Medium

group_project

Visible to the public TC: Medium: Collaborative Research: Novel Forensic Analysis for Crimes Involving Mobile Systems

Our project will significantly advance forensic methods of investigating mobile devices used for trafficking in digital contraband. While current methods and legislation focus heavily on logical identifiers, we will design, evaluate, and deploy new forensic techniques that focus on consistent and trackable characteristics of mobile computing. Additionally, our work will play an important role in understanding the limits of personal privacy in these settings.

group_project

Visible to the public HCC: Medium: Intelligent Agents for Protecting Users in Cyberspace

This interdisciplinary project studies the nature of the risks inherent in normal activity on the Internet, the perception of those risks, the judgment about trade-offs in behavior and the design of a personalized agent that can alert users to risky behavior and help to protect them. The key insight is that adequate security and privacy protection requires the concerted efforts of both the computer and the user.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: New Directions in Public-Key and Identity-Based Encryption

Developments in public-key encryption (PKE) and identity-based encryption (IBE) have revolutionized the field of cryptography and secure communication in general. PKE allowed remote parties to establish secure channels in front of eavesdropping adversaries, and led to public-key directories storing parties' public-keys. The stronger primitive of IBE eliminated the need for a large public-key directory, though this comes at the cost of trusting a central private-key generation authority.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: New Directions in Public-Key and Identity-Based Encryption

Developments in public-key encryption (PKE) and identity-based encryption (IBE) have revolutionized the field of cryptography and secure communication in general. PKE allowed remote parties to establish secure channels in front of eavesdropping adversaries, and led to public-key directories storing parties' public-keys. The stronger primitive of IBE eliminated the need for a large public-key directory, though this comes at the cost of trusting a central private-key generation authority.

group_project

Visible to the public SaTC: CORE: Medium: Knowledge Work and Coordination to Improve O&M and IT Collaboration to Keep Our Buildings Smart AND Secure

Government organizations, businesses, and universities are increasingly adding Internet of Things (IoT) devices, such as room occupancy sensors, into their buildings. As these sensors are connected to the internet and networked to building technology (such as heating and lights), an attacker could shut down a building or steal sensitive information.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: User-Centered Deployment of Differential Privacy

Differential privacy (DP) has been accepted as the de facto standard for data privacy in the research community and beyond. Both companies and government agencies are trying to deploy DP technologies. Broader deployments of DP technology, however, face challenges. This project aims to understand the needs of different stakeholders in data privacy, and to develop algorithms and software to enable broader deployment of private data sharing.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: User-Centered Deployment of Differential Privacy

Differential privacy (DP) has been accepted as the de facto standard for data privacy in the research community and beyond. Both companies and government agencies are trying to deploy DP technologies. Broader deployments of DP technology, however, face challenges. This project aims to understand the needs of different stakeholders in data privacy, and to develop algorithms and software to enable broader deployment of private data sharing.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: User-Centered Deployment of Differential Privacy

Differential privacy (DP) has been accepted as the de facto standard for data privacy in the research community and beyond. Both companies and government agencies are trying to deploy DP technologies. Broader deployments of DP technology, however, face challenges. This project aims to understand the needs of different stakeholders in data privacy, and to develop algorithms and software to enable broader deployment of private data sharing.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: RADAR: Real-time Advanced Detection and Attack Reconstruction

There has been a rapid escalation of targeted cyber-attacks, called Advanced Persistent Threats (APTs), on high-profile enterprises. These skilled attacks routinely bypass widely deployed protection mechanisms. Existing second-line cyber defenses (e.g., intrusion detection systems) are helpful, but they often generate a flood of information that overwhelms cyber analysts. Moreover, analysts lack the tools to piece together attack fragments spanning multiple applications and/or hosts.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: RADAR: Real-time Advanced Detection and Attack Reconstruction

There has been a rapid escalation of targeted cyber-attacks, called Advanced Persistent Threats (APTs), on high-profile enterprises. These skilled attacks routinely bypass widely deployed protection mechanisms. Existing second-line cyber defenses (e.g., intrusion detection systems) are helpful, but they often generate a flood of information that overwhelms cyber analysts. Moreover, analysts lack the tools to piece together attack fragments spanning multiple applications and/or hosts.