Division of Computer and Network Systems (CNS)

group_project

Visible to the public HCC: Medium: Intelligent Agents for Protecting Users in Cyberspace

This interdisciplinary project studies the nature of the risks inherent in normal activity on the Internet, the perception of those risks, the judgment about trade-offs in behavior and the design of a personalized agent that can alert users to risky behavior and help to protect them. The key insight is that adequate security and privacy protection requires the concerted efforts of both the computer and the user.

group_project

Visible to the public SBES: Small: Developing Countermeasures to Mitigate Psychology Cyber-Attacks on Personal Identity Information

Approximately six million Americans are targets of identity theft each year. Many of the attacks on identity privacy use psychological influence strategies ("psychological attacks?) to induce individuals to provide their private information. Although people are appropriately concerned about their privacy, they often unnecessarily disclose information that could be used to their disadvantage. Our studies have shown that people?s privacy exposure behaviors may be severely affected by psychological attacks.

group_project

Visible to the public CI-ADDO-EN: Enhancing and Supporting a Community Testbed

This project will support the following development of the Seattle platform for running distributed experiments: 1) building a new virtual machine that executes native code using the Google Native Client (NaCl) sandbox and 2) providing sufficient support to ensure the testbed continues to be useable by the community.

Adding native code execution will make it easier for researchers to run legacy code on the Seattle testbed.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: New Directions in Public-Key and Identity-Based Encryption

Developments in public-key encryption (PKE) and identity-based encryption (IBE) have revolutionized the field of cryptography and secure communication in general. PKE allowed remote parties to establish secure channels in front of eavesdropping adversaries, and led to public-key directories storing parties' public-keys. The stronger primitive of IBE eliminated the need for a large public-key directory, though this comes at the cost of trusting a central private-key generation authority.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: New Directions in Public-Key and Identity-Based Encryption

Developments in public-key encryption (PKE) and identity-based encryption (IBE) have revolutionized the field of cryptography and secure communication in general. PKE allowed remote parties to establish secure channels in front of eavesdropping adversaries, and led to public-key directories storing parties' public-keys. The stronger primitive of IBE eliminated the need for a large public-key directory, though this comes at the cost of trusting a central private-key generation authority.

group_project

Visible to the public EAGER: SaTC: Early-Stage Interdisciplinary Collaboration: Knowledge Convergence and Divergence in Team Performance

Leveraging knowledge resources is one of the hallmarks of successful teams. Team members with diverse expertise and an awareness of "who knows what" perform better than teams with less diverse perspectives. Since 2013, the National Science Foundation's SaTC program has piloted groups of "high risk-high reward" EAGER projects to encourage early collaborations between computer and information scientists and behavioral, social, and economic scientists towards improving innovation and effectiveness in SaTC research.

group_project

Visible to the public SaTC: CORE: Medium: Knowledge Work and Coordination to Improve O&M and IT Collaboration to Keep Our Buildings Smart AND Secure

Government organizations, businesses, and universities are increasingly adding Internet of Things (IoT) devices, such as room occupancy sensors, into their buildings. As these sensors are connected to the internet and networked to building technology (such as heating and lights), an attacker could shut down a building or steal sensitive information.

group_project

Visible to the public SaTC: CORE: Small: New Techniques for Optimizing Accuracy in Differential Privacy Applications

Differential Privacy is an important advance in the modern toolkit for protecting privacy and confidentiality. It allows organizations such as government agencies and private companies to collect data and publish statistics about it without leaking personal information about people -- no matter how sophisticated an attacker is. The project's novelties are in the careful design of new differentially private tools that provide more accurate population statistics while maintaining strong privacy guarantees.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: User-Centered Deployment of Differential Privacy

Differential privacy (DP) has been accepted as the de facto standard for data privacy in the research community and beyond. Both companies and government agencies are trying to deploy DP technologies. Broader deployments of DP technology, however, face challenges. This project aims to understand the needs of different stakeholders in data privacy, and to develop algorithms and software to enable broader deployment of private data sharing.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: User-Centered Deployment of Differential Privacy

Differential privacy (DP) has been accepted as the de facto standard for data privacy in the research community and beyond. Both companies and government agencies are trying to deploy DP technologies. Broader deployments of DP technology, however, face challenges. This project aims to understand the needs of different stakeholders in data privacy, and to develop algorithms and software to enable broader deployment of private data sharing.