EAGER

group_project

Visible to the public EAGER: Collaborative: Understanding and Modeling Rumor Propagation for Vulnerability Assessment of Social Media Platforms

As social media becomes a primary news source, rumors can spread widely in a short time. In recent cases, the rapid spread of misinformation caused social panic, had a dramatic financial impact, and put individuals and communities at great risk. Even when correct information is eventually disseminated, large delays can have devastating consequences. To determine how vulnerable networks are to misinformation spread, and to develop effective proactive and reactive counter-measures, it is necessary to study rumor propagation.

group_project

Visible to the public CSR: EAGER: Quality-of-Experience-Aware Runtime Optimizations for Heterogeneous Multi-Core Systems

Given the pervasion of consumer devices in diverse operating environments, with a myriad of heterogeneous device resources and applications, designers can no longer pre-define optimization goals (e.g., maximum performance, minimum energy, Pareto optimal tradeoff, etc.) given extremely diverse end-user quality-of-experience (QoE) expectations (e.g., expected user-touch input response time, global positioning system (GPS) accuracy, video playback quality, battery life, etc.).

group_project

Visible to the public  EDU: Collaborative: Using Virtual Machine Introspection for Deep Cyber Security Education

Cybersecurity is one of the most strategically important areas in computer science, and also one of the most difficult disciplines to teach effectively. Historically, hands-on cyber security exercises helped students reinforce basic concepts, but most of them focused on user level attacks and defenses. Since OS kernels provide the foundations to the applications, any compromise to OS kernels will lead to an entirely untrusted computing. Therefore, it is imperative to teach students the practice of kernel level attacks and defenses.

group_project

Visible to the public SaTC-EDU: EAGER: Peer Instruction for Cybersecurity Education

Engineering a secure IT system, in addition to technical skills, requires a particular mindset focused on using cybersecurity solutions effectively against sophisticated and stealthy cyber attacks. The traditional lecture-centric style of teaching has failed to deliver that mindset, which is the direct result of an over-emphasis on specific technical skills (with limited lifespan and insufficient technical depth), abstract rather than deeply technical examination of fundamental concepts, and an impatience in developing broader analytical skills.

group_project

Visible to the public SaTC-EDU: EAGER: Cybersecurity education for public policy

The project will develop a variety of video and text-based cybersecurity educational materials for anyone who is interested or involved in public policy, and who would benefit from a greater familiarity with the constraints under which cybersecurity policy making occurs.

group_project

Visible to the public EAGER: Collaborative: Design, Perception, and Action - Engineering Information Give-Away

The design of social media interfaces greatly shapes how much, and when, people decide to reveal private information. For example, a designer can highlight a new system feature (e.g., your travel history displayed on a map) and show which friends are using this new addition. By making it seem as if sharing is the norm -- after all, your friends are doing it -- the designer signals to the end-user that he can and should participate and share information.

group_project

Visible to the public EAGER: TWC: Collaborative: iPrivacy: Automatic Recommendation of Personalized Privacy Settings for Image Sharing

The objective of this project is to investigate a comprehensive image privacy recommendation system, called iPrivacy (image Privacy), which can efficiently and automatically generate proper privacy settings for newly shared photos that also considers consensus of multiple parties appearing in the same photo. Photo sharing has become very popular with the growing ubiquity of smartphones and other mobile devices.

group_project

Visible to the public EAGER: Improving Incentives and Awareness, to Increase the Security Posture of Critical Infrastructures

The protection of cyber-physical critical infrastructures such as the power grid, water distribution networks, and transportation networks against computer attacks is a matter of national security, public safety, and economic stability; however, most of these critical assets are owned and operated by private companies with pressing operational requirements, tight security budgets, and aversion to regulatory oversight. As a result it is not clear that market incentives alone will create enough momentum to improve the security posture of these systems.

group_project

Visible to the public EAGER: Exploring the Use of Deception to Enhance Cyber Security

Our computing systems are constantly under attack, by everyone from pranksters to agents of hostile nations. Many of those systems and networks make the task of the adversary easier by responding to attacks with useful information. This is because software and protocols have been written for decades to provide informative feedback for error detection and correction. It is precisely this behavior that enhances the chances of success by attackers, by allowing them to map networks and determine system flaws.

group_project

Visible to the public SaTC-EDU: EAGER: Transforming Usable Security and Privacy Education

Usability is widely recognized as important to the design of security and privacy systems. Despite this, very few of the lessons learned through usable security and privacy research are taught to students as part of a security or computing curriculum. There are few educational materials, no consensus as to the knowledge units and learning objectives, and little research on how to best integrate usable security concepts into security curricula.