CAREER

group_project

Visible to the public CAREER: Computational RFID for Securing Zero-Power Pervasive Devices

This research advances the knowledge and capability for securely performing general-purpose computation and communication on zero-power devices that rely on harvested energy stored in extremely small reservoirs such as capacitors. A type of zero-power device, computational RFIDs (CRFIDs) harvest RF energy and endure continual interruptions to power. Complete loss of RAM on the order of every second makes the notion of a computational checkpoint fundamental to this model of computing.

group_project

Visible to the public CAREER: Interactions with Untrusted Quantum Devices

Fundamental research in quantum information performed since the 1980s shows that the principles of quantum mechanics can lead to dramatic computational and cryptographic consequences, from exponentially faster algorithms to unbreakable cryptosystems. The first practical quantum devices, from single-photon receptors used in quantum cryptography to large-scale quantum optimizers, are now being actively developed.

group_project

Visible to the public CAREER: Safe and Secure Network Control for Smart and Connected Hospitals

With the increasing reliability and pervasiveness of wireless networks, more and more critical systems such as vehicular networks, military systems, and first responder systems, rely on wireless networks. In modern hospitals, wireless technology will be used to interconnect medical, sensing, and computing devices, as well as the electronic health record system to enable smart medical applications, such as real-time patient monitoring, which can significantly improve quality of care.

group_project

Visible to the public CAREER:Information Theoretic Methods for Private Information Retrieval and Search in Distributed Storage Systems

The recent data revolution is driving many aspects of modern societal and economic progress. Most of this massive data is now stored in the cloud to enable easy access for a myriad of users who wish to share information including, for example, photos, videos, publications, opinions, and scientific data. Unfortunately, this has come at the expense of the user's privacy whose online activity can be used to profile him/her, making large parts of the population an easy target for discrimination and possible persecution.

group_project

Visible to the public CAREER: Secure Perception for Autonomous Systems

Today's automobiles are increasingly autonomous. The latest Mercedes S-class sedan applies corrective action when its driver strays out of lane or tailgates too closely. Semi-autonomy will soon yield to full autonomy. Nissan has promised a line of self-driving cars by 2020. Maritime craft are likewise moving from rudimentary autopilots to full autonomy, and autonomous aerial vehicles will doubtless play a significant role in the future economy.

group_project

Visible to the public CAREER: Cyber-security of Electric Power Systems: Theft and Systemic Failure

The physical infrastructure of the US electric grid is aging, over-burdened, and prone to failure. The drive to support the deep integration of variable renewable energy into the grid, without sacrificing reliability, will require a paradigm shift in how we produce, deliver, and consume energy. At the heart of this profound transformation is the rapid deployment of the Smart Grid, which integrates new embedded sensing, communication, and computing technologies to improve utilization of existing physical assets, operational efficiency, and reliability.

group_project

Visible to the public CAREER: Static Analysis for Dynamic Languages

Dynamic languages such as JavaScript, Python, and Ruby are ubiquitous; they are employed in critical infrastructure on clients, servers, and desktops, from browsers to the operating systems. The security, maintainability, correctness, and performance of programs written in these languages is becoming increasingly important. Static analysis is a valuable tool to help achieve these goals.

group_project

Visible to the public CAREER: A Timing Approach to Network Forensics

Providing cyber security against attackers who penetrate the network, insider attackers, and non-malicious user errors or equipment failures is a formidable challenge for the scientific community. The investigator addresses problems in the area of network forensics that arise in packet-based communication of information. A key feature of the research approach is the use of timing as an under-utilized degree of freedom that provides rich statistical structure about the information dynamics.

group_project

Visible to the public CAREER: Proactive Defense Methods for Chip Integrity and Security

Insecure chips threaten homeland security and citizen safety, especially in critical applications in the military, government, health care, and transportation. Unlike software, once an integrated circuit is fabricated, chips cannot be patched if a security vulnerability is identified. To overcome this problem, this project develops countermeasures against attacks that can be incorporated at the chip design phase.

group_project

Visible to the public CAREER: Unifying Provable Security Techniques for Advanced Cryptographic Systems

This project focuses on the development of new tools for designing and proving the security of advancing cryptographic systems. The need for fine-grained access control to sensitive data has never been greater, and new paradigms like functional encryption have the potential to deliver cryptographic systems that can be tailored to a variety of data uses and privacy needs. However, as systems have grown more complex, they have naturally grown more difficult to reason about.