Division of Computer and Network Systems (CNS)
group_project
Submitted by Paul Ampadu on Mon, 07/06/2020 - 1:29pm
Electronic devices found in a smart home, automobile, airplane, medical, and industrial applications are becoming more capable of on-the-spot processing information with their own embedded processors. While embedded processors make life easier, they also open the door to theft or corruption of our sensitive data. Malign actors can monitor power or radiation signatures in and around a device, and discover its secrets using side-channel attacks.
group_project
Submitted by Sihong Xie on Mon, 07/06/2020 - 11:23am
Online reputation systems are ubiquitous for customers to evaluate businesses, products, people, and organizations based on reviews from the crowd. For example, Yelp and TripAdvisor rank restaurants and hotels based on user reviews, and RateMDs allows patients to review doctors and hospitals. These systems can however be leveraged by spammers to mislead and manipulate the inexperienced customers with fake but well-disguised reviews (spams). To comprehensively protect customers and honest businesses, advanced spam detection techniques have been deployed.
group_project
Submitted by Philip Yu on Mon, 07/06/2020 - 11:20am
Online reputation systems are ubiquitous for customers to evaluate businesses, products, people, and organizations based on reviews from the crowd. For example, Yelp and TripAdvisor rank restaurants and hotels based on user reviews, and RateMDs allows patients to review doctors and hospitals. These systems can however be leveraged by spammers to mislead and manipulate the inexperienced customers with fake but well-disguised reviews (spams). To comprehensively protect customers and honest businesses, advanced spam detection techniques have been deployed.
group_project
Submitted by Zhuoqing Mao on Mon, 07/06/2020 - 11:18am
Connected and Automated Vehicle (CAV) technologies enable real-time information sharing and driving automation, with the potential of significantly improving safety and efficiency of the transportation system. However, cyber-security threats may compromise the efficiency of infrastructure operations and the safety of passengers, posing a significant challenge for CAV deployment. This collaborative project develops a novel CAV testing platform to address the critical needs for assessing the security and safety concerns of the CAV system in an effective and realistic manner.
group_project
Submitted by Qi Chen on Mon, 07/06/2020 - 11:14am
Connected and Automated Vehicle (CAV) technologies enable real-time information sharing and driving automation, with the potential of significantly improving safety and efficiency of the transportation system. However, cyber-security threats may compromise the efficiency of infrastructure operations and the safety of passengers, posing a significant challenge for CAV deployment. This collaborative project develops a novel CAV testing platform to address the critical needs for assessing the security and safety concerns of the CAV system in an effective and realistic manner.
group_project
Submitted by Barton Miller on Mon, 07/06/2020 - 11:12am
Vulnerabilities in cryptographic implementations seriously reduce the security guarantees of algorithms in practice and lead to attacks. An effective fix to the vulnerable code problem is automatic code checking. However, existing code verification tools cannot adequately cover cryptographic properties due to deficiencies in both accuracy, in terms of missed detection and false alarms, and scalability, in terms of complexity and runtime. The technology in this transition-to-practice project is to help secure cryptographic implementations, which are the foundation of many advanced systems.
group_project
Submitted by Danfeng Yao on Mon, 07/06/2020 - 10:59am
Vulnerabilities in cryptographic implementations seriously reduce the security guarantees of algorithms in practice and lead to attacks. An effective fix to the vulnerable code problem is automatic code checking. However, existing code verification tools cannot adequately cover cryptographic properties due to deficiencies in both accuracy, in terms of missed detection and false alarms, and scalability, in terms of complexity and runtime. The technology in this transition-to-practice project is to help secure cryptographic implementations, which are the foundation of many advanced systems.
group_project
Submitted by Raheem Beyah on Mon, 07/06/2020 - 10:56am
The power grid is a highly complex control system and one of the most impressive engineering feats of the modern era. Nearly every facet of modern society critically relies on the proper operation of the power grid such that long or even short interruptions can impose significant economic and social hardship on society. The current power grid is undergoing a transformation to a Smart Grid, that seeks to monitor and track diagnostic and operational information so as to enable a more efficient and resilient system.
group_project
Submitted by Bo Chen on Mon, 07/06/2020 - 10:51am
Mobile computing devices typically use encryption to protect sensitive information. However, traditional encryption systems used in mobile devices cannot defend against an active attacker who can force the mobile device owner to disclose the key used for decrypting the sensitive information. This is particularly of concern to dissident users who are targets of nation states.
group_project
Submitted by Weisong_Shi on Mon, 07/06/2020 - 10:24am
Mobile computing devices typically use encryption to protect sensitive information. However, traditional encryption systems used in mobile devices cannot defend against an active attacker who can force the mobile device owner to disclose the key used for decrypting the sensitive information. This is particularly of concern to dissident users who are targets of nation states.