Division of Computer and Network Systems (CNS)

group_project

Visible to the public EAGER: SaTC: Early-Stage Interdisciplinary Collaboration: Designing Trustworthy and Transparent Information Platforms

Defined as openness to the information creation and reporting process, transparency is a way for information institutions that have an online presence to reconnect with citizens and establish their legitimacy. This research will conduct a series of design investigations to illuminate the critical new phenomenon of transparency to rebuild public trust in one such information institution--journalistic organizations. Marrying mass communications research with human-centered computing, this research will take a novel interdisciplinary approach to answer the following questions.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Automatically Answering People's Privacy Questions

As novel technologies collect increasingly large and diverse amounts of data about us, people are unable to keep up and retain control over what happens to their data. The current legal approach to privacy concentrates on the concept of "Notice and Choice", namely the expectation that people are provided sufficient information about the collection and use of their data, and are offered meaningful choices about these practices (e.g., opt out, opt in). A primary element of this approach relies on privacy policies to communicate this information to people.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Automatically Answering People's Privacy Questions

As novel technologies collect increasingly large and diverse amounts of data about us, people are unable to keep up and retain control over what happens to their data. The current legal approach to privacy concentrates on the concept of "Notice and Choice", namely the expectation that people are provided enough information about the collection and use of their data and are offered meaningful choices about these practices (e.g., opt out, opt in). A primary element of this approach relies on privacy policies to communicate this information to people.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Automatically Answering People's Privacy Questions

As novel technologies collect increasingly large and diverse amounts of data about us, people are unable to keep up and retain control over what happens to their data. The current legal approach to privacy concentrates on the concept of "Notice and Choice", namely the expectation that people are provided sufficient information about the collection and use of their data, and are offered meaningful choices about these practices (e.g., opt out, opt in). A primary element of this approach relies on privacy policies to communicate this information to people.

group_project

Visible to the public CAREER: Towards the Security of Heterogeneous CPU-FPGA Systems

With the rapidly growing demand of high performance computations, the traditional central processing unit (CPU)-based computing systems have been deployed with field programmable gate array (FPGA) components for hardware acceleration, such as in the emerging CPU-FPGA cloud systems. Despite the significant performance benefits, the CPU-FPGA architecture introduces new attack surfaces through the communications between the two heterogeneous components.

group_project

Visible to the public SaTC: CORE: Small: RUI: Improving Performance of Standoff Iris Recognition Systems Using Deep Learning Frameworks

The iris of the eye enables one of the most accurate, distinctive, universal, and reliable biometrics for authenticating the identity of a person. However, the accuracy of iris recognition depends on the quality of data acquisition, which is negatively affected by the angle of view, occlusion, dilation, and other factors. Since standoff iris recognition systems are much less constrained than traditional systems, the captured iris images are likely to be off-angle, dilated, and otherwise less than ideal.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: New Frontiers in Encryption Systems

Encryption is the process of encoding data into a ciphertext such that only the intended recipient can decode and learn the data. This project pushes the frontiers of what is achievable for encryption. The project's novelties are building encryption systems with advanced capabilities that have provable security under standard assumptions. These include the capability to trace malicious users who leak confidential information as well as the ability to only release select pieces of information to users on a need to know basis.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Enabling Precise and Automated Insecurity Analysis of Middleware on Mobile Platforms

During the past decade, middleware on mobile platforms (such as the Application Framework in Android and the Core Services layer in iOS) has been flourishing, but the insecurity analysis of such middleware has been lagging behind. For example, while comprehensive studies have been conducted at the application layer of the Android system, there is very limited work analyzing the Android Application Framework (Android Framework, for short), a middleware layer in the Android system.

group_project

Visible to the public TWC SBE: Medium: Collaborative: Building a Privacy-Preserving Social Networking Platform from a Technological and Sociological Perspective

Social networks provide many benefits, but also give rise to serious concerns regarding privacy. Indeed, since privacy protections are not intrinsically incorporated into the underlying technological framework, user data is still accessible to the social network and is open to misuse. While there have been efforts to incorporate privacy into social networks, existing solutions are not sufficiently lightweight, transparent, and functional, and therefore have achieved only limited adoption.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Effective Formal Reasoning for Mobile Malware

Since their inception a decade ago, smartphones have become the pillars of our digital life, storing security-sensitive information ranging from medical and banking data to our entire electronic communication history. Due to our increasing reliance on mobile applications in daily life, there has been a steady increase in both the number and sophistication of mobile malware samples. This project's impacts are to make it easier for users and organizations to identify malicious applications and thereby prevent people from around the globe from becoming victims of mobile malware.