Division of Computer and Network Systems (CNS)
group_project
Submitted by Isil Dillig on Tue, 08/06/2019 - 10:42am
Since their inception a decade ago, smartphones have become the pillars of our digital life, storing security-sensitive information ranging from medical and banking data to our entire electronic communication history. Due to our increasing reliance on mobile applications in daily life, there has been a steady increase in both the number and sophistication of mobile malware samples. This project's impacts are to make it easier for users and organizations to identify malicious applications and thereby prevent people from around the globe from becoming victims of mobile malware.
group_project
Submitted by Susan Hohenberger on Tue, 08/06/2019 - 10:27am
Encryption is the process of encoding data into a ciphertext such that only the intended recipient can decode and learn the data. This project pushes the frontiers of what is achievable for encryption. The project's novelties are building encryption systems with advanced capabilities that have provable security under standard assumptions. These include the capability to trace malicious users who leak confidential information as well as the ability to only release select pieces of information to users on a need to know basis.
group_project
Submitted by epersichetti on Tue, 08/06/2019 - 10:20am
Current public-key cryptography is based on well-known problems from the area of mathematics called Number Theory. These problems are vulnerable to attacks able to exploit the superior computational power of Quantum computers (such as Shor's algorithm). Small Quantum computers are already a reality, and the cryptographic community is currently hard at work to design the new cryptographic standards which will become actual once sufficiently large Quantum computers finally become available, making current cryptographic solutions obsolete.
group_project
Submitted by Russell Tessier on Tue, 08/06/2019 - 10:12am
Large-scale computer systems that can perform challenging computations can now be leased by the general public for seconds, minutes, or hours at a time. Although these systems typically use microprocessors for most computation, recently, special reconfigurable computer chips called field-programmable gate arrays (FPGAs) have been integrated into these publicly-available systems. Although these chips are more powerful than microprocessors, they have security weaknesses that could put users' data at risk and expose their personal information.
group_project
Submitted by Jakub Szefer on Tue, 08/06/2019 - 10:07am
Large-scale computer systems that can perform challenging computations can now be leased by the general public for seconds, minutes, or hours at a time. Although these systems typically use microprocessors for most computation, recently, special reconfigurable computer chips called field-programmable gate arrays (FPGAs) have been integrated into these publicly-available systems. Although these chips are more powerful than microprocessors, they have security weaknesses that could put users' data at risk and expose their personal information.
group_project
Submitted by Krishna Venkatasu... on Tue, 08/06/2019 - 10:04am
Authentication solutions for personal computing devices, such as people use to login to their laptops and smart phones, are usually designed with able-bodied individuals in mind. But designs for the able-bodied often make authentication difficult for people with disabilities, particularly for those with upper extremity impairment. Such persons often lack the range of motion, strength, endurance, speed, and/or accuracy associated with normal behavior of the arms, hands, or fingers. Over 20 million people in the U.S. alone suffer from conditions that lead to upper extremity impairment.
group_project
Submitted by Jiang Ming on Tue, 08/06/2019 - 9:58am
Malware, with harmful intent to compromise computer systems, has been one of the significant challenges to the Internet. Driven by the rich profit, relentless malware developers apply various obfuscation schemes to circumvent malware detection. Binary packing is the most common obfuscation adopted by malware authors to camouflage malicious code and defeat popular signature-based malware detection. Binary packing first encrypts or compresses malware code as data, making it immune to static analysis.
group_project
Submitted by Lannan Luo on Tue, 08/06/2019 - 9:51am
Mobile application ("app") repackaging is a severe threat to the flourishing mobile market and numerous users. 97% of the top paid Android apps and 87% of the iOS ones have been repackaged. Besides, it is one of the most common ways of propagating mobile malware. Existing countermeasures mostly detect repackaging based on app similarity measurement, which tends to be imprecise when obfuscations are applied to repackaged apps.
group_project
Submitted by Aisha Ali-Gombe on Mon, 08/05/2019 - 4:13pm
On mobile devices, the advancement and sophistication in application development and the great reliance on their functionality daily by many users makes them a critical piece of evidence for digital investigations. This project focuses on the reconstruction of app execution to recover user and fingerprint malware activities on mobile devices. The research will provide a methodology for investigators to easily outline user actions and strategies, and possible malware attack blueprint without the need for prior knowledge of the target application logic.
group_project
Submitted by Cornelia Caragea on Mon, 08/05/2019 - 1:53pm
On-line sharing of images has become a key enabler of users' connectivity. Various types of images are shared through social media to represent users' interests and experiences. While extremely convenient and socially valuable, this level of pervasiveness introduces acute privacy concerns. First, once shared images may go anywhere, as copying / resharing images is straightforward. Second, the information disclosed through an image reveals aspects of users' private lives, affecting both the owner and other subjects in the image.