EAGER

group_project

Visible to the public EAGER: Leveling the Digital Playing Field for the Job Seeker

This project aims to assess how online data impacts the hiring process. In an ideal situation, one might imagine that employers hire the most skilled applicant, but sociological research indicates that this may not be the case. A job applicant's similarity to the interviewer in class background and class-based leisure activities often matters as much or more to employers than a job applicant's skills or work experience.

group_project

Visible to the public EAGER: Behavior-Based Incentive Mechanism Design for Crowd Defense against Phishing Attacks

This research is aimed at preventing harm from phishing attacks. Phishing attacks have been on the rise in the last few years with nearly 450,000 attacks and record estimated losses of over USD $5.9 billion just in the year 2013 alone. These attacks attempt to acquire personal information, such as username and passwords, through fraudulent emails. Phishing emails are becoming more targeted, using personal information about their intended victims, in an attempt to seem like authentic emails and improve the response rate to the attacks.

group_project

Visible to the public EAGER: ACI: A Software-Defined Network (SDN) WAN Security Testbed

Software defined networking (SDN) has emerged as a topic of exploration for addressing the growing challenges in complex traffic and topology management in environments such as large-scale data centers, private wide-area networks (WANs), and virtual hosting environments. Unfortunately, little is understood regarding the security challenges that SDN-enabled WANs introduce.

group_project

Visible to the public EAGER: Braid Statistics and Hard Problems in Braid Groups with Applications to Cryptography

This research project will investigate and develop new mathematical tools in public-key cryptography. Such tools have been introduced in recent years as suitable for implementation on low-cost platforms with constrained computational resources; it is expected that such platforms will become more and prevalent as consumer devices become "smart" and connect to large networks with the emergence of the "Internet of Things." Public-key cryptography is used by each person hundreds and perhaps thousands of times daily, as it is the main security used in cellular, ATM, and other computer networks.

group_project

Visible to the public EAGER: Bridging The Gap between Theory and Practice in Data Privacy

This project aims to bridge the gap between theory and practice in privacy-preserving data sharing and analysis. Data collected by organizations and agencies are a key resource in today's information age. However, the disclosure of those data poses serious threats to individual privacy. While differential privacy provides a solid foundation for developing techniques to balance privacy and utility in data sharing, currently there is a significant gap between theory and practice in research in this area.

group_project

Visible to the public EAGER: Collaborative: Algorithmic Framework for Anomaly Detection in Interdependent Networks

Modern critical infrastructure relies on successful interdependent function among many different types of networks. For example, the Internet depends on access to the power grid, which in turn depends on the power-grid communication network and the energy production network. For this reason, network science researchers have begun examining the robustness of critical infrastructure as a network of networks, or a multilayer network. Research in network anomaly detection systems has focused on single network structures (specifically, the Internet as a single network).

group_project

Visible to the public SaTC-EDU: EAGER: Broadening Cyber Security Education Beyond Computing - Educating Everyone to Safeguard Our Online Lives

The growing sophistication of online threats requires that the larger educated workforce understands risks posed by such threats. In recent past, the importance of infusing cyber security concepts in computer science courses has been recognized. This project will explore the viability of an approach that advocates infusion of important cyber security concepts in meaningful context in courses that are part of the general education of undergraduate students across multiple disciplines.

group_project

Visible to the public EAGER: Collaborative: IC Supply Chain Security and Quality Control in Business and Social Context

Trusted hardware is essential to achieving a secure and trustworthy cyberspace. However, this security foundation is not free of threats. Specifically, an adversary involved in Integrated Circuit (IC) development and supply may launch a number of attacks such as intellectual property theft, design tamper, counterfeiting and overproduction. The Comprehensive National Cyber Security Initiative has identified this supply chain risk management problem as a top national priority.

group_project

Visible to the public EAGER: A Generalized Framework for Securing Heterogeneous Multicore Architectures

This project envisions a mixed-security system where some components are trusted while others are not-trusted. This includes both hardware and software. The target hardware platform is a heterogeneous multicore system-on-a-chip where some hardware cores are trusted and other cores are untrusted. The applications executing on this multicore substrate are similarly made out of tasks where some tasks require secure execution and other tasks may be unsecured. The problem is highly relevant to so-called "Internet of Things" systems built from trusted and untrusted components.

group_project

Visible to the public EAGER: Protecting Election Integrity Via Automated Ballot Usability Evaluation

Anything that causes the vote tally to differ from the intent of the voters is a threat to election integrity. While most threats to election integrity have concerned security, there is another critical threat to election integrity: usability. When voters are unable to successfully communicate their intent due to poor ballot design, this threatens the integrity of the election, no matter what the level of security is.