EAGER

group_project

Visible to the public EAGER: Accountability Through Architecture for Decentralized Systems

Advancing the ability to create trustworthy computing systems demands fundamental advances in many technologies and at many levels of abstraction. Creating trustworthy applications requires more than a set of excellent building blocks, however. It demands an architectural understanding; one that shows a viable approach to utilizing many contributions in mutually consistent and supportive ways.

group_project

Visible to the public  EAGER: Data Privacy for Smart Meter Data: A Scenario-Based Study

Smart electric meters comprise one key technology element in an overall strategy to modernize the nation's energy infrastructure. Smart meters capture data on household energy usage at frequent intervals and transmit those data to utility companies, who use the data to automate meter reading and billing, detect and respond to outages, and manage grid operations. Data collected over time can be used to forecast demand, understand customer behavior and develop new service and pricing plans.

group_project

Visible to the public EAGER: Collaborative: Secure and Efficient Data Provenance

Data provenance involves determining the conditions under which information was originally generated, as well as all subsequent modifications to that information and the conditions under which those modifications were performed. As systems become increasingly distributed and organizations become reliant on cloud computing for processing their data, the need to securely manage and validate the provenance of that data becomes critical.

group_project

Visible to the public EAGER: The Midwest CyberCenter

Moraine Valley Community College (MVCC) seeks to perform a feasibility study of replicating and refining the Brookdale Community College (BCC) CyberCenter Program (NSF funded as DUE-1331170). Both projects design, implement and evaluate an innovative pathway from cyber talent to cyber workforce. It includes a scalable, competition-driven, hands-on education model that has a potential to help with the nation's critical shortage of cybersecurity workforce. It will incorporate on-line courses, virtual labs and access tools to decrease overall per student cost in the CyberCenter program.

group_project

Visible to the public EAGER: Collaborative: Policies for Enhancing U.S. Leadership in Cyberspace

Cybersecurity is threatened by the zero-day exploits (software vulnerabilities that have not been previously disclosed and are therefore potential vectors for attack). The threat is serious for exploits in the hands of major cyber powers that are potentially hostile nations. Publication of a zero-day exploits can enhance the resilience of domestic cyber-infrastructure (if an adversary has discovered the same exploit), and it could give other countries the opportunity to patch their systems proactively, increasing confidence that they will not be penetrated.

group_project

Visible to the public EAGER: Exploring Trade-offs in Cyber Offense and Defense Through the Lenses of Computer and Political Science

This project examines the trade-offs governments face between engaging in cyber offense and defense. Governments may exploit a somewhat less secure Internet to gain intelligence and strategic advantage. But a more secure Internet encourages more participation online and reduces citizens' exposure to cybercrime. Thus governments face a difficult dilemma: Should they forego potentially useful cyber operations and work on strengthening the Internet in order to provide a global good?

group_project

Visible to the public EAGER: Collaborative: Understanding How Manipulated Images Influence People

As an abundance of hardware and software tools is dramatically decreasing the cost and effort required to manipulate digital images, the risks and dangers associated with malicious attackers easily routing doctored images through computer and social networks to purposefully influence viewers' opinions, attitudes, and actions have never been more severe.

group_project

Visible to the public EAGER: Collaborative: Using Cognitive Techniques To Detect and Prevent Security Flaws

Software vulnerabilities are a substantial problem that exists in part due to programmer errors. A common cause is that programmers have a cognitive gap between their understanding of what actions code will perform and the actual actions the code performs. This work takes a first step toward rigorously understanding how humans think about code to (eventually) help to dramatically reduce bugs by building more human understandable programming languages and programs.

group_project

Visible to the public EAGER: Privacy-Preserving Approaches to Proactive Forensics

Insider attacks are a critical issue for companies and governments in scenarios involving trade secrets, sensitive information, intellectual property, personally identifiable information, classified documents, and more. Too many existing approaches for responding to these attacks rely on mechanisms that assume the recovery of locally stored, unencrypted data. These techniques fail on the growing number of devices that employ file system encryption and cloud storage.

group_project

Visible to the public EAGER: Model Driven Framework for Audio Forensics

The goal of this project is to investigate the reliability, robustness, and computationally efficiency of digital audio forensic methods under various adversarial conditions, e.g., lossy compression attack. We aim to identify and develop mathematical tools for modeling and characterizing of microphone nonlinearities (fingerprints), statistical methods for acoustic environment estimation, and system identification based framework for linking an acquisition device to the audio recording.