Division of Computer and Network Systems (CNS)
group_project
Submitted by Tanushree Mitra on Tue, 08/06/2019 - 12:54pm
Defined as openness to the information creation and reporting process, transparency is a way for information institutions that have an online presence to reconnect with citizens and establish their legitimacy. This research will conduct a series of design investigations to illuminate the critical new phenomenon of transparency to rebuild public trust in one such information institution--journalistic organizations. Marrying mass communications research with human-centered computing, this research will take a novel interdisciplinary approach to answer the following questions.
group_project
Submitted by Norman Sadeh on Tue, 08/06/2019 - 11:58am
As novel technologies collect increasingly large and diverse amounts of data about us, people are unable to keep up and retain control over what happens to their data. The current legal approach to privacy concentrates on the concept of "Notice and Choice", namely the expectation that people are provided sufficient information about the collection and use of their data, and are offered meaningful choices about these practices (e.g., opt out, opt in). A primary element of this approach relies on privacy policies to communicate this information to people.
group_project
Submitted by Joel Reidenberg on Tue, 08/06/2019 - 11:56am
As novel technologies collect increasingly large and diverse amounts of data about us, people are unable to keep up and retain control over what happens to their data. The current legal approach to privacy concentrates on the concept of "Notice and Choice", namely the expectation that people are provided enough information about the collection and use of their data and are offered meaningful choices about these practices (e.g., opt out, opt in). A primary element of this approach relies on privacy policies to communicate this information to people.
group_project
Submitted by Shomir Wilson on Tue, 08/06/2019 - 11:53am
As novel technologies collect increasingly large and diverse amounts of data about us, people are unable to keep up and retain control over what happens to their data. The current legal approach to privacy concentrates on the concept of "Notice and Choice", namely the expectation that people are provided sufficient information about the collection and use of their data, and are offered meaningful choices about these practices (e.g., opt out, opt in). A primary element of this approach relies on privacy policies to communicate this information to people.
group_project
Submitted by Sheng Wei on Tue, 08/06/2019 - 11:39am
With the rapidly growing demand of high performance computations, the traditional central processing unit (CPU)-based computing systems have been deployed with field programmable gate array (FPGA) components for hardware acceleration, such as in the emerging CPU-FPGA cloud systems. Despite the significant performance benefits, the CPU-FPGA architecture introduces new attack surfaces through the communications between the two heterogeneous components.
group_project
Submitted by Mahmut Karakaya on Tue, 08/06/2019 - 11:24am
The iris of the eye enables one of the most accurate, distinctive, universal, and reliable biometrics for authenticating the identity of a person. However, the accuracy of iris recognition depends on the quality of data acquisition, which is negatively affected by the angle of view, occlusion, dilation, and other factors. Since standoff iris recognition systems are much less constrained than traditional systems, the captured iris images are likely to be off-angle, dilated, and otherwise less than ideal.
group_project
Submitted by Brent Waters on Tue, 08/06/2019 - 11:20am
Encryption is the process of encoding data into a ciphertext such that only the intended recipient can decode and learn the data. This project pushes the frontiers of what is achievable for encryption. The project's novelties are building encryption systems with advanced capabilities that have provable security under standard assumptions. These include the capability to trace malicious users who leak confidential information as well as the ability to only release select pieces of information to users on a need to know basis.
group_project
Submitted by Qiang Zeng on Tue, 08/06/2019 - 11:10am
During the past decade, middleware on mobile platforms (such as the Application Framework in Android and the Core Services layer in iOS) has been flourishing, but the insecurity analysis of such middleware has been lagging behind. For example, while comprehensive studies have been conducted at the application layer of the Android system, there is very limited work analyzing the Android Application Framework (Android Framework, for short), a middleware layer in the Android system.
group_project
Submitted by Wei Jiang on Tue, 08/06/2019 - 10:52am
Social networks provide many benefits, but also give rise to serious concerns regarding privacy. Indeed, since privacy protections are not intrinsically incorporated into the underlying technological framework, user data is still accessible to the social network and is open to misuse. While there have been efforts to incorporate privacy into social networks, existing solutions are not sufficiently lightweight, transparent, and functional, and therefore have achieved only limited adoption.
group_project
Submitted by Yu Feng on Tue, 08/06/2019 - 10:49am
Since their inception a decade ago, smartphones have become the pillars of our digital life, storing security-sensitive information ranging from medical and banking data to our entire electronic communication history. Due to our increasing reliance on mobile applications in daily life, there has been a steady increase in both the number and sophistication of mobile malware samples. This project's impacts are to make it easier for users and organizations to identify malicious applications and thereby prevent people from around the globe from becoming victims of mobile malware.