EAGER

group_project

Visible to the public EAGER: Collaborative: Language-Action Causal Graphs for Trustworthiness Attribution in Computer-Mediated Communication

This collaborative research between Florida State University and Cornell University is to identify language-action features from text-based messages that can be used to dynamically infer a social actor's perceived trustworthiness. The team will investigate using optimal analysis techniques to calibrate trustworthiness reasoning, which can be used to computationally model actors' deceptive behaviors in cyber space and to infer actors' intent based on their words and actions.

group_project

Visible to the public EAGER: Collaborative: Language-Action Causal Graphs for Trustworthiness Attribution in Computer-Mediated Communication

This collaborative research between Florida State University and Cornell University is to identify language-action features from text-based messages that can be used to dynamically infer a social actor's perceived trustworthiness. The team will investigate using optimal analysis techniques to calibrate trustworthiness reasoning, which can be used to computationally model actors' deceptive behaviors in cyber space and to infer actors' intent based on their words and actions.

group_project

Visible to the public EAGER: Holistic Security for Cloud Computing: Verifiable Computation

A basic security concern inherent to outsourced computating services is guaranteeing the integrity of the information received from the cloud. The concern relates both to outsourced data storage and to the results of outsourced computations. There are several aspects to this problem like ensuring software correctness, protecting against intentional deviation and shortcuts, maintaining data provenance, and guaranteeing results of distributed computation from mutually distrusted sources.

group_project

Visible to the public EAGER: Holistic Security for Cloud Computing: Architecture for Modular System and Network Design

Perhaps the greatest single impediment to the broad adoption of public clouds is concerns about security. Reasoning about all the security aspects of complex modern information systems is enormously difficult. Security is especially problematic in the cloud, where a customer must place their trust in opaque complicated services that they do not understand or control and that are shared with many other customers. Yet, in today's public clouds, the assumption is that providers of cloud services can be fully trusted to provide systems secure against any threat.

group_project

Visible to the public EAGER: Collaborative Research: E-Witness: Preserve and Prove Forensic Soundness of Digital Evidence

This project seeks to explore the challenges of developing E-Witness - a system that allows civilians to use their smart devices to collect forensically sound multimedia evidence. In order to be considered authentic and forensically sound, a digital evidence needs to have a proof of being untampered and the time and location of the event needs to be attested in a way that it is immutable.

group_project

Visible to the public EAGER: Tracing Privacy-Policy Statements into Code for Privacy-Aware Mobile App Developmen

Privacy for smartphone and mobile applications users present unprecedented threats. In the United States, privacy policies serve as the primary means to inform users about how mobile apps process privacy data. The application developers are responsible for implementing privacy policies so that the code corresponds to the policies. Currently, there are no techniques for tracing high-level privacy practices into code.

group_project

Visible to the public EAGER: Towards Securing Visible Light Communications

Due to its many nice features such as license-free spectrum, abundant bandwidth, and Gbps-level transmission rate, visible light communication (VLC) has been considered to be a promising small-cell solution for alleviating the RF spectrum scarcity problem in the 5G era. While the research on VLC devices has made significant progress in recent years, the security aspect of VLC has not been well understood so far.

group_project

Visible to the public EAGER: Exploring the Feasibility of Software Testing Techniques to Evaluate Fairness Algorithms in Software Systems

Today, software is making more automated decisions with societal impact. For example, software determines who gets a loan or gets hired, computes risk-assessment scores that help decide who goes to jail and who is set free, and aids in diagnosing and treating medical patients. The increased role of software in such decisions makes software fairness a critical property. As more societal functions operate in cyberspace, the importance of software fairness increases.

group_project

Visible to the public EAGER: Digital Inequalities in the Heartland: Exploring the Information Security Experiences of Marginalized Internet Users

This project aims to understand how Internet technology may affect patrons' privacy and data security when they use public access computers, and to develop technical solutions that will enable these individuals to go online more safely and securely. The project concentrates especially on people who are economically poor and vulnerable to risk, such as very young or old people, people of color, immigrants, Native people, non-English speakers, and the disabled. Often these patrons must rely on public libraries for their broadband Internet access.

group_project

Visible to the public EAGER: Collaborative: A Criminology-Based Simulation of Dynamic Adversarial Behavior in Cyberattacks

In 2016, the cyberthreat landscape showcased advanced attack techniques, escalated attack frequency, and high levels of adversarial sophistication. Conventional cyberattack management is response-driven, with organizations focusing their efforts on detecting threats, rather than anticipating adversarial actions. This reactive approach has limited efficacy, as it does not capture advanced and sophisticated adversaries, mutating or unknown malware, living-off-the-land techniques or new variants being deployed. There is thus an immediate need for a paradigm shift in the area of cybersecurity.