EAGER

group_project

Visible to the public EAGER: Collaborative: Understanding and Modeling Rumor Propagation for Vulnerability Assessment of Social Media Platforms

As social media becomes a primary news source, rumors can spread widely in a short time. In recent cases, the rapid spread of misinformation caused social panic, had a dramatic financial impact, and put individuals and communities at great risk. Even when correct information is eventually disseminated, large delays can have devastating consequences. To determine how vulnerable networks are to misinformation spread, and to develop effective proactive and reactive counter-measures, it is necessary to study rumor propagation.

group_project

Visible to the public EAGER: Malicious Behavior Detection in Hybrid Dynamic Spectrum Access

To tackle the ever-increasing spectrum scarcity issue, dynamic spectrum access is envisioned as a set of promising new spectrum management paradigms. Although it has enabled the opportunistic access of underutilized licensed bands, various practical factors, such as environmental dynamics, intentional interference, and unauthorized transmission, hinder it from wide deployment.

group_project

Visible to the public EAGER: Collaborative: Leveraging High-Density Internet Peering Hubs to Mitigate Large-Scale DDoS Attacks

Large-scale distributed denial of service (DDoS) attacks pose an imminent threat to the availability of critical Internet-based operations, as demonstrated by recent incidents that brought down a number of highly popular web services such as Twitter, Spotify and Reddit. While several solutions to counter DDoS attacks have been proposed by both industry and academia, most of the solutions that are currently deployed on the Internet - such as traffic scrubbing - tend to detect and mitigate DDoS attacks close to the victim edge network, once the attack has already caused damage.

group_project

Visible to the public EAGER: USBRCCR: Collaborative: Securing Networks in the Programmable Data Plane Era

Recent advances in software-defined networking (SDN) and programmable data planes allow datacenter and enterprise network operators to quickly deploy new protocols, customize network behavior, and develop innovative services. These advances promise to improve and streamline network operations, improving the quality of service provided to end users. However programmable data planes also introduce new complexities to network management, notably, ensuring that the network satisfies critical security properties.

group_project

Visible to the public EAGER: Collaborative: Quantifying Information Leakage in Searchable Encryption

Cloud storage is currently experiencing explosive growth as more and more businesses and organizations store large amounts of data on cloud servers. Encrypting such data provides security against untrusted servers or malicious intrusions. However, standard encryption has the drawback of compromising functionality and efficiency and it is so strong that its ciphertexts are not searchable. For this reason, searchable encryption (SE) has become an important research area, aimed at providing weaker forms of encryption that balance security, efficiency, and functionality goals.

group_project

Visible to the public EAGER: Securing ICS Systems in the IIoT

In today's world, power plants, chemical plants, and manufacturing systems are all managed by computer systems called Industrial Control Systems (ICS). These consist of sensors (e.g. thermostats, level sensors) that measure important properties of the plant, actuators (e.g. valves, pumps) that change the state of the plant and computer systems that in real time use the sensor data to make decisions about to operate the actuators.

group_project

Visible to the public EAGER: Collaborative: BystanderBots: Automated Bystander Intervention for Cyberbullying Mitigation

Bullying has lasting negative psychological and physical effects on victims, bystanders, and bullies alike; online settings can magnify both the scale and impact of these effects, as anonymity can embolden people to make hostile posts about individuals or groups. This project aims to reduce the prevalence of such posts through the design of active, automated "bystander interventions" in online comment threads.

group_project

Visible to the public EAGER: Training Computers and Humans to Detect Misinformation by Combining Computational and Theoretical Analysis

Awareness of misinformation online is becoming an increasingly important issue, especially when information is presented in the format of a news story, because (a) people may over-trust content that looks like news and fail to critically evaluate it, and (b) such stories can be easily spread, amplifying the effect of misinformation.

group_project

Visible to the public EAGER: USBRCCR: Collaborative: Lightweight Policy Enforcement of Information Flows in IoT Infrastructures

As Internet of Things (IoT) systems become deployed more widely, their security is becoming a serious concern in many domains, including smart homes, autonomous cars, or industrial control systems. Security exploits in IoT systems can lead to loss of privacy, data theft, financial losses, and even physical harm. The proposed work will develop a novel approach to harden security of IoT systems via cross-layer defense. The approach will be developed and evaluated in collaboration among three participating institutions in the US and Brazil.

group_project

Visible to the public EAGER: Legal Barriers to Securing the Routing Architecture

IP addresses can be stolen or hijacked. It can happen instantly, and may result in a loss of Internet connectivity and/or diversion of traffic to a malicious entity. Until recently, an organization was unable to prove ownership of its Internet address. A global Resource Public Key Infrastructure (RPKI) is a framework designed to secure the Internet's routing infrastructure by enabling Third parties to cryptographically validate claims of ownership of Internet address blocks and permit such resource holders to declare routing relationships.