Small

group_project

Visible to the public SaTC: TTP: Small: Mobile Dynamic Privacy and Security Analysis at Scale

The International Computer Science Institute (ICSI) is developing a framework to automatically detect privacy violations in mobile applications. The project leverages prototype work in augmenting the Android operating system with instrumentation to detect when applications access sensitive user data, what they do with it, and with whom they share it. The project modifies this system to support the analysis of thousands of applications in parallel, through virtualization.

group_project

Visible to the public SaTC: CORE: Small: RUI: Differentially Private Hypothesis Testing

In today's world, private companies, hospitals, governments, and other entities frequently maintain large databases that would be hugely valuable to researchers in many fields. However, privacy concerns prevent these databases from being fully utilized. Differential privacy defines conditions under which information about these databases can be released while provably protecting the privacy of the individuals whose data they contain. This project develops differentially private hypothesis tests.

group_project

Visible to the public SaTC: CORE: Small: Secure Computation on Large Data

This project focuses on secure computation protocols that can efficiently compute on large data. Secure computation is a fundamental and very general notion in cryptography that captures privacy-preserving computation of any algorithm on data which originates from multiple sources and should be kept private except for what is revealed by the computation output.

group_project

Visible to the public SaTC: CORE: Small: Machine Learning for Effective Fuzz Testing

In recent years, fuzz testing has evolved as one of the most effective testing techniques for finding security vulnerabilities and correctness bugs in real-world software systems. It has been used successfully by major software companies for security testing and quality assurance. State-of-the-art fuzz testing tools have found numerous security vulnerabilities and bugs in widely used software such as Web browsers, network tools, image processors, popular system libraries, C compilers, and interpreters.

group_project

Visible to the public SaTC: CORE: Small: URadio: Towards Secure Smart Home IoT Communication Using Hybrid Ultrasonic-RF Radio

Recent years have seen the explosion of smart home Internet-of-Things (IoT) devices and platforms, underscoring the need to address security and privacy of smart home communications. The demand for IoT devices (e.g., smart speakers, locks, and activity trackers) is occurring while radio spectrum, a necessary ingredient for wireless service, becomes increasingly scarce. As a result, multiple wireless technologies coexist and compete for spectrum resources, resulting in degraded spectrum efficiency and security.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Oblivious ISAs for Secure and Efficient Enclave Programming

Computing on personal data is critical for both personal and social good. For example, we write programs that predict early onset medical conditions and detect the spread of diseases before they become epidemics. However, such computing is fraught with privacy concerns because programs, and the hardware they run on, create a trail of clues that an attacker can observe to reconstruct personal data without ever seeing the data directly. This project will create computer systems that proactively leave no clues, i.e., no side-effects that can leak personal secrets.

group_project

Visible to the public SaTC: CORE: Small: Usable Key Management and Forward Secrecy for Secure Email

Sending and receiving information securely online is a basic need in our connected world. However, one of the most frequently used online applications, email, remains largely insecure for all but the most expert users. The researchers will gather data to better understand why users do not adopt secure email. They will also identify the most practical, usable practices for users to safeguard their secure email from hackers, and make sure they do not lose access to their secure email by forgetting the password or key that unlocks their sensitive emails.

group_project

Visible to the public SaTC: CORE: Small: An Attribute-based Insider Threat Mitigation Framework

Defending against a malicious insider who attempts to abuse his computer privileges is one of the most critical problems facing the information security segment. This is because the damage inflicted is potentially catastrophic. While the insider threat is of increasing interest in the research community, major challenges remain in addressing aspects specific to information infrastructure protection. This project aims to develop an innovative, demonstrable approach to mitigate insider threats to an organization.

group_project

Visible to the public SaTC: CORE: Small: Adversarial ML in Traffic Analysis

Surveillance and tracking on the Internet are growing more pervasive and threaten privacy and freedom of expression. The Tor anonymity system protects the privacy of millions of users, including ordinary citizens, journalists, whistle-blowers, military intelligence, police, businesses, and people living under censorship and surveillance. Unfortunately, Tor is vulnerable to website fingerprinting (WF) attacks in which an eavesdropper uses a machine learning (ML) classifier to identify which website the user is visiting from its traffic patterns.

group_project

Visible to the public SaTC: CORE: Small: Characterizing Architectural Vulnerabilities

Software architecture plays a fundamental role in addressing security requirements by enforcing the necessary authentication, authorization, confidentiality, data integrity, privacy, accountability, availability and non-repudiation requirements, even when the system is under attack. Therefore, a design flaw in a software system's architecture could lead to attacks with enormous consequences. Most of the research, techniques, and tools that address security focus on secure coding.