CAREER

group_project

Visible to the public CAREER: Developing Robust Longitudinal Indicators and Early Warnings of Cybercrime

The proliferation of cybercrime has created an opportunity for researchers to study cybersecurity using a data-driven, and ultimately scientific, approach. This project seeks to improve the process of cybercrime data collection and analysis for the purpose of reducing its harm. Effort-based indicators, which measure the impact of defender actions such as the time taken to clean a compromised resource, are being constructed for use in analyzing data gathered on multiple categories of cybercrime.

group_project

Visible to the public CAREER: Light-Weight and Fast Authentication for Internet of Things

Internet of Things (IoT) is a heterogeneous system comprising interrelated smart-objects, sensors and actuators. IoT systems are expected to ultimately usher significant advances in critical domains such as transportation, energy, and healthcare. Due to IoTs' pervasiveness and impact on the cyber-physical world, it is a vital requirement to guarantee their security. In particular, authentication is one of the most fundamental security services required for any viable IoT, since it is necessary to establish trust and secure the communication among parties in a network.

group_project

Visible to the public CAREER: Finding Levers for Privacy and Security by Design in Mobile Development

Mobile data are one of the fastest emerging forms of personal data. Ensuring the privacy and security of these data are critical challenges for the mobile device ecosystem. Mobile applications are easy to build and distribute, and can collect a large variety of sensitive personal data. Current approaches to protecting this data rely on security and privacy by design: encouraging developers to proactively implement security and privacy features to protect sensitive data.

group_project

Visible to the public CAREER: Illuminating the Impacts of Internet Censorship with Principled Network Measurements

The Internet was not designed with information controls, such as censorship or surveillance, in mind. However, its importance has led many nations to repurpose Internet protocols (e.g., the Domain Name System (DNS) and Border Gateway Protocol (BGP)), and network management products (e.g., Web proxies, traffic shapers) for information control. This unintended use of networking technologies can lead to unintended international impact of censorship, and raises many ethical issues when network management products are exported to countries that use them to violate human rights.

group_project

Visible to the public CAREER:Software Requirements Evolution in a Multi-Jurisdictional Socio-Technical Ecosystem

Pervasive and distributed computing decreases development time by allowing engineers to reuse software in third-party components, platforms and cloud-based services. Consequently, this software is subject to multiple policies and regulations that impose legal requirements on the behavior of these complex systems. Legal requirements create evolutionary pressure on system design as developers roll out new product features, enter new markets that cross geo-political boundaries, or when existing laws change or new laws are created.

group_project

Visible to the public CAREER: Static-Analysis-Driven Engineering of Modern Software Systems

Users of software are all too familiar with its shortcomings: software is slow, software is buggy and software is insecure. When a complex software system fails, it is unhelpfully simplistic to blame the implementors of the system as incompetent. The truth is that software engineers are uniquely disadvantaged among the traditional engineering disciplines because they lack a viable predictive model for the systems they design and build.

group_project

Visible to the public CAREER: Securing Sensory Side-Channels in Cyber-Physical Systems

Cyber-Physical Systems (CPS) integrate devices that can interact with each other and the physical world around them. With CPS applications, engineers monitor the structural health of highways and bridges, farmers check the health of their crops, and ecologists observe wildlife in their natural habitat.

group_project

Visible to the public CAREER: An Integrative and Scalable Approach to Embedded Hardware Protection

This project explores an integrative approach to embedded hardware security, where efficient design solutions complement appropriate test/validation steps and security analysis. It creates technology to protect embedded systems at different stages of life-cycle against hardware intellectual property (IP) piracy and reverse engineering, hardware Trojan attacks in untrusted design and fabrication facilities, and malicious modifications of hardware IP.

group_project

Visible to the public CAREER: Reasoning under Uncertainty in Cybersecurity

Cyber security, like security in the physical world, relies upon investigation methodologies that piece together dispersed evidence spread across multiple places, and come to a conclusion on what security breaches have happened and how they happened. While effective evidential reasoning based on manual analysis are used in the physical world by law-enforcement agencies, in the cyber world we need automated reasoning methodologies to handle the automated cyber attacks against our nation's information infrastructures every day.

group_project

Visible to the public CAREER: Automated Synthesis of High-Assurance Security Kernels

Programming languages research has many techniques for generating efficient, correct implementations from high-level specifications. Recent research on language-based security formulates models of information security in terms of modular, algebraic structures from language semantics. This research combines these threads in novel ways to construct high-assurance secure systems in which techniques from programming language semantics provide both a mathematical basis for formal verification and a flexible, modular organizing principle for system design and implementation.