Division of Computer and Network Systems (CNS)
group_project
Submitted by Aylin Yener on Wed, 06/13/2018 - 2:05pm
The last decade has witnessed an amazing growth in wireless communications and networking applications. More and more subscribers are relying solely on their wireless communication and computing devices for communicating sensitive information. Preserving the security of wirelessly transmitted information is becoming ever more challenging, yet essential.
group_project
Submitted by Scott Shenker on Wed, 06/13/2018 - 2:03pm
The goal of this project is to design, implement, and test an internetwork architecture called the Accountable Internet Protocol (AIP). AIP retains much of the elegance and simplicity of IP, but is far better equipped to thwart malicious adversaries. To provide this protection, AIP incorporates three kinds of accountability: source accountability, control-plane accountability, and dataplane accountability. Together, these three forms of accountability ensure that any host, router, and autonomous network can identify misbehaving components.
group_project
Submitted by Vernon Rego on Wed, 06/13/2018 - 1:58pm
The secure transmission of information from a source to a destination is typically handled via encryption algorithms. In many instances, data that may or may not undergo encryption prior to transmission can be manipulated to encode messages. With successful encodings, seemingly innocuous channels, e.g., documents, data streams, audio, video, can operate covertly for secret message transmission in various applications, e.g., collusion in finance, electronic information/auction markets, transaction sequences, advertising applets, simulation.
group_project
Submitted by alexliu@cse.msu.edu on Wed, 06/13/2018 - 1:50pm
Policy-based access control is one of the most fundamental and widely used mechanisms for achieving privacy and security at both application and network levels. Given the high importance and delicacy of security policies, ensuring the correctness of these policies is important, and yet difficult. A tiny error in security policies could lead to irreparable, if not tragic, consequences. Therefore, identifying discrepancies between policy specifications and their intended function is a crucial task.
group_project
Submitted by JackW. Davidson on Wed, 06/13/2018 - 1:48pm
Increasingly, society relies on software systems to provide vital services. Consequently, it is critically important that this software be protected from unauthorized modification. For example, a malicious user may modify or tamper with a binary to circumvent protection or license mechanisms or introduce vulnerabilities that can be later exploited.
group_project
Submitted by Paul Barford on Wed, 06/13/2018 - 1:45pm
Malicious activity on the Internet is a significant threat to both individuals and institutions. Over the past few years, network honeypots have emerged as an important tool for measuring and understanding the details of cyber attacks. The objective of the proposed research is to stimulate the development of next generation Internet security systems and forensic tools based on automated, indepth analysis of malicious activity and malicious software (malware) observed in network honeypots.
group_project
Submitted by JohnCKnight on Wed, 06/13/2018 - 1:34pm
Trust in a system can be compromised in many places. Extensive research has been conducted on the development of trustworthy requirements and policies, but those requirements and policies are effective only if they are carried out correctly. Ensuring the absence of implementation flaws by testing is inadequate; testing cannot be exhaustive and thus can miss critical vulnerabilities. Formal verification proof that the system correctly implements its specification and enforces its policies is an attractive alternative.
group_project
Submitted by Daniel Bernstein on Wed, 06/13/2018 - 1:31pm
Anyone with a moderate amount of skill can intercept Internet mail messages and private web pages to see what they say; can modify messages in transit, changing their content without any trace; and can send fake messages that are indistinguishable from legitimate messages. Cryptography responds to these threats by scrambling and unscrambling packets to protect against forgery and against espionage. An attacker who forges a message can't scramble it in the right way; when legitimate users' computers unscramble the message, they see that it's a forgery and that it should be thrown away.
group_project
Submitted by Marianne Winslett on Wed, 06/13/2018 - 1:25pm
Digital societies and markets increasingly mandate consistent procedures for the access, processing and storage of information. In the United States alone, over 10,000 such regulations can be found in financial, life sciences, health-care and government sectors, including the Gramm-Leach-Bliley Act, Health Insurance Portability and Accountability Act, and Sarbanes-Oxley Act.
group_project
Submitted by Somesh Jha on Wed, 06/13/2018 - 1:21pm
Network intrusion prevention systems (IPSes) play an important role in protecting computers against attacks originating from thenetwork. Signature matching is a performance-critical operation that each IPS must perform: after storing a reassembled TCP-level byte stream or a field of a higher level protocol in a buffer, the IPS needs to decide whether it matches any of the signatures that describe known attacks. This project investigates methods for representingsignatures that allow fast matching, require little memory, and can support complex signatures expressed as regular expressions.