Small

group_project

Visible to the public SaTC: CORE: Small: Detecting and Mitigating Unintended Learning

Machine learning is fueling major advances in biomedical research, natural language processing, image recognition, self-driving vehicles, etc. These advances depend on the continuing availability of data. By assuring the integrity and privacy of both the data and the machine learning models based on this data, this project aims to bring the benefits of machine learning to all data holders. However, machine learning can unintentionally reveal sensitive data such as the identity of specific persons.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Understanding Law-Enforcement Cyber Investigations

Numerous challenges confront law enforcement investigations and prosecutions of cybercrime offenses, including under-reporting by victims, jurisdictional conflicts and limitations, insufficient resources, training, and expertise, as well as organizational constraints. This research is a study of cybercrime investigators, their departments, and the challenges they face in fighting cybercrime. The research consists of social scientific research on how law enforcement investigators and their units conduct cybercrime investigations.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Understanding Law-Enforcement Cyber Investigations

Numerous challenges confront law enforcement investigations and prosecutions of cybercrime offenses, including under-reporting by victims, jurisdictional conflicts and limitations, insufficient resources, training, and expertise, as well as organizational constraints. This research is a study of cybercrime investigators, their departments, and the challenges they face in fighting cybercrime. The research consists of social scientific research on how law enforcement investigators and their units conduct cybercrime investigations.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Hardware Architectures for Post-Quantum Cryptography

This research project develops new hardware designs and implementations for a class of post-quantum secure cryptographic (PQC) algorithms. While today's algorithms used for public key cryptography, e.g. the RSA algorithm, or digital signatures are vulnerable to being broken through "cryptanalysis" using quantum computers, PQC algorithms offer protections from such cryptanalysis as they cannot be broken on a quantum computer.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Hardware Architectures for Post-Quantum Cryptography

This research project develops new hardware designs and implementations for a class of post-quantum secure cryptographic (PQC) algorithms. While today's algorithms used for public key cryptography, e.g. the RSA algorithm, or digital signatures are vulnerable to being broken through "cryptanalysis" using quantum computers, PQC algorithms offer protections from such cryptanalysis as they cannot be broken on a quantum computer.

group_project

Visible to the public SBE: Small: Behavioral Control of Deceivers in Online Attacks

Online attacks can cause not only temporary asset loss, but long-term psychological or emotional harm to victims as well. The richness and large scale of online communication data open up new opportunities for detecting online attacks. However, attackers are motivated to constantly adapt their behaviors to changes in security operations to evade detection. Deception underlies most attacks in online communication, and people are poor at detecting deception.

group_project

Visible to the public SaTC: CORE: Small: RUI: Improving Performance of Standoff Iris Recognition Systems Using Deep Learning Frameworks

The iris of the eye enables one of the most accurate, distinctive, universal, and reliable biometrics for authenticating the identity of a person. However, the accuracy of iris recognition depends on the quality of data acquisition, which is negatively affected by the angle of view, occlusion, dilation, and other factors. Since standoff iris recognition systems are much less constrained than traditional systems, the captured iris images are likely to be off-angle, dilated, and otherwise less than ideal.

group_project

Visible to the public SBE TWC: Small: Collaborative: Pocket Security - Smartphone Cybercrime in the Wild

Most of the world's internet access occurs through mobile devices such as smart phones and tablets. While these devices are convenient, they also enable crimes that intersect the physical world and cyberspace. For example, a thief who steals a smartphone can gain access to a person?s sensitive email, or someone using a banking app on the train may reveal account numbers to someone looking over her shoulder. This research will study how, when, and where people use smartphones and the relationship between these usage patterns and the likelihood of being a victim of cybercrime.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Enabling Precise and Automated Insecurity Analysis of Middleware on Mobile Platforms

During the past decade, middleware on mobile platforms (such as the Application Framework in Android and the Core Services layer in iOS) has been flourishing, but the insecurity analysis of such middleware has been lagging behind. For example, while comprehensive studies have been conducted at the application layer of the Android system, there is very limited work analyzing the Android Application Framework (Android Framework, for short), a middleware layer in the Android system.

group_project

Visible to the public SaTC: CORE: Small: Secure and Efficient Solutions for Post-Quantum Cryptography for Codes with Compact Representations

Current public-key cryptography is based on well-known problems from the area of mathematics called Number Theory. These problems are vulnerable to attacks able to exploit the superior computational power of Quantum computers (such as Shor's algorithm). Small Quantum computers are already a reality, and the cryptographic community is currently hard at work to design the new cryptographic standards which will become actual once sufficiently large Quantum computers finally become available, making current cryptographic solutions obsolete.