CAREER

group_project

Visible to the public CAREER: User-Space Protection Domains for Compositional Information Security

Attacks on software applications such as email readers and web browsers are common. These attacks can cause damages ranging from application malfunction, loss of private data, to a complete takeover of users' computers. One effective strategy for limiting the damage is to adopt the principle of least privilege in application design: the application is split into several protection domains and each domain is given only the necessary privileges to perform its task. In this design, the compromise of one domain does not directly lead to the compromise of other security-sensitive domains.

group_project

Visible to the public CAREER: Enhancing Mobile Authentication by Measuring the Authentication Life-Cycle

This CAREER research focuses on human factors in authentication using mobile devices. Mobile authentication is a crucial component of authentication, especially as mobile devices become ever more connected to the broader security ecosystem. A major concern is how users authenticate as they use their devices over months or years. This research will involve empirical studies of the choices and actions users take over time. Qualitative and quantitative measures will be employed to better understand user mental models, perceptions, and behaviors related to mobile authentication.

group_project

Visible to the public CAREER: Securing Cyberspace: Gaining Deep Insights into the Online Underground Ecosystem

As the Internet becomes increasingly ubiquitous, it offers a low-risk harbor for cybercrime -- illegal activities such as hacking and online scams. Cybercrime is increasingly enabled by an online underground ecosystem, within which are anonymous forums and so-called dark web platforms for cybercriminals to exchange knowledge and trade in illicit products and services.

group_project

Visible to the public CAREER: Practical Control Engineering Principles to Improve the Security and Privacy of Cyber-Physical Systems

This project focuses on tackling the security and privacy of Cyber-Physical Systems (CPS) by integrating the theory and best practices from the information security community as well as practical approaches from the control theory community. The first part of the project focuses on security and protection of cyber-physical critical infrastructures such as the power grid, water distribution networks, and transportation networks against computer attacks in order to prevent disruptions that may cause loss of service, infrastructure damage or even loss of life.

group_project

Visible to the public CAREER: The Theoretical Foundations of Symmetric Cryptography

Cryptography is essential to ensure confidentiality and integrity of information. Due to their practicality, symmetric algorithms where the same secret key is used by the sender and the recipient underlie most practical deployments of cryptographic techniques. However, also as a result of this, symmetric cryptography suffers from an inherent tension between real world efficiency demands and provable security guarantees. This project investigates new technical advances aimed at narrowing the gap between provable security and the practical demands of symmetric cryptography.

group_project

Visible to the public CAREER: Cryptography for Secure Outsourcing

Individuals and organizations routinely trust third party providers to hold sensitive data, putting it at risk of exposure. While the data could be encrypted under a key that is kept secret from the provider, it rarely is, due to the inconvenience and increased cost of managing the cryptography. This project will develop technologies for working with encrypted data efficiently and conveniently. In particular, it will enable searching on encrypted data, which is prevented by currently deployed encryption, and running arbitrary programs efficiently on encrypted data.

group_project

Visible to the public CAREER: Light-Weight and Fast Authentication for Internet of Things

Internet of Things (IoT) is a heterogeneous system comprising interrelated smart-objects, sensors and actuators. IoT systems are expected to ultimately usher significant advances in critical domains such as transportation, energy, and healthcare. Due to IoTs' pervasiveness and impact on the cyber-physical world, it is a vital requirement to guarantee their security. In particular, authentication is one of the most fundamental security services required for any viable IoT, since it is necessary to establish trust and secure the communication among parties in a network.

group_project

Visible to the public CAREER: Formal TOols foR SafEty aNd Security of Industrial Control Systems (FORENSICS)

The goal of the project is to develop a multi-layer security framework to provide control technicians and engineers with far superior mechanisms to address the increasing risk of cybersecurity attack on vulnerable water treatment plants and reduce latent risks to public health and safety, industry, and national security. The findings will generate knowledge base and forensic tools to help control engineers to quickly detect and mitigate potential security flaws in central components across control systems, including industrial control software, sensors, and actuators.

group_project

Visible to the public CAREER: Algebraic Methods for the Computation of Approximate Short Vectors in Ideal Lattices

This project involves research into the computational hardness of the search for short elements of the so-called Euclidean lattices. The hardness of this task is the measure of the security of one of the most promising family of cryptographic protocols that are conjectured to resist attacks from quantum computers. The transition toward such protocols is an immediate priority for the cryptography community. Indeed, quantum-safe primitives will need to be ready and deployed long before the construction of large scale quantum computers to account for the shelf life of encrypted data.

group_project

Visible to the public CAREER: Explorable Formal Models of Privacy Policies and Regulations

Data collection and analysis enable great advancements in digital technology, but the stewards of this data have a responsibility to society to ensure that the practices of collection, storage, and user control abide by user expectations. Policies and regulations governing data privacy play a critical role in communicating privacy expectations to users and defining the bounds of permissible data use. However, in practice, there are severe mismatches between user expectations and the actual practices of software companies, even when those practices conform with their privacy policies.