CAREER

group_project

Visible to the public CAREER: Tolerating Access Control Misconfiguration

Access control is a multi-faceted area that has been advanced by a wide range of computer science research communities including programming languages, human-computer interaction, computer

architecture, and operating systems. In general, this body of work has either sought to improve the expressiveness of access control logic or introduce novel mechanisms for enforcing policies. Each

group_project

Visible to the public CAREER: Secure Multi-Party Protocols

In this project we design efficient secure algorithms for various multi-party protocol tasks. The protocols must be provably secure based on well-understood cryptographic assumptions, they need to satisfy requirements imposed by the real-world applications of these protocols, and they need to be efficient enough to be usable in practice.

group_project

Visible to the public CAREER: Securing Channel Access in Multi-Channel Ad Hoc Networks

An increasing number of mobile users rely on wireless technologies to gain secure and uninterrupted access to network services. As the volume of data disseminated via the wireless medium rapidly expands, provision of performance, reliability, and security become challenging problems. These problems can be alleviated by the use of multiple orthogonal frequency bands (channels) that has been demonstrated to substantially reduce contention and interference.

group_project

Visible to the public CAREER: Internet Measurement in the Cat's Cradle of Global Internet Censorship

The Internet will shape the history of the 21st century. Governments around the world realize this, which is why, out of 40 countries studied by the Open Net Initiative, Internet censorship increased from 3 of 40 in 2002 to 26 of 40 in 2007. The U.S. must set effective policy regarding this, but the inherently computational issues lead to a great deal of uncertainty.

group_project

Visible to the public CAREER: Novel Techniques for Detecting and Localizing Hardware Trojans in Integrated Circuits

Design and fabrication of integrated circuits (ICs) are becoming increasingly vulnerable to malicious activities and alterations with globalization. These vulnerabilities have raised serious concerns regarding possible threats to many critical applications. An adversary can introduce a Trojan designed to disable and/or destroy a system at some future time or the Trojan may serve to leak confidential information covertly to the adversary. This research develops efficient procedures for detection of malicious alterations and subtle modifications in integrated circuits.

group_project

Visible to the public CAREER: Malware Immunization and Forensics Based on Another Sense of Self

Despite recent advances in malware defense, computer malwares (e.g., virus, worm, botnets, rootkit, spyware) continue to pose serious threats to all computers and networks. Besides being more damaging, modern malwares (e.g., blue pill, agobot) are becoming increasingly stealthy and evasive. This has made it increasingly difficult to protect our computer systems and networks from malwares and ensure the trustworthiness of our mission critical systems.

group_project

Visible to the public CAREER: Practical Privacy for Outsourcing Systems

This award is funded under the American Recovery and Reinvestment Act of 2009 (Public Law 111-5).

group_project

Visible to the public CAREER: Local Remediation of Global Internet Epidemics

This award is funded under the American Recovery and Reinvestment Act of 2009 (Public Law 111-5).

group_project

Visible to the public CAREER: Toward eliminating malicious code

This award is funded under the American Recovery and Reinvestment Act of 2009 (Public Law 111-5).

Malicious software is one of the most pressing security problems on the Internet. The main reason for the apparent failure of current defense approaches is that malware detection techniques are too specific. This is most obvious with virus scanners, which rely on
signatures that are specific to individual malware instances. However, also behavioral detection techniques typically target only specific

group_project

Visible to the public CAREER: Design Principles for Cryptographic Hash Functions: Foundations, Primitives, and Transforms

Cryptographic hash functions are ubiquitous in modern cryptography. They are an integral part of digital signature and public-key encryption schemes, access control mechanisms, digital time-stamping routines, message authentication codes, and file synchronization utilities. They are implemented in point-of-sale terminals, ATM machines, operating systems, web browsers, routers, and mobile phones,mto name just a few.