Small

group_project

Visible to the public CAREER: Scaling Forensic Algorithms for Big Data and Adversarial Environments

Forged digital images or video can threaten reputations or impede criminal justice, due to falsified evidence. Over the past decade, researchers have developed a new class of security techniques known as 'multimedia forensics' to determine the origin and authenticity of multimedia information, such as potentially falsified images or videos. However, the proliferation of smartphones and the rise of social media have led to an overwhelming increase in the volume of multimedia information that must be forensically authenticated.

group_project

Visible to the public Travel Support for Participants in the 2015 New Security Paradigms Workshop

This award will support student travel to the 2015 New Security Paradigms Workshop to be held in Twente, the Netherlands, in September 2015. The New Security Paradigms Workshop (NSPW) provides a stimulating, safe, and highly interactive forum for innovative approaches to computer security. NSPW encourages graduate students and junior faculty to examine long-held ideas within computer security. It also strongly encourages non-computer security experts from economics, sociology, psychology, and other disciplines to bring their expertise to bear on computer security paradigms.

group_project

Visible to the public EAGER: Investigating Elderly Computer Users' Susceptibility to Phishing

One of the most severe and challenging threats to Internet security and privacy is phishing, which uses fake websites to steal users' online identities and sensitive information. Existing studies have evaluated younger users' susceptibility to phishing attacks, but have not paid sufficient attention to elderly users' susceptibility to phishing in realistic environments.

group_project

Visible to the public TWC: Small: Provably Enforcing Practical Multi-Layer Policies in Today's Extensible Software Platforms

A defining characteristic of modern personal computing is the trend towards extensible platforms (e.g., smartphones and tablets) that run a large number of specialized applications, many of uncertain quality or provenance. The common security mechanisms available on these platforms are application isolation and permission systems. Unfortunately, it has been repeatedly shown that these mechanisms fail to prevent a range of misbehaviors, including privilege-escalation attacks and information-flow leakage.

group_project

Visible to the public TWC: Small: Physiological Information Leakage: A New Front on Health Information Security

With the growing use of implantable and wearable medical devices, information security for such devices has become a major concern. Prior work in this area mostly focuses on attacks on the wireless communication channel among these devices and health data stored in online databases. The proposed work is a departure from this line of research and is motivated by acoustic and electromagnetic physiological information leakage from the medical devices. This type of information leakage can also directly occur from the human body, thus raising privacy concerns.

group_project

Visible to the public STARSS: Small: Side-Channel Analysis and Resiliency Targeting Accelerators

The design of social media interfaces greatly shapes how much, and when, people decide to reveal private information. For example, a designer can highlight a new system feature (e.g., your travel history displayed on a map) and show which friends are using this new addition. By making it seem as if sharing is the norm -- after all, your friends are doing it -- the designer signals to the end-user that he can and should participate and share information.