EAGER

group_project

Visible to the public EAGER: Education-optional Security Usability on the Internet

Security is very difficult to use, and staying safe online is a growing challenge for everyone. It is especially devastating to inexperienced computer users, who may not spot risk indicators and may misinterpret currently implemented textual explanations and visual feedback of risk. This work explores, evaluates, and compares the effectiveness of several online safety education modules for users of various skill levels and the importance and effectiveness of visual feedback when encountering security threats.

group_project

Visible to the public EAGER: An Evolutionary-Inspired Approach for Moving Target Defenses

Computers are often deployed in a deterministic fashion, even across unrelated infrastructures, in order to simplify their life-cycle management. Unfortunately a predictable environment also aids attackers since a small set of exploits can be applied across a large number of similarly configured computers. A Moving Target (MT) strategy can be used to address this problem by deploying less deterministic and homogenous systems.

group_project

Visible to the public Student travel grants for Symposium On Usable Privacy and Security 2013

The Symposium On Usable Privacy and Security (SOUPS) brings together an interdisciplinary group of researchers and practitioners in human computer interaction, security, and privacy. The program features technical papers, workshops and tutorials, a poster session, panels and invited talks, and discussion sessions. The ninth SOUPS will be held July 24-26, 2013 at Northumbria University in Newcastle, UK. The funds support travel grants for American students to attend the conference. SOUPS is the top conference devoted to usable privacy and security.

group_project

Visible to the public EAGER: Understanding the Scope and Impact of Internet Information Manipulation

Recently we have seen the emergence new challenges to cyber security in which adversaries seek, not to simply to deny service, steal data, or utilize resources, but rather to use the network to distort information to influence opinion, thought, or action.

group_project

Visible to the public EAGER: Personalization in the Information Age

his work seeks to understand the extent and impact of personalization algorithms in popular on-line forums. In particular, the PI is studying web search engines, social networking sites, and recommendation services like Pintrest, Yelp and Reddit. While it is well known that each of these classes of information sources perform extensive personalization, there has not been a careful analysis on the impact of their efforts on what users see. This effort is working to answer a number of fundamental questions: How different are the experiences of distinct users?

group_project

Visible to the public EAGER: Characterizing and Exposing Bias in Social and Mainstream Media

An increasing number of organizations and information conduits, ranging from news outlets to information intermediaries like search engines can censor or manipulate citizens' access to information. The practices of these intermediaries can create "filter bubbles'', whereby the information any user sees is highly controlled by an information intermediary and depends largely on factors that may not be immediately apparent, such as the user's geographic location or past behavior.

group_project

Visible to the public EAGER: The Conceptual Landscape of Information Manipulation

A new, emergent cybersecurity frontier is information manipulation, whereby adversaries may attempt to distort information to influence opinion, thought, or action. Information manipulation can take many shapes and forms, from blatant attacks such as search-poisoning, misinformation such as bogus on-line reviews, to subtle distortion such as personalized search and biased news. Left unchecked, information manipulation can harm our economy, culture, and democracy. Past research efforts have been ad-hoc and focused on specific kinds of information manipulation.

group_project

Visible to the public EAGER: Attacking (and Defending) Information

The Internet has evolved into an essential medium that permeates most aspects of our lives. We consume information and entertainment online, cultivate relationships, exchange ideas, and handle business transactions. Not surprisingly, this new medium has also attracted malicious elements who seek to use the Internet to take advantage of others. Information manipulation is a new, emerging frontier in cyber security. Information manipulation denotes all attempts by adversaries to distort information with the goal to influence opinion, thought, or action.

group_project

Visible to the public EAGER: Collaborative: Process-Based Technology to Support Comparison and Evaluation of the Security of Elections

This project explores process composition tools as applied to elections, concentrating particularly on mail-in and Internet voting. This includes exploration of how to compose systems from pre-analyzed process components, how to analyze the vulnerability of these systems to attacks, and how to guarantee that important security properties are ensured for the resulting composed system.

group_project

Visible to the public EAGER: Collaborative: Process-Based Technology to Support Comparison and Evaluation of the Security of Elections

This project explores process composition tools as applied to elections, concentrating particularly on mail-in and Internet voting. This includes exploration of how to compose systems from pre-analyzed process components, how to analyze the vulnerability of these systems to attacks, and how to guarantee that important security properties are ensured for the resulting composed system.