Division of Computer and Network Systems (CNS)

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Automated Support for Writing High-Assurance Smart Contracts

Smart contracts, popularized by cryptocurrencies like Bitcoin and Ethereum, are programs that run atop financial infrastructure and command the flow of money according to user-defined algorithms. Such contracts can implement new, decentralized financial instruments or even virtual corporations defined only by the bundle of smart contracts programmatically governing their behavior.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Contextual Integrity: From Theory to Practice

Current user-facing computer systems apply a "notice and consent" approach to managing user privacy: the user is presented with a privacy notice and then must consent to its terms. Decades of prior research show that this approach is unmanageable: policies are vague, ambiguous, and often include legal terms that make them very difficult to understand, if they are even read at all.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Contextual Integrity: From Theory to Practice

Current user-facing computer systems apply a "notice and consent" approach to managing user privacy: the user is presented with a privacy notice and then must consent to its terms. Decades of prior research show that this approach is unmanageable: policies are vague, ambiguous, and often include legal terms that make them very difficult to understand, if they are even read at all.

group_project

Visible to the public TWC: Small: STRUCT: Enabling Secure and Trustworthy Compartments in Mobile Applications

Society's dependence on mobile technologies rapidly increases as we entrust mobile applications with more and more private information and capabilities. Existing security research follows a common threat model that treats apps as monolithic entities and only captures attack surface between apps. However, recent research reveals that app internal attacks are emerging quickly as complex entities with conflicting interests are commonly included inside a single app to allow for rich features and fast development.

group_project

Visible to the public CIF:Small:Collaborative Research:Security in Dynamic Environments: Harvesting Network Randomness and Diversity

The project aims at quantifying a general network's inner potential for supporting various forms of security by achieving secret common randomness between pairs or groups of its nodes. Statistical and computational secrecy measures are being considered against a general passive adversary. Common-randomness-achieving protocols are classified into two groups: culture-building and crowd-shielding. The former achieves common randomness between nodes situated in close proximity of each other, from correlated observations of specific (natural or induced) network phenomena.

group_project

Visible to the public SHF: Medium: PRISM: Platform for Rapid Investigation of efficient Scientific-computing & Machine-learning

Today's systems demand acceleration in processing and learning using massive datasets. Unfortunately, because of poor energy scaling and power limits, performance and power improvements due to technology scaling and instruction level parallelism in general-purpose processors have ended. It is well known that full custom, application-specific hardware accelerators can provide orders-of-magnitude improvements in energy/op for a variety of application domains.

group_project

Visible to the public CT-T: Modeling and Analyzing Trust in Service-Oriented Architectures

Service-oriented architectures (SOAs) enable the dynamic integration of services implemented on heterogeneous computer systems. An advantage of SOAs is that they provide high-level, semantically-rich services by abstracting the low-level details of their implementation. The availability of useful services such as Google's and Amazon's web service APIs has fostered applications that integrate a number of services to provide novel, more complex functionality.

group_project

Visible to the public CT-ISG: Collaborative Research: A Framework for the Modeling and Management of Obligations in Security Policies

The correct behavior and reliable operation of an information system relies not only on what users are permitted to do, but oftentimes on what users are required to do. Such obligatory actions are integral to the security procedures of many enterprises. The management o fobligations in security policies imposes significant technical challenges since obligations bear quite different properties from traditional access control. For example, obligations assigned to users often cannot be enforced.

group_project

Visible to the public Collaborative Research: CT-ISG: Error-resistant, Accountable, RFID-assisted Wireless Sensor Networks for Elder Cardiac Tele-Healthcare

Tele-healthcare could largely reduce national healthcare cost through remote self-managed patient monitoring. Cardiac Sensor Networks (CSNs) could be used to deploy such a system. Moreover, the integration of RFID into CSN could play an important role for elder healthcare because RFID could be used to monitor elders' medicine taking behaviors. On the other hand, the disclosure of RFID information during RFID tag-to-reader communications can cause the violation of patients' privacy. This research aims to achieve trustworthiness in a practical RFID-assisted CSN platform.

group_project

Visible to the public CT-ISG: Compiler-Enabled Adaptive Security Monitoring on Networked Embedded Systems

Hardware technologies have made steady progress in miniaturization of sensors and computing/communication devices, which has driven a trend towards pervasive computing, which is a way to let computing devices directly interact with the physical world to monitor the natural environment, to provide building safety, and so on.