Collaborative

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Automatically Answering People's Privacy Questions

As novel technologies collect increasingly large and diverse amounts of data about us, people are unable to keep up and retain control over what happens to their data. The current legal approach to privacy concentrates on the concept of "Notice and Choice", namely the expectation that people are provided sufficient information about the collection and use of their data, and are offered meaningful choices about these practices (e.g., opt out, opt in). A primary element of this approach relies on privacy policies to communicate this information to people.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Automatically Answering People's Privacy Questions

As novel technologies collect increasingly large and diverse amounts of data about us, people are unable to keep up and retain control over what happens to their data. The current legal approach to privacy concentrates on the concept of "Notice and Choice", namely the expectation that people are provided enough information about the collection and use of their data and are offered meaningful choices about these practices (e.g., opt out, opt in). A primary element of this approach relies on privacy policies to communicate this information to people.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Automatically Answering People's Privacy Questions

As novel technologies collect increasingly large and diverse amounts of data about us, people are unable to keep up and retain control over what happens to their data. The current legal approach to privacy concentrates on the concept of "Notice and Choice", namely the expectation that people are provided sufficient information about the collection and use of their data, and are offered meaningful choices about these practices (e.g., opt out, opt in). A primary element of this approach relies on privacy policies to communicate this information to people.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: New Frontiers in Encryption Systems

Encryption is the process of encoding data into a ciphertext such that only the intended recipient can decode and learn the data. This project pushes the frontiers of what is achievable for encryption. The project's novelties are building encryption systems with advanced capabilities that have provable security under standard assumptions. These include the capability to trace malicious users who leak confidential information as well as the ability to only release select pieces of information to users on a need to know basis.

group_project

Visible to the public SBE TWC: Small: Collaborative: Pocket Security - Smartphone Cybercrime in the Wild

Most of the world's internet access occurs through mobile devices such as smart phones and tablets. While these devices are convenient, they also enable crimes that intersect the physical world and cyberspace. For example, a thief who steals a smartphone can gain access to a person?s sensitive email, or someone using a banking app on the train may reveal account numbers to someone looking over her shoulder. This research will study how, when, and where people use smartphones and the relationship between these usage patterns and the likelihood of being a victim of cybercrime.

group_project

Visible to the public TWC: Small: Collaborative: Towards Privacy Preserving Online Image Sharing

On-line sharing of images has become a key enabler of users' connectivity. Various types of images are shared through social media to represent users' interests and experiences. While extremely convenient and socially valuable, this level of pervasiveness introduces acute privacy concerns. First, once shared images may go anywhere, as copying / resharing images is straightforward. Second, the information disclosed through an image reveals aspects of users' private lives, affecting both the owner and other subjects in the image.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Understanding and Discovering Illicit Online Business Through Automatic Analysis of Online Text Traces

Unlawful online business often leaves behind human-readable text traces for interacting with its targets (e.g., defrauding victims, advertising illicit products to intended customers) or coordinating among the criminals involved. Such text content is valuable for detecting various types of cybercrimes and understanding how they happen, the perpetrator's strategies, capabilities and infrastructures and even the ecosystem of the underground business.

group_project

Visible to the public EDU: Collaborative: Integrating Embedded Systems Security into Computer Engineering and Science Curricula

With the advancement of technologies, networked devices become ubiquitous in the society. Such devices are not limited to traditional computers and smart phones, but are increasingly extended to cover a wide variety of embedded systems (ES), such as sensors monitoring bridges, electronics controlling the operation of automobiles and industrial equipment, home medicine devices that are constantly reporting patient health information to doctors.

group_project

Visible to the public TWC: Medium: Collaborative: Efficient Repair of Learning Systems via Machine Unlearning

Today individuals and organizations leverage machine learning systems to adjust room temperature, provide recommendations, detect malware, predict earthquakes, forecast weather, maneuver vehicles, and turn Big Data into insights. Unfortunately, these systems are prone to a variety of malicious attacks with potentially disastrous consequences. For example, an attacker might trick an Intrusion Detection System into ignoring the warning signs of a future attack by injecting carefully crafted samples into the training set for the machine learning model (i.e., "polluting" the model).

group_project

Visible to the public EAGER: TWC: Collaborative: iPrivacy: Automatic Recommendation of Personalized Privacy Settings for Image Sharing

The objective of this project is to investigate a comprehensive image privacy recommendation system, called iPrivacy (image Privacy), which can efficiently and automatically generate proper privacy settings for newly shared photos that also considers consensus of multiple parties appearing in the same photo. Photo sharing has become very popular with the growing ubiquity of smartphones and other mobile devices.