Division of Computer and Network Systems (CNS)
group_project
Submitted by Anthony Vance on Thu, 03/07/2019 - 3:05pm
This project measures how decreased attention to frequent software notifications negatively influences peoples' responses to uncommon security warnings that are truly critical. The researchers will use eye tracking equipment to examine this problem by measuring attention to notifications and warnings through eye gaze patterns, and individuals' decisions in response to these messages.
group_project
Submitted by Swaroop Ghosh on Thu, 03/07/2019 - 2:55pm
Conventional volatile memories such as static random-access memory (static RAM) suffer from significant leakage power whereas conventional storage class non-volatile memories (NVM) such as flash memory suffer from higher write energy, poor performance and low endurance. Emerging NVMs such as, spin-transfer torque RAM (STTRAM) and resistive RAM (ReRAM) offer zero leakage, high-density, scalability and high endurance. Due to these promising aspects, emerging NVMs are already being commercialized by several companies.
group_project
Submitted by Peng Liu on Thu, 03/07/2019 - 2:52pm
During the past decade, middleware on mobile platforms (such as the Application Framework in Android and the Core Services layer in iOS) has been flourishing, but the insecurity analysis of such middleware has been lagging behind. For example, while comprehensive studies have been conducted at the application layer of the Android system, there is very limited work analyzing the Android Application Framework (Android Framework, for short), a middleware layer in the Android system.
group_project
Submitted by Patrick Juola on Thu, 03/07/2019 - 2:51pm
Authorship attribution techniques identify the author of an unsigned document such as an e-mail, memo, or social media post by analyzing candidate authors' writing styles for tell-tale "fingerprints" such as distinctive words and sentence structure. Everyone leaves these fingerprints in his or her writing. This creates a problem for people who have a need to remain anonymous, people including whistleblowers and journalists working in states hostile to their work.
group_project
Submitted by Yingying Chen on Thu, 03/07/2019 - 2:44pm
As the prevalence of mobile computing technologies and applications, short-range communication over emerging aerial acoustic and visible light channel is undergoing a fast rate of expansion with many promising benefits including low power and peer-to-peer communication, without incurring complex network infrastructure.
group_project
Submitted by Daniela Oliveira on Thu, 03/07/2019 - 2:38pm
An important problem in computer security is verifying that people using computing devices are authorized to use them, not just when they first sign on to the device but during the whole time they are using them. Most existing continuous authentication schemes impose burdens on users, for instance, when systems quickly log users out and require frequent re-entry of passwords. This project will build and evaluate FIRMA, a user-transparent, continuous authentication software framework that collects usage data, targeted at corporate security contexts where such monitoring can be done.
group_project
Submitted by Eric Baumer on Thu, 03/07/2019 - 2:34pm
The computational algorithms that analyze our personal data online and in myriad medical, credit card, and other databases can make it increasingly easy to infer personal, intimate details about us (such as our personality, political ideology, or sexual preference) from seemingly mundane data (such as which pages someone has "Liked" on Facebook). People may not notice or know about these risks, and if they do, they must make ongoing decisions about which algorithms they may be providing with their personal information, which to ignore, and which to decry as invasive or unethical.
group_project
Submitted by Jean Camp on Thu, 03/07/2019 - 2:32pm
To avoid phishing and to know which website to trust people are told to "look for the lock" and "read the url." However, the display of a lock or other signals of safety does not guarantee that the site is trustworthy, safe from malware, or not a phishing attack. This research includes consultation with industry technical professionals and policy makers in all sectors of the economy to better understand the gaps between ideal safety and practice.
group_project
Submitted by Randall Geiger on Thu, 03/07/2019 - 2:29pm
Vulnerability of electronic systems and particularly computing systems to malicious attacks through the insertion of software viruses or hardware Trojans is of growing concern to society. This work is focused on understanding, detecting, and mitigating a potentially devastating type of hardware Trojans that an adversary or hardware hacker can insert in the analog component of many of the integrated circuits that will be fabricated in the future.
group_project
Submitted by Apu Kapadia on Thu, 03/07/2019 - 2:25pm
High-fidelity, and often privacy-invasive, sensors are now becoming pervasive in our everyday environments. At home, digital assistants can constantly listen for instructions and security cameras can be on the lookout for unusual activity. Whereas once an individual's physical actions, in their own home, were private, now networked cameras and microphones can give rise to electronic privacy concerns for one's physical behaviors. Casual conversations and encounters, once thought to be private and ephemeral, now may be captured and disseminated or archived digitally.