EAGER

group_project

Visible to the public TC: EAGER: Measuring Architectures for Resilient Security (MARS)

A system has resilient security if it retains a degree of secure functioning despite the compromise of some components. Since vulnerable components will long be in widespread use, resilient security is what counts against sophisticated adversaries with persistent footholds in American systems.

Resiliency infrastructures can help secure application components that may have many intrinsic weaknesses. They can structure systems so the risk of successful attack can be meaningfully measured.

group_project

Visible to the public EAGER: Usable Location Privacy in Geo-Social Networks

This project is focused on a potentially transformational research study involving the simultaneous investigation of usability and security/privacy technologies for location-based geo-social applications, with the objective of studying the usability, feasibility, and scalability of privacy-preserving and secure location-aware geo-social networking platforms for mobile devices. The approach is based on a belief that usability and security/privacy are addressed properly and most effectively from the start.

group_project

Visible to the public EAGER: Privacy with Respect to Private Corporations in the 21st Century: Legal and Computer Security Issues

This project addresses the question: What privacy rules should bind private corporations? It does so through a collaboration between a legal scholar knowledgeable about computer science issues and a computer scientist knowledgeable about legal and policy issues. The common themes running

group_project

Visible to the public EAGER: Quantifying Information Security Risks in Complex Systems at the Interface of Users, Policies, and Technologies

This proposal represents an opportunity to seed a highly innovative interdisciplinary research project that has the potential for significant practical and theoretical impact for the management of information security ? an area which is receiving more and more public attention. During the past decade, research in information security has expanded from a purely technical focus to a more general technology-economic focus.

group_project

Visible to the public TC: EAGER: Investigations of Next-generation Network Reconnaissance Attack Techniques and Limitations

This goal of this project is to investigate next-generation network attack reconnaissance techniques, and explore the limitation for existing defenses. The result of this investigation offers understanding of potential game-changing in network reconnaissance attacks and how they can evolve in order to enable discovering and navigating the network quickly and safely. The project particularly explores novel scanning techniques to discover firewall security polices remotely via intelligent active probing, and without probing the end-hosts.

group_project

Visible to the public EAGER: TC: Collaborative Research: Experimental Study of Accountability in Existing Anonymous Networks

To stop anonymous tools designed for free speech from being abused by criminals, this project investigates practical solutions to trace back criminals while support free speech for benign users, by exploiting two unique perspectives. First, it utilizes the resource advantages of law enforcement to explore the limitations of anonymous tools. As criminals operated from remote locations usually do not have resources to build large-scale systems, they have to rely on existing anonymous tools with third-party resources to hide their traces.

group_project

Visible to the public EAGER: TC: Collaborative Research: Experimental Study of Accountability in Existing Anonymous Networks

To stop anonymous tools designed for free speech from being abused by criminals, this project investigates practical solutions to trace back criminals while support free speech for benign users, by exploiting two unique perspectives. First, it utilizes the resource advantages of law enforcement to explore the limitations of anonymous tools. As criminals operated from remote locations usually do not have resources to build large-scale systems, they have to rely on existing anonymous tools with third-party resources to hide their traces.

group_project

Visible to the public EAGER: Interfaces to Reduce Human Error in Social Network Access Control Policy Authoring

The growth of the Internet means everyone from system administrators to casual users are regularly confronted with making decisions on how to share data. Research suggests that even experts struggle to make these decisions accurately using current access-control mechanisms. As users start to share information across social and professional applications, usable access-control mechanisms that help prevent such semantic errors are all the more urgent.

group_project

Visible to the public TC: EAGER: Binary-based Data Structure Revelation for Memory Forensics

Today's computer users often run programs for which they do not have the source code. In some cases, those programs are viruses or other malware, and it is desirable to understand how they work in order to prevent them from causing further damage or to track down the author. Part of the process of understanding the program (sometimes called "reverse engineering")is to understand how it stores data.

group_project

Visible to the public TC: EAGER: Collaborative Research: Parallel Automated Reasoning

The security of the national computing infrastructure is critical for consumer confidence, protection of privacy, protection of valuable intellectual property, and even national security. Logic-based approaches to security have been gaining popularity, in part because they provide a precise way to describe and reason about the kinds of complexity found in real systems. Perhaps even more importantly, automated reasoning techniques can be used to assist users in navigating this complexity. Despite the promise of automated reasoning, its use in practical applications is still limited.