EAGER

group_project

Visible to the public EAGER: Collaborative: IC Supply Chain Security and Quality Control in Business and Social Context

Trusted hardware is essential to achieving a secure and trustworthy cyberspace. However, this security foundation is not free of threats. Specifically, an adversary involved in Integrated Circuit (IC) development and supply may launch a number of attacks such as intellectual property theft, design tamper, counterfeiting and overproduction. The Comprehensive National Cyber Security Initiative has identified this supply chain risk management problem as a top national priority.

group_project

Visible to the public EAGER: Defending Against Visual Cyberbullying Attacks in Emerging Mobile Social Networks

Adolescents have fully embraced social networks for socializing and communicating. However, cyberbullying has become widely recognized as a serious social problem, especially for adolescents using social networks. Also, cyberbullying techniques change rapidly. Perpetrators can use the camera-capacity of their mobile devices to bully others through making and distributing harmful pictures or videos of their victims via mobile social networks.

group_project

Visible to the public EAGER: Collaborative: Secure and Efficient Data Provenance

Data provenance involves determining the conditions under which information was originally generated, as well as all subsequent modifications to that information and the conditions under which those modifications were performed. As systems become increasingly distributed and organizations become reliant on cloud computing for processing their data, the need to securely manage and validate the provenance of that data becomes critical.

group_project

Visible to the public EAGER: Toward Transparency in Public Policy via Privacy-Enhanced Social Flow Analysis with Applications to Ecological Networks and Crime

Recent improvements in computing capabilities, data collection, and data science have enabled tremendous advances in scientific data analysis. However, the relevant data are often highly sensitive (e.g., Census records, tax records, medical records). This project addresses an emerging and critical scientific problem: Privacy concerns limit access to raw data that might reveal information about individuals. Techniques to "sanitize" such data (e.g., anonymization) could have negative impact on the quality of the scientific results that use the data.

group_project

Visible to the public EAGER: Economic Incentives for Correct Outsourced Computation via Rational Proofs

The problem of securely outsourcing data and computation has received widespread attention due to the rise of cloud computing: a paradigm where businesses lease computing resources from a service rather than maintain their own computing infrastructure. These scenarios introduce new security problems: in particular how do we trust the integrity of data and computation that are not under our own control. This project deals with these problems by considering methods, adapted from the world of economics, to incentivize parties to behave correctly during the execution of a computation.

group_project

Visible to the public EAGER: Privacy Compliance by Design: Ideation Techniques to Facilitate System Design Compliant with Privacy Laws and Regulations

The explosion in data gathering has greatly exacerbated existing privacy issues in computing systems and created new ones due to the increase in the scale and the scope of available data as well as the advances in the capabilities of computational data analysis. Software professionals typically have no formal training or education on sociotechnical aspects of privacy. As a result, addressing privacy issues raised by a system is frequently an afterthought and/or a matter of compliance-check during the late phases of the system development lifecycle.

group_project

Visible to the public EAGER: Exploring Spear-Phishing: A Socio-Technical Experimental Framework

A safe and productive society increasingly depends on a safe and trustworthy cyberspace. However, extensive research has repeatedly shown that the human factor is often the weakest part in cyberspace, and that users of information systems are often exposed to great risks when they respond to credible-looking emails. Thus, spear phishing attacks - which attempt to get personal or confidential information from users through well-targeted deceptive emails - represent a particularly severe security threat.

group_project

Visible to the public EAGER: Computational Propaganda and The Production/Detection of Bots

Political bots are manipulating public opinion over major social networking applications. This project enables a new team of social and information scientists to investigate the impact of automated scripts, commonly called bots, on social media. The PIs will study both the bot scripts and the people making such bots, and then work with computer scientists to improve the way we catch and stop such bots. Experience suggests that political bots are most likely to appear during an international crisis, and are usually designed to promote the interests of a government in trouble.

group_project

Visible to the public SaTC-EDU:EAGER:A Wiki Space for Information Security Education Exchange

Information security remains a persistent and growing problem in the United States due to ever-progressing reliance on information technologies and systems to provide critical services and enable society's contemporary way of life. The economics of computing favor performance and functionality over security and may continue to do so for some time. This environment is created by graduates of education programs, programs which can be argued to be lacking in emphasis on security impacts associated with this new information age.

group_project

Visible to the public EAGER: Collaborative Research: Towards Understanding Smartphone User Privacy: Implication, Derivation, and Protection

This project aims to address privacy concerns of smartphone users. In particular, it investigates how the usages of the smartphone applications (apps) may reshape users' privacy perceptions and what is the implication of such reshaping. There has been recent work that investigates privacy leakage and potential defense mechanisms. However, so far there is only limited understanding on the consequences of such privacy losses, especially when large amount of privacy information leaked from smartphone users across many apps.