Division of Computer and Network Systems (CNS)

group_project

Visible to the public CAREER: A Dual-VM Binary Code Reuse Based Framework for Automated Virtual Machine Introspection

Virtual Machine Monitors (VMMs) and hypervisors have become a foundational technology for system developers to achieve increased levels of security, reliability, and manageability for large-scale computing systems such as cloud computing. However, when developing software at the VMM layer, developers often need to interpret the very low level hardware layer state and reconstruct the semantic meanings of the guest operating system events due to the lack of operating system level abstractions.

group_project

Visible to the public TWC: Medium: Collaborative: Systems, Tools, and Techniques for Executing, Managing, and Securing SGX Programs

The Intel Software Guard Extensions (SGX) is a new technology introduced to make secure and trustworthy computing in a hostile environment practical. However, SGX is merely just a set of instructions. Its software support that includes the OS support, toolchain and libraries, is currently developed in a closed manner, limiting its impact only within the boundary of big companies such as Intel and Microsoft. Meanwhile, SGX does not automatically secure everything and it still faces various attacks such as controlled-side channel and enclave memory corruption.

group_project

Visible to the public TWC: Small: User Behavior Modeling and Prediction in Anonymous Social Networks

Human beings are diverse, and their online behavior is often unpredictable. In today's data-driven world, providers of online services are collecting detailed and comprehensive server-side traces of user activity. These records or logs include detailed, timestamped logs of actions taken by users, often called clickstreams. Given their scale and level of detail, clickstreams present an enormous opportunity for research into user behavioral analysis and modeling.

group_project

Visible to the public EAGER: Collaborative: Secure and Trustworthy Cyberphysical Microfluidic Systems

This project's overarching goal is to ensure the security and trustworthiness of cyber-physical microfluidic systems (CPMS). Microfluidic systems are devices that handle small volumes of fluids and are usually coupled with "cyber" elements such as sensors and intelligent control algorithms to improve performance and reliability. CPMS are coming of age in an era of rampant cybersecurity issues, and novel security and trust solutions are the need of the hour.

group_project

Visible to the public EAGER: Collaborative: Secure and Trustworthy Cyberphysical Microfluidic Systems

This project's overarching goal is to ensure the security and trustworthiness of cyber-physical microfluidic systems (CPMS). Microfluidic systems are devices that handle small volumes of fluids and are usually coupled with "cyber" elements such as sensors and intelligent control algorithms to improve performance and reliability. CPMS are coming of age in an era of rampant cybersecurity issues, and novel security and trust solutions are the need of the hour.

group_project

Visible to the public EAGER: Collaborative: Secure and Trustworthy Cyberphysical Microfluidic Systems

This project's overarching goal is to ensure the security and trustworthiness of cyber-physical microfluidic systems (CPMS). Microfluidic systems are devices that handle small volumes of fluids and are usually coupled with "cyber" elements such as sensors and intelligent control algorithms to improve performance and reliability. CPMS are coming of age in an era of rampant cybersecurity issues, and novel security and trust solutions are the need of the hour.

group_project

Visible to the public CAREER: Towards Provably-Secure Design of Integrated Circuits

The production of computer chips has universally moved offshore in recent years, reducing design complexity and fabrication cost. But these benefits come at the expense of security: An attack anywhere along the supply chain can insert malicious components into an integrated circuit, pirate its design or counterfeit it. These attacks, which are exceedingly difficult to detect, jeopardize the computer industry, undermine national security, and put critical infrastructure in danger.

group_project

Visible to the public STARSS: Small: Collaborative: Physical Design for Secure Split Manufacturing of Ics

The trend of outsourcing semiconductor manufacturing to oversea foundries has introduced several security vulnerabilities -- reverse engineering, malicious circuit insertion, counterfeiting, and intellectual property piracy -- making the semiconductor industry lose billions of dollars. Split manufacturing of integrated circuits reduces vulnerabilities introduced by an untrusted foundry by manufacturing only some of the layers at an untrusted high-end foundry and the remaining layers at a trusted low-end foundry.

group_project

Visible to the public Synergy: Collaborative: CPS-Security: End-to-End Security for the Internet of Things

Computation is everywhere. Greeting cards have processors that play songs. Fireworks have processors for precisely timing their detonation. Computers are in engines, monitoring combustion and performance. They are in our homes, hospitals, offices, ovens, planes, trains, and automobiles. These computers, when networked, will form the Internet of Things (IoT). The resulting applications and services have the potential to be even more transformative than the World Wide Web. The security implications are enormous. Internet threats today steal credit cards.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Exploiting Physical Properties in Wireless Networks for Implicit Authentication

The rapid development of information technology not only leads to great convenience in our daily lives, but also raises significant concerns in the field of security and privacy. Particularly, the authentication process, which serves as the first line of information security by verifying the identity of a person or device, has become increasingly critical. An unauthorized access could result in detrimental impact on both corporation and individual in both secrecy loss and privacy leakage.