Division of Computer and Network Systems (CNS)

group_project

Visible to the public SaTC: CORE: Small: The Blurring of Non-essential Notifications and Critical Security Warnings: Examining the Problem of Generalization in the Brain

This project measures how decreased attention to frequent software notifications negatively influences peoples' responses to uncommon security warnings that are truly critical. The researchers will use eye tracking equipment to examine this problem by measuring attention to notifications and warnings through eye gaze patterns, and individuals' decisions in response to these messages.

group_project

Visible to the public SaTC: STARSS: Small: Assuring Security and Privacy of Emerging Non-Volatile Memories

Conventional volatile memories such as static random-access memory (static RAM) suffer from significant leakage power whereas conventional storage class non-volatile memories (NVM) such as flash memory suffer from higher write energy, poor performance and low endurance. Emerging NVMs such as, spin-transfer torque RAM (STTRAM) and resistive RAM (ReRAM) offer zero leakage, high-density, scalability and high endurance. Due to these promising aspects, emerging NVMs are already being commercialized by several companies.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Enabling Precise and Automated Insecurity Analysis of Middleware on Mobile Platforms

During the past decade, middleware on mobile platforms (such as the Application Framework in Android and the Core Services layer in iOS) has been flourishing, but the insecurity analysis of such middleware has been lagging behind. For example, while comprehensive studies have been conducted at the application layer of the Android system, there is very limited work analyzing the Android Application Framework (Android Framework, for short), a middleware layer in the Android system.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Defending Against Authorship Attribution Attacks

Authorship attribution techniques identify the author of an unsigned document such as an e-mail, memo, or social media post by analyzing candidate authors' writing styles for tell-tale "fingerprints" such as distinctive words and sentence structure. Everyone leaves these fingerprints in his or her writing. This creates a problem for people who have a need to remain anonymous, people including whistleblowers and journalists working in states hostile to their work.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Security Assurance in Short Range Communication with Wireless Channel Obfuscation

As the prevalence of mobile computing technologies and applications, short-range communication over emerging aerial acoustic and visible light channel is undergoing a fast rate of expansion with many promising benefits including low power and peer-to-peer communication, without incurring complex network infrastructure.

group_project

Visible to the public SaTC: CORE: Small: FIRMA: Personalized Cross-Layer Continuous Authentication

An important problem in computer security is verifying that people using computing devices are authorized to use them, not just when they first sign on to the device but during the whole time they are using them. Most existing continuous authentication schemes impose burdens on users, for instance, when systems quickly log users out and require frequent re-entry of passwords. This project will build and evaluate FIRMA, a user-transparent, continuous authentication software framework that collects usage data, targeted at corporate security contexts where such monitoring can be done.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Algorithms Everywhere: Identifying and Designing for Data Privacy Styles

The computational algorithms that analyze our personal data online and in myriad medical, credit card, and other databases can make it increasingly easy to infer personal, intimate details about us (such as our personality, political ideology, or sexual preference) from seemingly mundane data (such as which pages someone has "Liked" on Facebook). People may not notice or know about these risks, and if they do, they must make ongoing decisions about which algorithms they may be providing with their personal information, which to ignore, and which to decry as invasive or unethical.

group_project

Visible to the public SaTC: CORE: Small: Understanding Socio-Technical Failure Modes in Public Key Infrastructures

To avoid phishing and to know which website to trust people are told to "look for the lock" and "read the url." However, the display of a lock or other signals of safety does not guarantee that the site is trustworthy, safe from malware, or not a phishing attack. This research includes consultation with industry technical professionals and policy makers in all sectors of the economy to better understand the gaps between ideal safety and practice.

group_project

Visible to the public SaTC: STARSS: Small: Analog Hardware Trojans: Threats, Detection, and Mitigation

Vulnerability of electronic systems and particularly computing systems to malicious attacks through the insertion of software viruses or hardware Trojans is of growing concern to society. This work is focused on understanding, detecting, and mitigating a potentially devastating type of hardware Trojans that an adversary or hardware hacker can insert in the analog component of many of the integrated circuits that will be fabricated in the future.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Tangible Privacy: User-Centric Sensor Designs for Assured Privacy

High-fidelity, and often privacy-invasive, sensors are now becoming pervasive in our everyday environments. At home, digital assistants can constantly listen for instructions and security cameras can be on the lookout for unusual activity. Whereas once an individual's physical actions, in their own home, were private, now networked cameras and microphones can give rise to electronic privacy concerns for one's physical behaviors. Casual conversations and encounters, once thought to be private and ephemeral, now may be captured and disseminated or archived digitally.