Division of Computer and Network Systems (CNS)
group_project
Submitted by Apu Kapadia on Thu, 03/07/2019 - 2:22pm
With the rise of digital photography and social networking, people are capturing and sharing photos on social media at an unprecedented rate. Such sharing may lead to privacy concerns for the people captured in such photos, e.g., in the context of embarrassing photos that go "viral" and are shared widely. At worst, online photo sharing can result in cyber-bullying that can greatly affect the subjects of such photos.
group_project
Submitted by Pamela Wisniewski on Thu, 03/07/2019 - 2:20pm
This research concerns how groups of people can cooperate to protect their privacy. The researchers will study how people can help one another to manage their digital privacy and security. Offline, people support each other informally to make privacy and security decisions, by sharing stories or exchanging advice, but technology designs for privacy do not reflect these social processes.
group_project
Submitted by Allen Riddell on Thu, 03/07/2019 - 2:18pm
Authorship attribution techniques identify the author of an unsigned document such as an e-mail, memo, or social media post by analyzing candidate authors' writing styles for tell-tale "fingerprints" such as distinctive words and sentence structure. Everyone leaves these fingerprints in their writing. This creates a problem for people who have a need to remain anonymous, people including whistleblowers and journalists working in states hostile to their work.
group_project
Submitted by Fareena Saqib on Thu, 03/07/2019 - 2:05pm
Secret keys that are stored and used within physical devices can be extracted by adversaries. The attacks involve measuring the power consumption or electromagnetic radiation emanating from the chip as it carries out encryption, and then analyzing them to deduce the secret key. This project investigates techniques that self-mutate the hardware at runtime as a means of significantly reducing and ideally eliminating signal information leveraged by the adversary.
group_project
Submitted by Berk Sunar on Thu, 03/07/2019 - 2:01pm
The project takes the rapidly evolving advances in deep learning and applies them in the context of side-channel analysis (SCA). Finding SCA leakages on real devices can be a tedious process, resulting devices ranging from wearables to embedded Internet of Things (IoT) devices entering the marketplace without proper protection. This project explores ways to automate side-channel security analysis using deep learning techniques. To protect devices against SCA, the project also explores a novel approach to countermeasure design by applying the concept of adversarial learning.
group_project
Submitted by Craig Shue on Thu, 03/07/2019 - 1:58pm
opular Internet servers and web sites may serve thousands of users simultaneously. To handle this volume of activity, these servers share resources, such as processors, memory, and hard disk space. These shared resources provide an avenue for an attacker to affect other users connected to the server if the attacker successfully exploits a vulnerability in the server. This research project aims to eliminate this risk by creating an individual, customized server instance for each user that runs within an isolated single-use container.
group_project
Submitted by Yuanyuan Zhou on Thu, 03/07/2019 - 1:49pm
As data center systems become ever so complex, it has been ever so daunting for system administrators to configure various permission correctly without accidentally opening up permissions for unintended users (and also malicious users) and resulting in catastrophic security disasters.
group_project
Submitted by Timothy Wood on Thu, 03/07/2019 - 1:39pm
Popular Internet servers and web sites may serve thousands of users simultaneously. To handle this volume of activity, these servers share resources, such as processors, memory, and hard disk space. These shared resources provide an avenue for an attacker to affect other users connected to the server if the attacker successfully exploits a vulnerability in the server. This research project aims to eliminate this risk by creating an individual, customized server instance for each user that runs within an isolated single-use container.
group_project
Submitted by Jintai Ding on Thu, 03/07/2019 - 1:37pm
Public-key cryptosystems, a revolutionary breakthrough in cryptography, are indispensable for our modern communication network. The Internet, as well as other communication systems, rely principally on public-key cryptosystems that depend for security on the difficulty of certain number-theoretic problems such as integer factorization or the "discrete log problem." However, it is now known that a quantum computer could efficiently solve these problems, thus rendering all public-key cryptosystems based on such assumptions impotent if a large-scale quantum computer can be built.
group_project
Submitted by Ruby Lee on Wed, 03/06/2019 - 5:14pm
This project will develop new open-source processor architectures with advanced security features. The security features will be added to existing open-source processors to help protect the confidentiality and integrity of data and to protect against side-channel attacks. Beyond the design, the project will also provide new methodology to verify the proposed security feature, to provide assurance that the processor hardware itself is provably secure.