K-12 public school districts. Data profiles constructed from the comingling of data from many sources (school, home, mobile technology) can follow the individual through his or her lifetime.

group_project

Visible to the public SaTC: CORE: Small: Modular, Efficient, Homomorphic Cryptography

Modern computer applications require not only to protect data using encryption, but also to perform computations on data in encrypted form, e.g., in a cloud computing setting where private data is stored and processed on a remote, untrusted server.

group_project

Visible to the public SaTC: CORE: Small: Cybersecurity Big Data Research for Hacker Communities: A Topic and Language Modeling Approach

It is estimated that cybercrime costs the global economy around $445 billion annually, particularly due to intellectual property theft and financial fraud using stolen consumer data. Incidents of large-scale hacking and data theft occur regularly, with many cyberattacks resulting in theft of sensitive personal information or intellectual property. Cybersecurity will remain a critical problem for the foreseeable future, necessitating more research on a large, diverse, covert and evolving international hacker community.

group_project

Visible to the public SaTC: CORE: Small: Trustworthy System-On-Chip Design using Secure On-Chip Communication Architecture

System-on-Chip (SoC) is the driving force behind computing and communication in a wide variety of electronic systems, ranging from simple devices in smart homes to complex systems in satellites. Network-on-Chip (NoC) is a commonly used solution for on-chip communication between components in complex SoCs. To meet cost and time-to-market constraints, SoCs are designed using various hardware components, often gathered from untrusted third-party vendors. Despite increasing importance of trusted communication in overall system security, NoC security is relatively under-investigated.

group_project

Visible to the public SaTC: CORE: Small: Black-Box Flaw Discovery in Web Authentication and Authorization Mechanisms

Technical advancements in modern smartphones and the widespread availability of Internet on-the-go have resulted in the world wide web becoming an inextricable part of everyday lives, pervading professional, social and personal activities. At the core of all this lies the ability to identify (i.e., authenticate) users and devices and allowing (i.e., authorizing) them to access accounts and sensitive resources.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Trustworthy Hierarchical Edge Computing

Edge computing has quickly risen as an effective paradigm to capture, process, gain insights from, and act upon the massive amount of Internet of Things (IoT) data close to where it is generated. Future edge computing systems are expected to be hierarchical and heterogeneous. It will become increasingly common for a single IoT application to utilize edge computing resources owned by multiple entities.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Trustworthy Hierarchical Edge Computing

Edge computing has quickly risen as an effective paradigm to capture, process, gain insights from, and act upon the massive amount of Internet of Things (IoT) data close to where it is generated. Future edge computing systems are expected to be hierarchical and heterogeneous. It will become increasingly common for a single IoT application to utilize edge computing resources owned by multiple entities.

group_project

Visible to the public SaTC: CORE: Small: Meta Coding and Applications in Cryptography

The fields of coding theory and cryptography are intertwined, with each field influencing the other: Certain error correcting codes from coding theory are equivalent to a type of secret sharing scheme used in cryptography to achieve secure multiparty computation. Other types of coding/secret sharing schemes (such as non-malleable codes and leakage-resilient secret sharing) were first proposed to solve security problems arising in cryptographic settings. There are currently many variants of coding/secret sharing schemes, and most of the constructions are complex or ad-hoc.

group_project

Visible to the public SaTC: CORE: Small: Finding and Mitigating Side-channel Leakage in Embedded Architectures

Electronic devices found in a smart home, automobile, airplane, medical, and industrial applications are becoming more capable of on-the-spot processing information with their own embedded processors. While embedded processors make life easier, they also open the door to theft or corruption of our sensitive data. Malign actors can monitor power or radiation signatures in and around a device, and discover its secrets using side-channel attacks.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Learning Dynamic and Robust Defenses Against Co-Adaptive Spammers

Online reputation systems are ubiquitous for customers to evaluate businesses, products, people, and organizations based on reviews from the crowd. For example, Yelp and TripAdvisor rank restaurants and hotels based on user reviews, and RateMDs allows patients to review doctors and hospitals. These systems can however be leveraged by spammers to mislead and manipulate the inexperienced customers with fake but well-disguised reviews (spams). To comprehensively protect customers and honest businesses, advanced spam detection techniques have been deployed.