Small

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Building Sophisticated Services with Programmable Anonymity Networks

This project designs and implements programmable system elements to be run within the anonymity networks, such as Tor (The Onion Routing network). The central idea is that users can inject new code into the network that is then run within a protected execution environment. The motivation is to enable the creation of new and significantly enhanced anonymity services, such as content distribution networks, of use in today's and future anonymity networks.

group_project

Visible to the public SaTC: CORE: Small: Wireless Hardware Analog Encryption for Secure, Ultra Low Power Transmission of Data

Data encryption is a process to transmit sensitive information over a public channel such as a wireless channel, so that only authorized receivers can access it. Unfortunately, digital encryption techniques typically require the use of microprocessors which are power-hungry devices. This project advances the use of alternative analog encryption techniques, such as chaotic encryption. Since analog encryption techniques are more power efficient, this approach makes it possible to avoid the use of microprocessors and consequently facilitate the realization of more portable devices.

group_project

Visible to the public SaTC: CORE: Small: Data-Driven Study of Attacks on Cyber-Physical Infrastructure Supporting Large Computing Systems

This project addresses security attacks that: (i) masquerade as failures and (ii) are delivered via self-learning malware that monitors the target system and launches the attack at a time and system location to have a maximal impact, by injecting a strategic failure. The target systems are cyber-physical systems (CPS) that manage or control large computing enterprises (e.g., the cooling or power distribution of high-performance system or cloud infrastructure).

group_project

Visible to the public SaTC: STARSS: Small: Tackling the Corner Cases: Finding Security Vulnerabilities in CPU Designs

Computing hardware including processors, memory banks, and communication busses can harbor vulnerabilities that allow an attacker to gain unauthorized access to the programs and data on a machine. Hardware designers and security experts expend considerable time and effort to eliminate these vulnerabilities early in the design stage. The focus of this research is to support these activities towards improving efficiency and outcomes.

group_project

Visible to the public SaTC: CORE: Small: Online Malicious Intent Inference for Safe CPS Operations under Cyber-attacks

Modern autonomous vehicles are not built with security in mind. The increased sensing, computation, control capabilities, and task complexity have introduced security concerns beyond traditional cyber-attacks. By injecting malformed data, by spoofing sensors, by tampering with controllers, and even by manipulating the environment, an attacker can compromise the integrity and even take control over the functionality of such cyber-physical systems.

group_project

Visible to the public SaTC: CORE: Small: Adversarial Learning via Modeling Interpretation

Machine learning (ML) models are increasingly important in society, with applications including malware detection, online content filtering and ranking, and self-driving cars. However, these models are vulnerable to adversaries attacking them by submitting incorrect or manipulated data with the goal of causing errors, causing potential harm to both the decisions the models make and the systems and people who rely on them.

group_project

Visible to the public SaTC: CORE: Small: Towards Robust Moving Target Defense: A Game Theoretic and Learning Approach

Malicious attacks are constantly evolving to inflict even more damage on the nation's infrastructure systems, corporate information technology (IT) systems, and our digital lives. A fundamental obstacle to achieving effective defense is information asymmetry, through which, under current static and passive defense schemes, the attacker has essentially limitless time to observe and learn about the defender, while the defender knows very little about the attacker.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Building Sophisticated Services with Programmable Anonymity Networks

This project designs and implements programmable system elements to be run within the anonymity networks, such as Tor (The Onion Routing network). The central idea is that users can inject new code into the network that is then run within a protected execution environment. The motivation is to enable the creation of new and significantly enhanced anonymity services, such as content distribution networks, of use in today's and future anonymity networks.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Covert/Secret and Efficient Message Transfer in (Mobile) Multi-Agent Environments

This project explores secret and efficient (preferably covert) communications by harnessing the resources brought in by smart everyday devices in emerging Internet of Things (IoT) environments. Reliability, efficiency, and secrecy are essential requirements in communication networks. Hiding that communication is even taking place is often crucial in adversarial environments and automatically achieves the increasingly important societal goals of privacy and anonymity.

group_project

Visible to the public SaTC: CORE: Small: API-centric Cryptography

Cryptography is a core component of modern technology. It protects internet transactions, hides usernames and passwords as they traverse networks, protects the data residing on mobile devices and computer disk drives, and much more. The systems that cryptographic mechanisms are tasked with protecting are typically very complex, with many interacting parts and a large number of places that may be vulnerable (often called the "attack surface").