CAREER

group_project

Visible to the public CAREER: Models and Cryptographic Protocols for Unstructured, Decentralized Systems

Unstructured, decentralized systems --- including ad-hoc/sensor networks and peer-to-peer networks --- are emerging as a central focus of computer science research. Methods for securing these systems are critical; however, these systems differ markedly from classical distributed systems (which are, in comparison, more ``structured'' and well-organized) and thus current cryptographic models and mechanisms are simply not sufficient for addressing the full range of security requirements.

group_project

Visible to the public CAREER: Highly-Optimized Provably-Secure Cryptography

While some researchers have aimed at efficiency, they have often developed algorithms without proving them secure. Conversely, researchers focussed on provable security have often produced impractical algorithms. Providing both performance and provable security entails great effort in each domain, often entailing a strange marriage of mathematics with implementation considerations.

group_project

Visible to the public CAREER: Towards Exterminating Stealthy Rootkits - A Systematic Immunization Approach

The rampant growth of stealthy rootkits poses a serious security threat to cyberspace. Specifically, with the capability of directly subverting the software root of trust of a computer system, a rootkit can surreptitiously take over the control of the system and maintain a hidden presence thereafter. To effectively defend against them, researchers have explored various anti-rootkit solutions. Unfortunately, to our disadvantage, the state-of-the-art defense is mainly reactive and cannot meet the challenges in the arms-race against them.

group_project

Visible to the public CAREER: Foundations and Extensions of Public Key Cryptography

Increasingly, both personal and enterprise data are being stored at third-party locations, outside of the data owner's control. A company might directly outsource its data storage by using a backup service such as Amazon's S3 application. In other cases, outsourcing is a by-product of a larger service; for example, several corporations use Salesforce to manage their customer relations and sales data.

group_project

Visible to the public CAREER: anon.next: Privacy-Enabled Routing in the Next-Generation Internet

Overlay anonymity systems like Tor are effective against many kinds of attacks on privacy, but they have significantly slower network performance than regular Internet traffic. The purpose of this project is to explore the design of anon.next, an anonymity system for the next-generation Internet. In anon.next, we embed anonymizing proxies into new Internet architectures, so that the network itself can provide efficient and effective privacy protection in a way that overlay designs cannot. This project seeks to make major advances in two areas key to the design of anon.next.

group_project

Visible to the public CAREER: Control of Information Security Risk Using Economic Incentives

Security risks associated with software that communicates over networks have become an increasingly costly problem for consumers, firms, and governments. A key characteristic of any interconnected system (e.g., network software such as Apache HTTP server, the smart grid, and airline baggage operations) is that choices made in the design, deployment, and usage of these systems can have significant implications for security risk.

group_project

Visible to the public CAREER: Practical Cryptography for the Cloud

Recently, the digital world has moved to a "cloud" computing and storage model, where businesses are offering storage space, computing power, and access to applications for rent. While this new model presents numerous opportunities, consumers of cloud services will face new challenges in data privacy and integrity.

group_project

Visible to the public CAREER: A Networking Approach to Host-based Intrusion Detection

Day by day, threats to the cyber infrastructure are becoming more complex and, in response, so too are defense mechanisms. One approach to securing nodes is to place a defense mechanism (e.g., intrusion detection system) on the node. This brings many challenges, with the most significant being that potential vulnerabilities in the defense mechanism can provide an additional avenue through which the host can be compromised.

group_project

Visible to the public CAREER: Secure Public-Key Cryptography

As the Internet emerges as the platform for computation, we have become increasingly reliant on cryptography to provide privacy and security in many of our day-to-day activities. We rely on cryptographic protocols to protect our credit card numbers from hackers in electronic transactions and our personal information from unauthorized access on online social networks. However, the design of many cryptosystems do not adequately account for new computational and cryptographic attacks made possible by advances in quantum computing and complex protocol interactions on the Internet.

group_project

Visible to the public CAREER: Research on Real-time Robust and Secure Communications for Vehicular Ad Hoc Networks

This CAREER project is motivated by the belief that Vehicular Ad Hoc Networks (VANETs) based inter-vehicle communications could enhance traffic safety and traffic operation. VANET networks differ from general mobile ad hoc networks (MANET) because of the stringent requirements on real-time, robust, and secure communications and coordination in a critical highly dynamic environment.