Division of Computer and Network Systems (CNS)
group_project
Submitted by Kristen Walker on Mon, 07/06/2020 - 3:13pm
This project explores technology adoption practices and interactions and the digital data literacy of education technology adoption decision makers in California K-12 public school districts. Data profiles constructed from the comingling of data from many sources (school, home, mobile technology) can follow the individual through his or her lifetime.
group_project
Submitted by Daniele Micciancio on Mon, 07/06/2020 - 3:11pm
Modern computer applications require not only to protect data using encryption, but also to perform computations on data in encrypted form, e.g., in a cloud computing setting where private data is stored and processed on a remote, untrusted server.
group_project
Submitted by Hsinchun Chen on Mon, 07/06/2020 - 3:07pm
It is estimated that cybercrime costs the global economy around $445 billion annually, particularly due to intellectual property theft and financial fraud using stolen consumer data. Incidents of large-scale hacking and data theft occur regularly, with many cyberattacks resulting in theft of sensitive personal information or intellectual property. Cybersecurity will remain a critical problem for the foreseeable future, necessitating more research on a large, diverse, covert and evolving international hacker community.
group_project
Submitted by Prabhat Mishra on Mon, 07/06/2020 - 3:05pm
System-on-Chip (SoC) is the driving force behind computing and communication in a wide variety of electronic systems, ranging from simple devices in smart homes to complex systems in satellites. Network-on-Chip (NoC) is a commonly used solution for on-chip communication between components in complex SoCs. To meet cost and time-to-market constraints, SoCs are designed using various hardware components, often gathered from untrusted third-party vendors. Despite increasing importance of trusted communication in overall system security, NoC security is relatively under-investigated.
group_project
Submitted by Jason Polakis on Mon, 07/06/2020 - 3:03pm
Technical advancements in modern smartphones and the widespread availability of Internet on-the-go have resulted in the world wide web becoming an inextricable part of everyday lives, pervading professional, social and personal activities. At the core of all this lies the ability to identify (i.e., authenticate) users and devices and allowing (i.e., authorizing) them to access accounts and sensitive resources.
group_project
Submitted by Patrick Traynor on Mon, 07/06/2020 - 2:55pm
In a world in which many new computing devices have limited or no traditional user interface (e.g., smart thermostats, personal digital assistants including Amazon's Alexa, etc), voice interfaces are becoming a primary means of interaction. Such systems not only simplify interaction with conventional devices for traditional users, but also promote broader inclusion for both the elderly and those with disabilities.
group_project
Submitted by Yanchao Zhang on Mon, 07/06/2020 - 2:32pm
Edge computing has quickly risen as an effective paradigm to capture, process, gain insights from, and act upon the massive amount of Internet of Things (IoT) data close to where it is generated. Future edge computing systems are expected to be hierarchical and heterogeneous. It will become increasingly common for a single IoT application to utilize edge computing resources owned by multiple entities.
group_project
Submitted by Rui Zhang on Mon, 07/06/2020 - 2:26pm
Edge computing has quickly risen as an effective paradigm to capture, process, gain insights from, and act upon the massive amount of Internet of Things (IoT) data close to where it is generated. Future edge computing systems are expected to be hierarchical and heterogeneous. It will become increasingly common for a single IoT application to utilize edge computing resources owned by multiple entities.
group_project
Submitted by danadach on Mon, 07/06/2020 - 2:23pm
The fields of coding theory and cryptography are intertwined, with each field influencing the other: Certain error correcting codes from coding theory are equivalent to a type of secret sharing scheme used in cryptography to achieve secure multiparty computation. Other types of coding/secret sharing schemes (such as non-malleable codes and leakage-resilient secret sharing) were first proposed to solve security problems arising in cryptographic settings. There are currently many variants of coding/secret sharing schemes, and most of the constructions are complex or ad-hoc.
group_project
Submitted by Mayank Varia on Mon, 07/06/2020 - 1:52pm
This project explores the intriguing possibilities that result from the combination of two tools: cryptographic software that distributes any computing task over several machines with strong security guarantees as long as the machines are isolated, and a multi-provider cloud datacenter that offers to any tenant the ability to rent multiple isolated machines that are administered by different organizations.