Division of Computer and Network Systems (CNS)
group_project
Submitted by Adele Howe on Tue, 08/27/2019 - 12:57pm
This interdisciplinary project studies the nature of the risks inherent in normal activity on the Internet, the perception of those risks, the judgment about trade-offs in behavior and the design of a personalized agent that can alert users to risky behavior and help to protect them. The key insight is that adequate security and privacy protection requires the concerted efforts of both the computer and the user.
group_project
Submitted by Sandra Carpenter on Tue, 08/27/2019 - 12:04pm
Approximately six million Americans are targets of identity theft each year. Many of the attacks on identity privacy use psychological influence strategies ("psychological attacks?) to induce individuals to provide their private information. Although people are appropriately concerned about their privacy, they often unnecessarily disclose information that could be used to their disadvantage. Our studies have shown that people?s privacy exposure behaviors may be severely affected by psychological attacks.
group_project
Submitted by Justin Cappos on Tue, 08/27/2019 - 12:01pm
This project will support the following development of the Seattle platform for running distributed experiments: 1) building a new virtual machine that executes native code using the Google Native Client (NaCl) sandbox and 2) providing sufficient support to ensure the testbed continues to be useable by the community.
Adding native code execution will make it easier for researchers to run legacy code on the Seattle testbed.
group_project
Submitted by Sanjam Garg on Tue, 08/27/2019 - 10:47am
Developments in public-key encryption (PKE) and identity-based encryption (IBE) have revolutionized the field of cryptography and secure communication in general. PKE allowed remote parties to establish secure channels in front of eavesdropping adversaries, and led to public-key directories storing parties' public-keys. The stronger primitive of IBE eliminated the need for a large public-key directory, though this comes at the cost of trusting a central private-key generation authority.
group_project
Submitted by Mohammad Mahmoody on Tue, 08/27/2019 - 10:16am
Developments in public-key encryption (PKE) and identity-based encryption (IBE) have revolutionized the field of cryptography and secure communication in general. PKE allowed remote parties to establish secure channels in front of eavesdropping adversaries, and led to public-key directories storing parties' public-keys. The stronger primitive of IBE eliminated the need for a large public-key directory, though this comes at the cost of trusting a central private-key generation authority.
group_project
Submitted by sxm40@psu.edu on Tue, 08/27/2019 - 10:04am
Leveraging knowledge resources is one of the hallmarks of successful teams. Team members with diverse expertise and an awareness of "who knows what" perform better than teams with less diverse perspectives. Since 2013, the National Science Foundation's SaTC program has piloted groups of "high risk-high reward" EAGER projects to encourage early collaborations between computer and information scientists and behavioral, social, and economic scientists towards improving innovation and effectiveness in SaTC research.
group_project
Submitted by Laura Osburn on Tue, 08/27/2019 - 9:53am
Government organizations, businesses, and universities are increasingly adding Internet of Things (IoT) devices, such as room occupancy sensors, into their buildings. As these sensors are connected to the internet and networked to building technology (such as heating and lights), an attacker could shut down a building or steal sensitive information.
group_project
Submitted by Daniel Kifer on Mon, 08/26/2019 - 3:44pm
Differential Privacy is an important advance in the modern toolkit for protecting privacy and confidentiality. It allows organizations such as government agencies and private companies to collect data and publish statistics about it without leaking personal information about people -- no matter how sophisticated an attacker is. The project's novelties are in the careful design of new differentially private tools that provide more accurate population statistics while maintaining strong privacy guarantees.
group_project
Submitted by ninghui on Mon, 08/26/2019 - 3:32pm
Differential privacy (DP) has been accepted as the de facto standard for data privacy in the research community and beyond. Both companies and government agencies are trying to deploy DP technologies. Broader deployments of DP technology, however, face challenges. This project aims to understand the needs of different stakeholders in data privacy, and to develop algorithms and software to enable broader deployment of private data sharing.
group_project
Submitted by aiping on Mon, 08/26/2019 - 3:29pm
Differential privacy (DP) has been accepted as the de facto standard for data privacy in the research community and beyond. Both companies and government agencies are trying to deploy DP technologies. Broader deployments of DP technology, however, face challenges. This project aims to understand the needs of different stakeholders in data privacy, and to develop algorithms and software to enable broader deployment of private data sharing.