CAREER

group_project

Visible to the public CAREER: Secure OS Views for Modern Computing Platforms

The security architecture of consumer operating systems is currently undergoing a fundamental change. In platforms such as Android, iOS, and Windows 8, each application is a separate security principal that can own data. While this distinction is a vast improvement over traditional user-focused security architectures, sharing data between applications results in an unexpected loss of control of that data, potentially exposing security and privacy sensitive information.

group_project

Visible to the public CAREER: Re-thinking Electronic Design Automation Algorithms for Secure Outsourced Integrated Circuit Fabrication

Semiconductor chip fabrication is being increasingly outsourced to off-shore foundries. Outsourced fabrication reduces cost by leveraging economies-of-scale and ensures access to the most advanced manufacturing technology, but comes at the expense of trust. How can the chip designer trust that the off-shore (untrusted) foundry does not pirate its intellectual property (IP), or maliciously modify the integrated circuit (IC) by inserting a hardware Trojan in the chip? This project develops transformative new solutions for trustworthy chip fabrication at off-shore foundries.

group_project

Visible to the public CAREER: Infrastructure for Secure Cloud Computing

Infrastructure-as-a-service (IaaS) cloud computing systems are revolutionizing business, government, and science by providing easy access to scalable computing. These public services, as offered by Amazon, Google, Microsoft, and others, allow an arbitrary customer to rent, by the hour, the resources needed to run their applications within virtual machines (VMs) hosted on the provider?s compute infrastructure. With these new services, however, comes subtle new security issues.

group_project

Visible to the public CAREER: Inclusive Privacy: Effective Privacy Management for People with Visual Impairments

This project aims to provide people with disabilities, particularly those with visual impairments, better privacy tools when working with computers. Although information privacy is a concern for everyone, common tools such as spam-detecting captchas, password strength meters, security alert messages, and browser icons that indicate secure connections are often designed without considering people with visual impairments and thus are hard for this group to use.

group_project

Visible to the public CAREER: Empowering Attacker-Centric Security Analysis of Network Protocols

The objective of this project is to improve the security of a wide range of network protocols that the Internet relies on. Unfortunately, the Internet has been evolving at a rapid rate but its initial design did not take security into consideration. In practice, this leads to a never-ending stream of network attacks that are continuously being discovered. The defenders are forced into a reactive position to these new and creative attacks, without having the necessary tools to understand and anticipate them.

group_project

Visible to the public CAREER: Computing on Encrypted Data

In response to serious vulnerabilities that plague many of the Internet's core protocols, the last two decades have seen various security infrastructures layered on top of originally insecure protocols (DNSSEC on top of the domain name system, SSL and its public key infrastructure on top of TCP, the RPKI on top of interdomain routing). The security of each is derived from centralized authorities that are trusted to provide information about cryptographic keys or identities. When authorities behave correctly, each security infrastructure protects the underlying insecure system from attack.

group_project

Visible to the public CAREER: A Pathway towards Channel Camouflage and Manipulation Techniques for Wireless Security

Wireless channel exhibits the spatial uncorrelation property, i.e., the characteristic of a wireless channel becomes uncorrelated every half carrier wavelength over distance. This property fertilizes an emerging research area that utilizes wireless channel characteristics to authenticate a wireless transmitter.

group_project

Visible to the public CAREER: Scaling Forensic Algorithms for Big Data and Adversarial Environments

Forged digital images or video can threaten reputations or impede criminal justice, due to falsified evidence. Over the past decade, researchers have developed a new class of security techniques known as 'multimedia forensics' to determine the origin and authenticity of multimedia information, such as potentially falsified images or videos. However, the proliferation of smartphones and the rise of social media have led to an overwhelming increase in the volume of multimedia information that must be forensically authenticated.

group_project

Visible to the public CAREER: Towards Secure and Policy-Compliant Encrypted Communications

The past several years have seen a fundamental change in the way that individuals use technology to communicate. One aspect of this change has been the widespread deployment of new encrypted communications systems that are used by billions of users. With the emergence of new, practical encrypted messaging protocols and storage technologies, encryption is now available to the public in a quantity and quality that could only be imagined in previous decades. With the deployment of secure encryption technology comes new challenges.

group_project

Visible to the public EAGER: Investigating Elderly Computer Users' Susceptibility to Phishing

One of the most severe and challenging threats to Internet security and privacy is phishing, which uses fake websites to steal users' online identities and sensitive information. Existing studies have evaluated younger users' susceptibility to phishing attacks, but have not paid sufficient attention to elderly users' susceptibility to phishing in realistic environments.