Division of Computer and Network Systems (CNS)

group_project

Visible to the public EAGER: SaTC: Early-Stage Interdisciplinary Collaboration: Developing the Concept of a Near Misses Analysis Capability and NTSB-Model for Cyber Incidents

The idea of extracting information out of cyber incidents that can be used to prevent other, similar incidents at other organizations has often been compared to creating a National Transportation Safety Board (NTSB) for cybersecurity incidents. This project would further this idea by holding a workshop engaged in exploring the barriers to information sharing and data use among organizations, the possible costs and rewards of such a board, the steps required for implementation through policy proposals, and alternative mechanisms, other than a security incident sharing board.

group_project

Visible to the public CRII: SaTC: Image Publication with Differential Privacy

The publication of image data captured by ubiquitous surveillance devices, such as traffic cameras and security surveillance cameras, would greatly benefit various communities and enable many applications. However, sharing image data with untrusted parties would raise privacy concern due to potential sensitive content, like identities and activities that may be in the images. Standard image obfuscation techniques, such as pixelation and blurring, do not provide effective privacy preservation for people or objects represented in the data.

group_project

Visible to the public EAGER: SaTC: Early-Stage Interdisciplinary Collaboration: Improving the Bug Bounty System

Bug bounty programs were once a novel way to encourage security researchers to report vulnerabilities. They are now common. Hundreds of organizations--from car manufactures to the Department of Defense--now operate bug bounty programs that purchase flaws from independent vulnerability researchers. Yet, while bug bounty programs are widely viewed as a promising strategy for reducing software attack surfaces, unsolved social and technological issues can limit the efficacy of these programs.

group_project

Visible to the public EAGER: SaTC: Early-Stage Interdisciplinary Collaboration: Econometrically Inferring and Using Individual Privacy Preferences

Many online platforms use economic mechanisms to estimate the best ways to match consumers and businesses with products and services. Effective matches may require using personal consumer data but doing so may intrude on consumers' privacy. This project will use formal concepts of privacy to analyze the use of personal information in mechanism design.

group_project

Visible to the public CRII: SaTC: New Side-Channel Techniques in Support of Global Monitoring for Network Disruptions

The Internet's size and complexity make it difficult to understand what happens to network packets as they travel from source to destination. Internet service providers and governments sometimes interfere with users' online activities, further complicating this task. This project advances the scientific understanding of network interference detection by developing new methods to remotely measure the manipulation of Internet traffic, such as attempts to censor, tamper with, and monitor users' online activities.

group_project

Visible to the public EAGER: SaTC: Early-Stage Interdisciplinary Collaboration: Modeling Memory Illusion for Predicting Trust in Online Information

This project integrates advances in data science and key findings from psychological research to improve the prediction of trust in information on social media by modeling the psychological phenomenon known as the memory illusion. The memory illusion refers to memory errors that people make to remember information as an outcome of interpreting and making inferences from their past experience. This project will use social media data to examine the memory illusion with online information, and to understand how it is associated with people's trust in information on social media.

group_project

Visible to the public CRII: SaTC: Enhancing Mobile App Security by Detecting Icon-Behavior Contradiction

Mobile applications (i.e., apps) are becoming critical parts in our daily life. While these apps provide better customized services using users' personal data, certain behavior of the apps is less than desirable or harmful. For example, if an app's user interface (UI) has no texts or images to indicate that it will access users' personal data (e.g., GPS data), but the app discloses users' personal data when an action is performed (e.g., pressing a button), then red flags should be raised.

group_project

Visible to the public CRII: SaTC: Robust Design-for-Security (DFS) Architecture for Enabling Trust in Integrated Circuits (IC) Manufacturing and Test

Due to the prohibitive costs of semiconductor manufacturing, most computer chip design companies outsource their production to offshore foundries. As many of these chips may be manufactured in environments of limited trust, problems of the piracy of intellectual property (IP) and the overproduction of integrated circuits (ICs) have emerged in recent years. This project focuses on designing a secure logic locking technique to enable protection against untrusted IC manufacturing. The developed solution is resistant to all known attacks.

group_project

Visible to the public CRII: SaTC: GEMINI: Guided Execution Based Mobile Advanced Persistent Threat Investigation

Advanced persistent threat (APT) campaigns are increasingly targeting mobile devices deployed across corporations, governments, and financial institutions. Unfortunately, prohibitively slow responses to even high-profile APT attacks have shown that authorities lack the capability to quickly investigate ongoing attacks (in a matter of hours or days rather than months).

group_project

Visible to the public CRII: SaTC: Towards the Development of Stronger Memory-Hard Functions for Secure Password Hashing

Recent data breaches have exposed billions of user passwords to the dangerous threat of an offline password attacker who attempts to guess each user's password by brute force. Because an offline attacker can validate each password guess by itself using stolen password hashes from a data breach it is not possible to "lock out" an offline attacker after several incorrect guesses. The attacker is limited only by the computational resources necessary to mount a brute-force attack.