Small

group_project

Visible to the public NSF Student Travel Grant for 2017 Workshop on the Economics of Information Security (WEIS)

This proposal supports 12 students for their travel to attend the 16th Workshop on the Economics of Information Security (WEIS) held at the University of California San Diego, on June 26-27, 2017. WEIS is an annual event that serves as a leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of computer science and electrical engineering, economics, social science, business, law, and policy.

group_project

Visible to the public TWC: Small: Collaborative: Improving Android Security with Dynamic Slicing

Mobile devices have been very successful and continue to expand their user base. However, the very features that have made these devices successful, e.g., rich sensor inputs (GPS, camera, microphone) and continuous Internet connectivity, have also made the devices a favorite target for attackers. Attacks can have many negative consequences, from stealing users' secrets to spying on the users or installing viruses that render devices inoperable.

group_project

Visible to the public SaTC: CORE: Small: Efficient Hardware-Aware and Hardware-Enabled Algorithms for Secure In-Memory Databases

Many big-data workloads are hosted on the cloud to facilitate sharing and low cost. Many of these workloads deal with sensitive data, e.g., electronic health records. Cloud infrastructures are vulnerable to attacks from untrusted operators with physical access to the computers. These attacks can take many forms and may compromise privacy or integrity. To guarantee the security of sensitive data and ensure the cost-effectiveness of shared cyberinfrastructure, it is vital that these attacks be thwarted while not incurring a significant penalty in terms of performance, energy, or cost.

group_project

Visible to the public SaTC: EDU: Digital Forensics Education for Judicial Officials

As society becomes more dependent on digital technology, cyber-crime continues to be an increasing threat. There is a growing need to counter cyber-crime through digital forensics investigations. With rapid developments in technology such as cloud computing, the Internet of Things, and mobile computing, it is vital to ensure the proper training of law enforcement personnel and judges in the theory and practice of digital forensics.

group_project

Visible to the public EDU: Collaborative: Cybersecurity for Middle School students at Museums: An Informal Learning Approach

This project will focus on the topic of Cybersecurity for Middle School Students at Museums in a joint effort between the University at Buffalo (UB) and the Tech Museum of Innovation (The Tech), San Jose. The project will span multiple disciplines ranging from computer science and information systems to forensics and law. The participants shall pay particular attention to concepts and conceptual understanding of cybersecurity.

group_project

Visible to the public SBE: Small: Collaborative: Modeling Insider Threat Behavior in Financial Institutions: Large Scale Data Analysis

Insiders pose substantial threats to an organization, regardless of whether they act intentionally or accidentally. Because they usually possess elevated privileges and have skills, knowledge, resources, access and motives regarding internal systems and data, insiders can easily circumvent security countermeasures, steal valuable data, and cause damage. Perimeter and host-based countermeasures like firewalls, intrusion detection systems, and antivirus software are ineffective in preventing and detecting insider threats.

group_project

Visible to the public NSFSaTC-BSF: TWC: Small: Cryptography and Communication Complexity

Current cloud based systems enable distributed access to both information and computational resources. In this setting, it is imperative to have secure communication, and powerful and expensive cryptographic techniques have been proposed to address this issue. A severely limiting factor, however, is that these methods for securely accessing or processing data between participating parties can result in communication overheads when processing large amounts of data.

group_project

Visible to the public EAGER: Behavior-Based Incentive Mechanism Design for Crowd Defense against Phishing Attacks

This research is aimed at preventing harm from phishing attacks. Phishing attacks have been on the rise in the last few years with nearly 450,000 attacks and record estimated losses of over USD $5.9 billion just in the year 2013 alone. These attacks attempt to acquire personal information, such as username and passwords, through fraudulent emails. Phishing emails are becoming more targeted, using personal information about their intended victims, in an attempt to seem like authentic emails and improve the response rate to the attacks.

group_project

Visible to the public Student Travel Grant for GameSec 2015-2016

GameSec is a leading research conference focused on analytical models based on information, communication, optimization, decision, and control theories that are applied to diverse security topics. At the same time, the connection between theoretical models and real world security problems are emphasized to establish the important feedback loop between theory and practice. The conference helps to promote a "science of security" with a theoretical foundation that helps us understand security risk in a principled way.

group_project

Visible to the public SaTC: NSF Student Travel Grant for IEEE CNS 2017

This award provides travel support for graduate students to attend the 2017 IEEE Communications and Network Security (CNS) conference.