CAREER

group_project

Visible to the public CAREER: A Comprehensive Framework for Disappearing Data

Numerous technical and environmental forces are increasing the importance of data privacy for businesses and individuals alike. These forces include the migration of data to Web services, the permanent archiving of large volumes of data and communications by services and ISPs, and legal actions that are forcing individuals and organizations to reveal private (and even encrypted) data. Traditional encryption is an insufficient solution under these conditions, thereby creating new challenges to preserving our digital privacy in an increasingly inter-connected and digital world.

group_project

Visible to the public CAREER: Improving Software Assurance Using Transactions

The goal of this CAREER project is to develop novel mechanisms that use transactions to improve software assurance. This project is developing Transactional Memory Introspection---or TMI, which is an approach to building software security mechanisms by leveraging recent advances in hardware and software transactional memory. Security mechanisms based on TMI build upon the same machinery that transactional memory systems use to ensure performance and functionality. TMI therefore promises to make security mechanisms efficient and easy to integrate with software.

group_project

Visible to the public CAREER: Untrusted Computing Base: Detecting and Removing Malicious Hardware

Computer systems security is an arms race between defenders and attackers that has mainly been confined to software technologies. Increases in the complexity of hardware and the rising number of transistors per chip have created opportunities for hardware-based security threats. Among the most pernicious are malicious hardware footholds inserted at design time, which an attacker can use as the basis of a computer system attack. This project explores of the feasibility of foothold attacks and a fundamental design-time methodology for defending against them.

group_project

Visible to the public CAREER: Protecting against Layer-Violating Attacks in Wireless Networks

The PI is developing bottom-up mechanisms for securing wireless networks against a class of "layer-violating" attacks. In a layer-violating attack, the attacker uses protocol behavior at one layer of the network stack to compromise a secure protocol at a different layer. Such layer-violating attacks often can span from the physical layer all the way to the transport layer.

group_project

Visible to the public CAREER: Human-Behavior Driven Malware Detection

Millions of computers worldwide are estimated to be infected by malware (malicious software) and have become ? unknown to their owners ? part of an army of dangerous ?bots?, which are software applications that run automated tasks over the Internet controlled by cyber criminals. These infected computers are coordinated and used by attackers to launch illegal and destructive network activities including identity theft, sending spam (estimated 100 billion spam messages every day), launching distributed denial of service attacks, and committing click fraud.

group_project

Visible to the public  CAREER: Scale and Performance in Anonymous Communication

This project targets an important aspect of online privacy by giving users the ability to hide their communication patterns through anonymous communication. Anonymous communication mitigates the "dossier effect," where third parties can accumulate enough information about users to construct a detailed profile, regardless of the use of encryption. This project addresses two key research issues in anonymous communication: scale and performance.

group_project

Visible to the public CAREER: Examining Users' Collective Privacy Management for Online Social Networks

To better articulate privacy as a dynamic and dialectic phenomenon in a Web 2.0 world, this project proposes a set of basic empirical research activities to investigate three aspects of privacy in online social networks: conceptualization, intervention, and awareness.

group_project

Visible to the public CAREER: Towards Identifying and Eliminating Exploitable Software Bugs

Attackers only need to find a single exploitable bug in order to install malware, bots, and viruses on a vulnerable user's computer. Unfortunately, bugs are plentiful. For example, the Ubuntu Linux distribution bug management database currently lists over 58,000 open bugs. Thus, the question is not whether an attacker can find a bug, but which bugs an attacker can exploit. This research investigates novel techniques, approaches, and algorithms for finding exploitable bugs.

group_project

Visible to the public CAREER: Separations in Cryptography

Since the seminal work of Shannon in 1949 cryptography has been founded on unproven computational complexity. The security of cryptographic systems could fall apart if the assumptions behind their design turn out to be false. Thus, it is crucial to base the security of crypto-systems on weakest possible assumptions. A main component of finding minimal assumptions is to ``separate'' cryptographic tasks from assumptions that are weaker than those used in constructions. In light of recent developments in cryptography, the following two directions will be pursued:

group_project

Visible to the public CAREER: EASE: Enhancing the Security of Pervasive Wireless Networks by Exploiting Location

Wireless systems have become an inseparable part of our social fabric, which allow users to move around and access the services from different locations while on the move. However, wireless security is often cited as a major technical barrier that must be overcome before widespread adoption of mobile services can occur. Traditional approaches have focused on addressing security threats on a case-by-case basis in an ad-hoc manner as new and specialized threats are uncovered.