EAGER

group_project

Visible to the public EAGER: SaTC: Early-Stage Interdisciplinary Collaboration: Knowledge Convergence and Divergence in Team Performance

Leveraging knowledge resources is one of the hallmarks of successful teams. Team members with diverse expertise and an awareness of "who knows what" perform better than teams with less diverse perspectives. Since 2013, the National Science Foundation's SaTC program has piloted groups of "high risk-high reward" EAGER projects to encourage early collaborations between computer and information scientists and behavioral, social, and economic scientists towards improving innovation and effectiveness in SaTC research.

group_project

Visible to the public EAGER: Theory and Practice of Risk-Informed Cyber Insurance Policies: Risk Dependency, Risk Aggregation, and Active Threat Landscape

This project aims to tackle some of the most significant challenges facing the design and adoption of risk-informed cyber insurance policies; these challenges include cyber risk interdependence, correlated risk and value-at-risk, and a fast-changing threat landscape. The research has the potential to bring about a paradigm shift in the design of cyber insurance policies so that they are used as effective economic and incentive mechanisms consistent with cyber risk realities; in doing so it also introduces new ways of thinking about cybersecurity in a holistic, risk management context.

group_project

Visible to the public EAGER: Enabling Secure Data Recovery for Mobile Devices against Malicious Attacks

Mainstream mobile computing devices, such as, smart phones and tablets, currently rely on remote backups for data recovery upon failures. For example, an iPhone periodically stores a recent snapshot to iCloud, that can get restored if needed. Such a commonly used "off-device" backup mechanism, however, suffers from a fundamental limitation, namely, the backup in the remote server is not always synchronized with data stored in the local device.

group_project

Visible to the public EAGER: Factoring User Behavior into Network Security Analysis

The project will investigate human factors in network security. The security of network systems relies on proper protection from not only known vulnerabilities, but also new vulnerabilities resulting from unexpected human behavior. The project will directly address a user's situational behavior and its consequence on network security. It engages in the challenges of modeling decision-making process and integrating it in the human-network interaction.

group_project

Visible to the public EAGER: Data Science for Election Verification

Election officials need evidence-based, scientifically valid tools to routinely assess the quality of election systems, including technical and human factors. Whether initiated by the election administrators or by the parties to an election, election investigation is expensive and must be well prioritized to be most effective. The project plans to provide tools for prioritizing investigations for election officials and others. The expected outcome is increased robustness of the mechanisms protecting elections that can give Americans more justified confidence in election results.

group_project

Visible to the public EAGER: Run-Time Hardware-Assisted Malware Detection Using Machine Learning

Malware, a broad term for any type of malicious software, is a piece of code designed by cyber attackers to infect computing systems without the user consent, typically for harmful purposes such as stealing sensitive information. The ubiquity of information technology has made malware a serious threat. Detecting malware in a system is a difficult task, particularly when the malware is stealthy. Hardware-assisted malware detection (HMD) mechanisms seek runtime detection of malware.

group_project

Visible to the public EAGER: Collaborative: Machine-Learning based Side-Channel Attack and Hardware Countermeasures

Digital Encryption is typically performed by specialized circuits to ensure confidentiality and integrity of data. While encryption is mathematically robust, the circuits encrypting data may leak information via the amount of the power drawn from the supply, and the amount of electromagnetic (EM) radiation that emanates from the circuit. This is known as side-channel leakage. An attacker may be able to unravel the secret cryptographic information by analyzing the side-channel leakage, thereby compromising security. Newer analysis techniques based on machine-learning make the attack easier.

group_project

Visible to the public EAGER: Collaborative: Machine-Learning based Side-Channel Attack and Hardware Countermeasures

Digital Encryption is typically performed by specialized circuits to ensure confidentiality and integrity of data. While encryption is mathematically robust, the circuits encrypting data may leak information via the amount of the power drawn from the supply, and the amount of electromagnetic (EM) radiation that emanates from the circuit. This is known as side-channel leakage. An attacker may be able to unravel the secret cryptographic information by analyzing the side-channel leakage, thereby compromising security. Newer analysis techniques based on machine-learning make the attack easier.

group_project

Visible to the public EAGER: Understanding and Categorizing Metadata

Communications metadata is necessary for the delivery of services. But such metadata leaks information about user intent and behavior. Through timing, for example, one can determine whether a Twitter account is a bot, while through packet length, what language is being spoken in an encrypted Voice Over Internet Protocol (VoIP) call. Thus, protecting a user's privacy and security is complicated. By examining multiple different sets of metadata usage, this EAGER seeks to develop a categorization of the types of information that metadata reveals.

group_project

Visible to the public EAGER: SaTC: Early-Stage Interdisciplinary Collaboration: Privacy Enhancing Framework to Advance Behavior Models

This project is designed to advance research on problematic eating behavior. The project investigates wearable sensors to measure eating behavior and developing models of behavior that comprise multiple observable behaviors such as eating alone or with friends, or chewing speed. These data can help scientists improve upon current traditional methods such as self-reported eating diaries, which tend to be inconsistent, sparse, and rarely timely. We capture human behavior using a custom wearable augmented camera. Wearable cameras provide rich data, but raise privacy concerns.