Division of Computer and Network Systems (CNS)

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Effective Formal Reasoning for Mobile Malware

Since their inception a decade ago, smartphones have become the pillars of our digital life, storing security-sensitive information ranging from medical and banking data to our entire electronic communication history. Due to our increasing reliance on mobile applications in daily life, there has been a steady increase in both the number and sophistication of mobile malware samples. This project's impacts are to make it easier for users and organizations to identify malicious applications and thereby prevent people from around the globe from becoming victims of mobile malware.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: New Frontiers in Encryption Systems

Encryption is the process of encoding data into a ciphertext such that only the intended recipient can decode and learn the data. This project pushes the frontiers of what is achievable for encryption. The project's novelties are building encryption systems with advanced capabilities that have provable security under standard assumptions. These include the capability to trace malicious users who leak confidential information as well as the ability to only release select pieces of information to users on a need to know basis.

group_project

Visible to the public SaTC: CORE: Small: Secure and Efficient Solutions for Post-Quantum Cryptography for Codes with Compact Representations

Current public-key cryptography is based on well-known problems from the area of mathematics called Number Theory. These problems are vulnerable to attacks able to exploit the superior computational power of Quantum computers (such as Shor's algorithm). Small Quantum computers are already a reality, and the cryptographic community is currently hard at work to design the new cryptographic standards which will become actual once sufficiently large Quantum computers finally become available, making current cryptographic solutions obsolete.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Security of Reconfigurable Cloud Computing

Large-scale computer systems that can perform challenging computations can now be leased by the general public for seconds, minutes, or hours at a time. Although these systems typically use microprocessors for most computation, recently, special reconfigurable computer chips called field-programmable gate arrays (FPGAs) have been integrated into these publicly-available systems. Although these chips are more powerful than microprocessors, they have security weaknesses that could put users' data at risk and expose their personal information.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Security of Reconfigurable Cloud Computing

Large-scale computer systems that can perform challenging computations can now be leased by the general public for seconds, minutes, or hours at a time. Although these systems typically use microprocessors for most computation, recently, special reconfigurable computer chips called field-programmable gate arrays (FPGAs) have been integrated into these publicly-available systems. Although these chips are more powerful than microprocessors, they have security weaknesses that could put users' data at risk and expose their personal information.

group_project

Visible to the public SaTC: CORE: Small: Authentication Solutions for Individuals with Upper Extremity Impairment

Authentication solutions for personal computing devices, such as people use to login to their laptops and smart phones, are usually designed with able-bodied individuals in mind. But designs for the able-bodied often make authentication difficult for people with disabilities, particularly for those with upper extremity impairment. Such persons often lack the range of motion, strength, endurance, speed, and/or accuracy associated with normal behavior of the arms, hands, or fingers. Over 20 million people in the U.S. alone suffer from conditions that lead to upper extremity impairment.

group_project

Visible to the public CRII: SaTC: Towards Paving the Way for Large-Scale Malware Analysis: New Directions in Generic Binary Unpacking

Malware, with harmful intent to compromise computer systems, has been one of the significant challenges to the Internet. Driven by the rich profit, relentless malware developers apply various obfuscation schemes to circumvent malware detection. Binary packing is the most common obfuscation adopted by malware authors to camouflage malicious code and defeat popular signature-based malware detection. Binary packing first encrypts or compresses malware code as data, making it immune to static analysis.

group_project

Visible to the public CRII: SaTC: A Malware-Inspired Approach to Mobile Application Repackaging and Tampering Detection

Mobile application ("app") repackaging is a severe threat to the flourishing mobile market and numerous users. 97% of the top paid Android apps and 87% of the iOS ones have been repackaged. Besides, it is one of the most common ways of propagating mobile malware. Existing countermeasures mostly detect repackaging based on app similarity measurement, which tends to be imprecise when obfuscations are applied to repackaged apps.

group_project

Visible to the public CRII: SaTC: Leveraging Userland In-Memory Objects for Cybercrime Investigations and Malware Classification

On mobile devices, the advancement and sophistication in application development and the great reliance on their functionality daily by many users makes them a critical piece of evidence for digital investigations. This project focuses on the reconstruction of app execution to recover user and fingerprint malware activities on mobile devices. The research will provide a methodology for investigators to easily outline user actions and strategies, and possible malware attack blueprint without the need for prior knowledge of the target application logic.

group_project

Visible to the public TWC: Small: Collaborative: Towards Privacy Preserving Online Image Sharing

On-line sharing of images has become a key enabler of users' connectivity. Various types of images are shared through social media to represent users' interests and experiences. While extremely convenient and socially valuable, this level of pervasiveness introduces acute privacy concerns. First, once shared images may go anywhere, as copying / resharing images is straightforward. Second, the information disclosed through an image reveals aspects of users' private lives, affecting both the owner and other subjects in the image.