Division of Computer and Network Systems (CNS)

group_project

Visible to the public EAGER: Protecting Data Access Pattern Privacy in Hybrid Cloud Storage Systems

Cloud-based storage services are gaining increasing popularity for their attractive pay-as-you-go model and high availability, reliability and economic efficiency. Meanwhile, there is an increasing privacy consciousness among users regarding this storage paradigm. While encryption provides some protection for data privacy, it cannot protect data access patterns, which can reveal private information about cloud storage clients.

group_project

Visible to the public SaTC: CORE: EAGER: Finding Semantic Security Bugs with Pseudo-Oracle Testing

Semantic security bugs cause serious vulnerabilities across a wide range of software. For example, in a recent incident, attackers exploited a semantic security bug in Apache Struts to steal sensitive personal data of up to 143 million customers from Equifax servers. In fact, such vulnerabilities are quite common in practice. The total number of Common Vulnerabilities and Exposure Identifiers (CVEs) assigned to different types of semantic security bugs exceeds 2,000 just this year alone.

group_project

Visible to the public EAGER: SaTC: Post-Quantum Indifferentiability

Current technology for securing Internet traffic relies on cryptographic protocols that are based on the presumed difficulty of two mathematical problems - the factorization problem and the discrete logarithm problem. However, the emerging technology of quantum computers - a type of computer that leverages the laws of quantum mechanics to perform certain computations faster than classical computers - can efficiently solve both of these problems and thus effectively attack the respective cryptographic protocols.

group_project

Visible to the public EAGER: Invisible Shield: Can Compression Harden Deep Neural Networks Universally Against Adversarial Attacks?

Deep neural networks (DNNs) are finding applications in wide-ranging applications such as image recognition, medical diagnosis and self-driving cars. However, DNNs suffer from a security threat: decisions can be misled by adversarial inputs crafted by adding human-imperceptible perturbations into normal inputs during training of DNN model. Defending against adversarial attacks is challenging due to multiple attack vectors, unknown adversary's strategies and cost.

group_project

Visible to the public TWC SBE: Medium: Collaborative: Brain Hacking: Assessing Psychological and Computational Vulnerabilities in Brain-based Biometrics

In September of 2015, it was reported that hackers had stolen the fingerprint records of 5.6 million U.S. federal employees from the Office of Personnel Management (OPM). This was a severe security breach, and it is an even bigger problem because those fingerprints are now permanently compromised and the users cannot generate new fingerprints. This breach demonstrates two challenging facts about the current cybersecurity landscape. First, biometric credentials are vulnerable to compromise. And, second, biometrics that cannot be replaced if stolen are even more vulnerable to theft.

group_project

Visible to the public EAGER: An Open Mobile App Platform to Support Research on Fraudulent Reviews

The pressure to succeed in online, peer-review websites has created a black market for search rank fraud. Fraud workers, who may control hundreds of user accounts, connect with product developers through crowdsourcing sites, then, from the accounts that they control, post fake activities, ratings, and reviews for site-owners' products. Most peer-review systems use fraud detection to filter out fake activities, but fraud nevertheless persists.

group_project

Visible to the public EAGER: Quantum-Safe Cryptosystems Based on Isogenies

This award supports research into the security of a new family of cryptosystems based on a mathematical structure called isogenies of elliptic curves. The research will also include the development of new isogeny-based protocols. These protocols are among the front runners in the process of replacement of the current public key primitives by alternatives that will be secure against attacks by quantum computers. The transition towards a quantum-safe cyberspace is an immediate priority for the cryptography community.

group_project

Visible to the public Applied Privacy Research Coordination Network: An Industry-Academic Network to Transition Promising Privacy Research to Practice

The Future of Privacy Forum Education and Innovation Foundation (FPF EIF) is establishing the Applied Privacy Research Coordination Network (Applied Privacy RCN) to support the transition of academic privacy research to commercial practice by providing ongoing, structured networking and opportunities for privacy scholars to meet industry leaders involved in their research areas and develop working partnerships. The Applied Privacy RCN will promote new knowledge, techniques and practices to better protect individual privacy.

group_project

Visible to the public EAGER: Exploring the Feasibility of Phoneme Sound Origins to Enhance Mobile Authentication

Using mobile devices to authenticate a person's identity, both for access to the device itself and as a platform for verifying access to other nearby devices, is an important problem to address in building secure and private computing systems. This proposal seeks to improve voice recognition as an authentication tool by developing physical models of people's vocal tracts that uniquely affect how individual people produce sounds.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Defending against Compromise and Manipulation of Mobile Communities

Many of today's mobile services build mobile communities of users who share their valuable experiences and data. Examples include traffic incidents (Waze), restaurant reviews (Yelp, FourSquare), anonymous social networks (Whisper, Yik Yak), and even dating (Tinder, Bumble). Unfortunately, new threats can compromise and manipulate these communities, using lightweight software to mimic mobile devices. The resesarchers have shown how attackers can eavesdrop on mobile network traffic, learn their patterns, and write software to emulate mobile devices running the application.