Division of Computer and Network Systems (CNS)

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Leveraging community oversight to enhance collective efficacy for privacy and security

This research concerns how groups of people can cooperate to protect their privacy. The researchers will study how people can help one another to manage their digital privacy and security. Offline, people support each other informally to make privacy and security decisions, by sharing stories or exchanging advice, but technology designs for privacy do not reflect these social processes.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Leveraging community oversight to enhance collective efficacy for privacy and security

This research concerns how groups of people can cooperate to protect their privacy. The researchers will study how people can help one another to manage their digital privacy and security. Offline, people support each other informally to make privacy and security decisions, by sharing stories or exchanging advice, but technology designs for privacy do not reflect these social processes.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: CPS ACTS: Orchestrating CPS with Action blocks

The integration of computation, communication and sensing technologies into our transportation, power grid, healthcare, and manufacturing systems presents unprecedented challenges in ensuring the security and safety of these systems. Cyber attacks on such systems cross from the cyber realm into the physical world, and we must deal with new attack trends that may cause vehicles to veer off the road, manipulate devices responsible for power generation, distribution and consumption, and exploit robotic/drone systems for malicious activities.

group_project

Visible to the public SaTC: CORE: Small: Understanding, Measuring, and Defending against Malicious Web Crawlers

Given the constant expansion of the web, search engines rely on automated web crawlers to automatically discover new web pages and index them. Next to search engines, many different industries rely on web crawlers, ranging from security-related crawlers that find abusive pages, to crawlers that take snapshots of content in order to show previews of pages on social networks. At the same time, attackers are utilizing malicious crawlers to automatically find and exploit vulnerabilities on websites, to scrape content and email addresses, and to brute-force login forms.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Techniques for Enhancing the Security and Trust of FPGAs-Based Systems

Secret keys that are stored and used within physical devices can be extracted by adversaries. The attacks involve measuring the power consumption or electromagnetic radiation emanating from the chip as it carries out encryption, and then analyzing them to deduce the secret key. This project investigates techniques that self-mutate the hardware at runtime as a means of significantly reducing and ideally eliminating signal information leveraged by the adversary.

group_project

Visible to the public SaTC: CORE: Small: Detecting Social Engineering Attacks Using Semantic Language Analysis

A critical threat to information security is social engineering, the psychological manipulation of people in order to gain access to a system for which the attacker is not authorized. Cyberattackers target the weakest link, and people are often more vulnerable than a hardened computer system. Phishing emails, which fraudulently request private information, are a common version of the attack, but social engineering comes in many more complex conversational forms designed to exploit psychological weaknesses of the target.

group_project

Visible to the public SaTC: STARSS: Small: Collaborative: Design and Security Verification of Next-Generation Open-Source Processors

This project will develop new open-source processor architectures with advanced security features. The security features will be added to existing open-source processors to help protect the confidentiality and integrity of data and to protect against side-channel attacks. Beyond the design, the project will also provide new methodology to verify the proposed security feature, to provide assurance that the processor hardware itself is provably secure.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Understanding and Mitigating Adversarial Manipulation of Content Curation Algorithms

Online social networks (OSNs) have fundamentally transformed how billions of people use the Internet. These users are increasingly discovering books, music bands, TV shows, movies, news articles, products, and other content through posts from trusted users that they follow. All major OSNs have deployed content curation algorithms that are designed to increase interaction and act as the "gatekeepers" of what users see.

group_project

Visible to the public SaTC: CORE: Small: Secure Cloud Storage Verification Methods

With the continuously decreasing costs of cloud services, many organizations including government agencies, healthcare providers, financial institutions, universities, and enterprises outsource large data repositories to cloud service providers (CSPs). Doing this relieves organizations from the financial burden of deploying and maintaining in-house data infrastructures. However, storing data with third parties exposes organizations to legal and financial liabilities should the data leak, become unavailable, or be lost.

group_project

Visible to the public SaTC: CORE: Small: Techniques for Software Model Checking of Hyperproperties

Most manufacturers and companies employ a set of security and privacy policies that specify how the data produced by their products can be accessed and propagated. Violation of such policies may result in catastrophic consequences such as breach of public services and safety or compromising highly sensitive data and privacy of citizens. Frequent reports of security exploits and loss of information privacy have unfortunately become everyday occurrences.