Division of Computer and Network Systems (CNS)

group_project

Visible to the public EAGER: Investigating Elderly Computer Users' Susceptibility to Phishing

One of the most severe and challenging threats to Internet security and privacy is phishing, which uses fake websites to steal users' online identities and sensitive information. Existing studies have evaluated younger users' susceptibility to phishing attacks, but have not paid sufficient attention to elderly users' susceptibility to phishing in realistic environments.

group_project

Visible to the public TWC: Small: Provably Enforcing Practical Multi-Layer Policies in Today's Extensible Software Platforms

A defining characteristic of modern personal computing is the trend towards extensible platforms (e.g., smartphones and tablets) that run a large number of specialized applications, many of uncertain quality or provenance. The common security mechanisms available on these platforms are application isolation and permission systems. Unfortunately, it has been repeatedly shown that these mechanisms fail to prevent a range of misbehaviors, including privilege-escalation attacks and information-flow leakage.

group_project

Visible to the public TWC: Medium: Collaborative: Re[DP]: Realistic Data Mining Under Differential Privacy

The collection and analysis of personal data about individuals has revolutionized information systems and fueled US and global economies. But privacy concerns regarding the use of such data loom large. Differential privacy has emerged as a gold standard for mathematically characterizing the privacy risks of algorithms using personal data. Yet, adoption of differentially private algorithms in industry or government agencies has been startlingly rare.

group_project

Visible to the public TWC: Small: Physiological Information Leakage: A New Front on Health Information Security

With the growing use of implantable and wearable medical devices, information security for such devices has become a major concern. Prior work in this area mostly focuses on attacks on the wireless communication channel among these devices and health data stored in online databases. The proposed work is a departure from this line of research and is motivated by acoustic and electromagnetic physiological information leakage from the medical devices. This type of information leakage can also directly occur from the human body, thus raising privacy concerns.

group_project

Visible to the public STARSS: Small: Side-Channel Analysis and Resiliency Targeting Accelerators

The design of social media interfaces greatly shapes how much, and when, people decide to reveal private information. For example, a designer can highlight a new system feature (e.g., your travel history displayed on a map) and show which friends are using this new addition. By making it seem as if sharing is the norm -- after all, your friends are doing it -- the designer signals to the end-user that he can and should participate and share information.

group_project

Visible to the public Design, Perception, and Action - Engineering Information Give-Away

The design of social media interfaces greatly shapes how much, and when, people decide to reveal private information. For example, a designer can highlight a new system feature (e.g., your travel history displayed on a map) and show which friends are using this new addition. By making it seem as if sharing is the norm -- after all, your friends are doing it -- the designer signals to the end-user that he can and should participate and share information.