CAREER

group_project

Visible to the public CAREER: Cryptography Outside the Box

Cryptography is the science of communication in the presence of a potential adversary and is an essential component in computer security. The past three decades of the study of cryptography continue to have a tremendous impact on society, having enabled, for example, world-wide ATM networks, pay TV, private email, VPNs, and electronic commerce. This project is developing cryptography that is more user-friendly, fault-tolerant and secure, thus broadening its applicability to our increasingly electronic lives.

group_project

Visible to the public CAREER: Hardware/Software Codesign for Secure Embedded Systems: Methods and Education

The implementation of a secure cipher within the embedded electronics of a smart-card can have a large number of weak points, which are unrelated to the cryptographic strength of that cipher. Side-channel information leaks may disclose internal secrets through the cipher's power consumption, execution time, and other physical implementation effects. Affecting hardware as well as software, these leaks show that a secure embedded system is no stronger than its weakest link.

group_project

Visible to the public CAREER: Novel Primitives and Side-Channel Countermeasures in the Design and Implementation of Cryptographic Algorithms

The enormous number of successful attacks attests to the fact that computer security is a complex issue. It requires research in many layers and components in computer systems, and becomes even more challenging when resource-constrained systems like mobile computing devices and sensor nodes are considered.

group_project

Visible to the public CAREER: A Behavior-Based Framework for Detecting Internet Worms

Accurate detection of Internet worms in their early stages remains an unsolved problem. One could scan Internet traffic for worm signatures or suspicious byte patterns, but worm signatures are often useless for unknown worms that exploit new software vulnerabilities, and suspicious byte patters are problematic because worms can carry virtually arbitrary payloads. Processing and analyzing traffic payloads is also expensive. These limitations have motivated investigations into the behaviors that self-propagating worms may display.

group_project

Visible to the public CAREER: Securing Broadband Cellular Data Networks

Cellular networks are part of our critical information infrastructure. However, the upcoming broadband cellular data networks and mobile devices have unique vulnerabilities that have attracted little research attention. The PI proposes a five-year plan for understanding the inherent vulnerabilities and developing technologies for improving the security of cellular data networks and mobile devices.

group_project

Visible to the public CAREER: Foundations for Attack-Resistant, Collaborative Peer-to-peer Systems

How can a group of agents achieve a goal despite efforts by some of the agents to prevent this? This important question cuts across many disciplines including political science, economics, mathematics and computer science. In this proposal, we are exploring this question by focusing on the following problem. A set of n agents wants to compute the value of a function, f, of n inputs, where each agent holds a unique input of f. Our goal is to create a distributed algorithm that ensures that each agent learns the output of f.

group_project

Visible to the public CAREER: Building Trust in Distributed Networks: Theories, Architecture and Applications

When network participants do not know how to trust each other, network operations suffer. Participants that naively trust will be victimized and their resources misused. Mistrustful participants will ignore opportunities and their resources will be wasted through inefficiencies. Current research on the establishment of trust often focuses on narrow models and specific domains. There is a gap between point solutions and a system-wide trust infrastructure. This research will address the major issues in designing such a trust infrastructure.

group_project

Visible to the public CAREER: Intent-Based Network Management

This research is developing a framework for better managing IP networks using an intent-based network management approach to address the performance and robustness issues associated with managing complex IP networks. The goal is to automatically generate needed network configurations by requiring only high-level objectives as input while also ensuring network-level objectives such as performance and reliability. The research develops design principles applicable to managing both current and future networks and provides insight into designing networks for manageability.

group_project

Visible to the public CAREER: Combating Worm Propagation in Emergent Networks

Worms have emerged as one of the leading threats to our information systems and critical infrastructures. Despite the tremendous research effort in combating worms, new computer and system vulnerabilities are continuously reported and new worm attacks keep succeeding. Another significant trend in worm attacks is that the number of worm attacks against emergent networks, such as P2P networks, cellphone networks, and sensor networks, is rapidly growing.

group_project

Visible to the public CAREER: Realizing Practical High Assurance through Security-Typed Information Flow Systems

This grant supports an investigation of formal models, algorithms, methods, tools, and infrastructure that build upon the information flow guarantees of security-typed languages to achieve high assurance software systems. The information flow guarantees of security-typed languages provide a practical avenue to achieving system security by producing proofs of an implementation's compliance with a specified policy.