CAREER

group_project

Visible to the public CAREER: Enacting Cybersecurity Expertise

By using the electric power sector as an example of a critical infrastructure, this career project will examine the influence of computer and network security expertise on critical infrastructure organizations, the ways cybersecurity is becoming a new field of expertise and the role of global enactments of cybersecurity on reshaping conceptions of international security.

group_project

Visible to the public CAREER: Group-Centric Secure Information Sharing - Models, Properties, and Implementation

One of the oldest and most challenging problems in cyber security is to enable secure information sharing (SIS) (i.e., maintaining some control over information even after it has been shared.) For example, a product manufacturer may need to share customer account information with a company that ships the products and bills the customers. The manufacturer cannot allow its partner to then misuse those customer records by direct marketing or selling customer records. This project focuses on the policy challenge of specifying, analyzing and enforcing SIS policies.

group_project

Visible to the public CAREER: Trustworthy Social Systems Using Network Science

Social media systems have transformed our societal communications, including news discovery, recommendations, societal interactions, E-commerce, as well as political and governance activities. However, the rising popularity of social media systems has brought concerns about security and privacy to the forefront. This project aims to design trustworthy social systems by building on the discipline of network science.

group_project

Visible to the public CAREER: Anonymous and Robust Multi-Recipient Communication: Foundations and Applications

Content distribution is an important application domain for cryptographic techniques. Existing security solutions for multi recipient communication, like broadcast encryption, focus mostly on the concerns of the content originator. This project tackles the problem from a broader perspective that includes the privacy concerns of the recipients, and develops cryptographic models and protocols for content distribution that provide guarantees beyond the mere secrecy of the data. The outcomes of this research will enable solutions that address the privacy issues associated with cloud storage.

group_project

Visible to the public CAREER: Cryptographic Security at Internet Scale

Cryptography is a cornerstone of modern computer security and is ubiquitous on the computer systems we depend on daily. However, there is a significant gap between the theoretical guarantees provided by formalized security models, and the reality present in deployed systems today. The central research goals of this project are to perform an empirical study of cryptographic deployments on a global scale and to develop a framework for experimental cryptographic security research.

group_project

Visible to the public CAREER: Exo-Core: An Architecture to Detect Malware as Computational Anomalies

Applications that run on billions of mobile devices backed by enormous datacenters hold the promise of personal, always-on healthcare; of intelligent vehicles and homes; and thus of a healthier, more efficient society. It is imperative to make such applications secure by protecting their integrity and keeping their data confidential. However, malicious programs (``malware'') today can subvert the best software-level defenses by impersonating benign processes on mobile devices or by attacking victim processes through the hardware on shared datacenter servers.

group_project

Visible to the public CAREER: Securing Mobile Cyber-Physical Systems (CPSs) Against Stealthy Attacks

As Cyber-Physical Systems (CPSs) employing mobile nodes continue to integrate into the physical world, ensuring their safety and security become crucial goals. Due to their mobility, real-time, energy and safety constraints, coupled by their reliance on communication mediums that are subject to interference and intentional jamming, the projected complexities in Mobile CPSs will far exceed those of traditional computing systems.

group_project

Visible to the public CAREER: Getting the Most out of Secure Multi-Party Computation

Our society is becoming increasingly reliant on powerful and interconnected computing devices that store much of our personal information. These devices present an ever-growing tension between the desire for our personal information to be private, and the desire to put our personal information to good use for our own convenience. In cryptography, problems that involve requirements of useful computation and privacy are understood through the lens of secure multi-party computation (SMPC).

group_project

Visible to the public CAREER: Towards Trustworthy Operating Systems

An operating system is the key software of a computer system that manages the hardware and software resources and provides essential services to computer programs. It plays a critical role in the security of the whole system. Unfortunately, modern operating systems are often bloated with millions of lines of source code, and serious vulnerabilities are routinely being discovered and exploited from them.

group_project

Visible to the public CAREER: The Theoretical Foundations of Symmetric Cryptography

Cryptography is essential to ensure confidentiality and integrity of information. Due to their practicality, symmetric algorithms where the same secret key is used by the sender and the recipient underlie most practical deployments of cryptographic techniques. However, also as a result of this, symmetric cryptography suffers from an inherent tension between real world efficiency demands and provable security guarantees. This project investigates new technical advances aimed at narrowing the gap between provable security and the practical demands of symmetric cryptography.