Division of Computer and Network Systems (CNS)
group_project
Submitted by zlin61 on Mon, 03/18/2019 - 11:46am
Virtual Machine Monitors (VMMs) and hypervisors have become a foundational technology for system developers to achieve increased levels of security, reliability, and manageability for large-scale computing systems such as cloud computing. However, when developing software at the VMM layer, developers often need to interpret the very low level hardware layer state and reconstruct the semantic meanings of the guest operating system events due to the lack of operating system level abstractions.
group_project
Submitted by zlin61 on Mon, 03/18/2019 - 10:27am
The Intel Software Guard Extensions (SGX) is a new technology introduced to make secure and trustworthy computing in a hostile environment practical. However, SGX is merely just a set of instructions. Its software support that includes the OS support, toolchain and libraries, is currently developed in a closed manner, limiting its impact only within the boundary of big companies such as Intel and Microsoft. Meanwhile, SGX does not automatically secure everything and it still faces various attacks such as controlled-side channel and enclave memory corruption.
group_project
Submitted by Ben Zhao on Mon, 03/18/2019 - 9:57am
Human beings are diverse, and their online behavior is often unpredictable. In today's data-driven world, providers of online services are collecting detailed and comprehensive server-side traces of user activity. These records or logs include detailed, timestamped logs of actions taken by users, often called clickstreams. Given their scale and level of detail, clickstreams present an enormous opportunity for research into user behavioral analysis and modeling.
group_project
Submitted by Ramesh Karri on Mon, 03/18/2019 - 9:50am
This project's overarching goal is to ensure the security and trustworthiness of cyber-physical microfluidic systems (CPMS). Microfluidic systems are devices that handle small volumes of fluids and are usually coupled with "cyber" elements such as sensors and intelligent control algorithms to improve performance and reliability. CPMS are coming of age in an era of rampant cybersecurity issues, and novel security and trust solutions are the need of the hour.
group_project
Submitted by Jeyavijayan Rajen... on Mon, 03/18/2019 - 9:45am
This project's overarching goal is to ensure the security and trustworthiness of cyber-physical microfluidic systems (CPMS). Microfluidic systems are devices that handle small volumes of fluids and are usually coupled with "cyber" elements such as sensors and intelligent control algorithms to improve performance and reliability. CPMS are coming of age in an era of rampant cybersecurity issues, and novel security and trust solutions are the need of the hour.
group_project
Submitted by kchakrabarty on Mon, 03/18/2019 - 9:39am
This project's overarching goal is to ensure the security and trustworthiness of cyber-physical microfluidic systems (CPMS). Microfluidic systems are devices that handle small volumes of fluids and are usually coupled with "cyber" elements such as sensors and intelligent control algorithms to improve performance and reliability. CPMS are coming of age in an era of rampant cybersecurity issues, and novel security and trust solutions are the need of the hour.
group_project
Submitted by Jeyavijayan Rajen... on Mon, 03/18/2019 - 9:31am
The production of computer chips has universally moved offshore in recent years, reducing design complexity and fabrication cost. But these benefits come at the expense of security: An attack anywhere along the supply chain can insert malicious components into an integrated circuit, pirate its design or counterfeit it. These attacks, which are exceedingly difficult to detect, jeopardize the computer industry, undermine national security, and put critical infrastructure in danger.
group_project
Submitted by Jeyavijayan Rajen... on Mon, 03/18/2019 - 9:28am
The trend of outsourcing semiconductor manufacturing to oversea foundries has introduced several security vulnerabilities -- reverse engineering, malicious circuit insertion, counterfeiting, and intellectual property piracy -- making the semiconductor industry lose billions of dollars. Split manufacturing of integrated circuits reduces vulnerabilities introduced by an untrusted foundry by manufacturing only some of the layers at an untrusted high-end foundry and the remaining layers at a trusted low-end foundry.
group_project
Submitted by prabal on Fri, 03/15/2019 - 11:17am
Computation is everywhere. Greeting cards have processors that play songs. Fireworks have processors for precisely timing their detonation. Computers are in engines, monitoring combustion and performance. They are in our homes, hospitals, offices, ovens, planes, trains, and automobiles. These computers, when networked, will form the Internet of Things (IoT). The resulting applications and services have the potential to be even more transformative than the World Wide Web. The security implications are enormous. Internet threats today steal credit cards.
group_project
Submitted by Yingying Chen on Thu, 03/14/2019 - 11:12am
The rapid development of information technology not only leads to great convenience in our daily lives, but also raises significant concerns in the field of security and privacy. Particularly, the authentication process, which serves as the first line of information security by verifying the identity of a person or device, has become increasingly critical. An unauthorized access could result in detrimental impact on both corporation and individual in both secrecy loss and privacy leakage.