Small

group_project

Visible to the public EAGER: Collaborative: Algorithmic Framework for Anomaly Detection in Interdependent Networks

Modern critical infrastructure relies on successful interdependent function among many different types of networks. For example, the Internet depends on access to the power grid, which in turn depends on the power-grid communication network and the energy production network. For this reason, network science researchers have begun examining the robustness of critical infrastructure as a network of networks, or a multilayer network. Research in network anomaly detection systems has focused on single network structures (specifically, the Internet as a single network).

group_project

Visible to the public SaTC: CORE: Small: Collaborative: An Integrated Approach for Enterprise Intrusion-Resilience

The recent prevalence of advanced cyber attacks has caused enterprise breaches with severe consequences in critical sectors, such as national defense, manufacturing and the financial industry. Current defense practices rely on attack prevention and detection technologies, but our understanding of the capabilities of these security tools against truly advanced threats, which rapidly grow in sophistication, is severely lacking.

group_project

Visible to the public TWC: Small: Cross-application and Cross-platform Tracking of Web Users: Techniques and Countermeasures

There are many applications in business and end-user applications where user tracking is part of the core functionality or feature set. However, user tracking can intrude on user privacy and even may lead to online crimes. Recent research has shown that tracking companies have started using advanced web tracking techniques that are more subtle and less transparent than traditional online tracking.

group_project

Visible to the public TWC: Small: Emerging Attacks Against the Mobile Web and Novel Proxy Technologies for Their Containment

Users entrust their mobile devices with sensitive data, including business emails, as well as health and financial information. Thus, mobile devices have become an increasingly popular target for attackers. Mobile devices house powerful browsers that are vulnerable to at least as many attacks as their desktop counterparts. Yet, the security of these mobile browsers is understudied by researchers, leading to a lack of current information about ongoing attacks and possible defenses.

group_project

Visible to the public EDU: Cyber Girls: Teacher training and school-based cyber security education for high school girls

The main objective of this two-year project is to develop, implement, and study an intervention that increases cybersecurity awareness and proficiency among high school teachers and exposes high school girls to cybersecurity activities and careers. This objective is spurred by the growing need for cybersecurity professionals coupled with the under-representation of women in this field. The Bureau of Labor Statistics reports that 18% of cybersecurity specialists are women.

group_project

Visible to the public TWC: Small: Collaborative: The Master Print: Investigating and Addressing Vulnerabilities in Fingerprint-based Authentication Systems

The objective of this project is to investigate the security of fingerprint authentication systems, especially those using partial fingerprints. A number of consumer electronic devices, such as smartphones, are beginning to incorporate fingerprint sensors for user authentication. The sensors embedded in these devices are generally very small and the resulting images are, therefore, limited in size.

group_project

Visible to the public TWC: Small: Collaborative: Practical Hardware-Assisted Always-On Malware Detection

The project explores building support for malware detection in hardware. Malware detection is challenging and resource intensive, as the number and sophistication of malware increases. The resource requirements for malware detection limit its use in practice, leaving malware unchecked on many systems. We use a low level hardware detector to identify malware as a computational anomaly using low level features such as hardware events, instruction mixes and memory address patterns.

group_project

Visible to the public CAREER: Cryptographic Security at Internet Scale

Cryptography is a cornerstone of modern computer security and is ubiquitous on the computer systems we depend on daily. However, there is a significant gap between the theoretical guarantees provided by formalized security models, and the reality present in deployed systems today. The central research goals of this project are to perform an empirical study of cryptographic deployments on a global scale and to develop a framework for experimental cryptographic security research.

group_project

Visible to the public TWC: Small: Collaborative: An Iterative Approach to Secure Computation

Secure multi-party computation (SMC) allows several mutually untrusting parties to perform joint computations while keeping their inputs private. This project develops new techniques for constructing two-party secure computation protocols with low communication overhead. Building on the PIs prior work for constructing special-purpose secure computation protocols for greedy algorithms, this project aims to develop new techniques that exploit the algorithmic structure of a function in order to develop more efficient secure computation protocols.

group_project

Visible to the public SaTC-EDU: EAGER: Broadening Cyber Security Education Beyond Computing - Educating Everyone to Safeguard Our Online Lives

The growing sophistication of online threats requires that the larger educated workforce understands risks posed by such threats. In recent past, the importance of infusing cyber security concepts in computer science courses has been recognized. This project will explore the viability of an approach that advocates infusion of important cyber security concepts in meaningful context in courses that are part of the general education of undergraduate students across multiple disciplines.