Division of Computer and Network Systems (CNS)

group_project

Visible to the public CT-ISG: BIRT - Biometric Identification Red Team

The BIRT methodology will aid biometric system designers in making effective refinements in their systems. The measurement of biological characteristics (biometrics) such as fingerprints and facial images provides a means of identification that neither needs to be carried nor remembered. Evaluation of biometrics has traditionally been focused on the ability of biometric systems to identify members from a population, e.g., for purposes of authentication.

group_project

Visible to the public COLLABORATIVE RESEARCH: CT-ISG - A Context-Aware Approach to the Design and Evaluation of Privacy Preservation Techniques in Location-Based Services

Privacy protection challenges arising from location-based services (LBS) are critical to users as well as service providers. This project concentrates on designing and evaluating privacy protection techniques in LBS. The important departure of this project from the existing research is in its emphasis of the role of request contexts. A context refers to the external information/knowledge that the attacker may use, together with the requests themselves, to gain user private information.

group_project

Visible to the public Collaborative Research: CT-ISG: Efficient Cryptography Based on Lattices

Only two number-theoretic assumptions --- hardness of factoring and of computing discrete logarithms --- underlie essentially all public-key cryptosystems in widespread use today. For lower-level primitives such as hash functions, random number generators, and stream ciphers, the situation is even worse: existing provably-secure constructions are too inefficient to compete with practical alternatives such as SHA-1 or AES, and so the primitives in use today have no rigorous justification for their security.

group_project

Visible to the public CT-T: Keystroke Forensics - Fingerprints in the CyberWorld

This research asks, "What is the cyber-equivalent of a fingerprint -- that staple of forensic investigation in the physical world?" If one is able to identify users forensically by their "fingerprints" in cyberspace, what would correspond to the familiar loops, whorls and minutiae of physical evidence? It is hypothesized that just as a person may be identified by his handwriting, or by his manner of expression in prose, so may a person be identified by his typing style -- the particular rhythm of a user's keystrokes.

group_project

Visible to the public CT-ISG: Collaborative Research: Non-bypassable Kernel Services for Execution Security

Society is dependent on many engineered systems whose increasing complexity and inter-connectedness have, in turn, increased their vulnerability to adversarial attacks. In many of these systems, protecting the execution of their computations is as crucial as ensuring the security of their data. This research investigates how to maintain survivable operation of such systems, even in the face o finvasive attacks where computations are intentionally subverted to interfere with other computations' execution constraints.

group_project

Visible to the public CT-ISG: Collaborative Research: A Framework for the Modeling and Management of Obligations in Security Policies

The correct behavior and reliable operation of an information system relies not only on what users are permitted to do, but often times on what users are required to do. Such obligatory actions are integral to the security procedures of many enterprises. The management of obligations in security policies imposes significant technical challenges since obligations bear quite different properties from traditional access control. For example, obligations assigned to users often cannot be enforced.

group_project

Visible to the public CT-ER: A Framework for Live Security Exercises and Challenges

Computer security is a critical issue that affects our everyday life. For this reason, most colleges and other educational institutions are devoting an increasing amount of resources to develop courses and curricula that involve security training. Typical courses include cryptography, general computer security, network security, and specialized topics, such as security of wireless networks and web security.

group_project

Visible to the public CT-ISG: Improving System Security with a Compiler-based Virtual Machine for Operating System Kernels

The Secure Virtual Architecture (SVA, formerly called LLVA forlow-level virtual architecture) project is developing a novel framework to improve operating system security and reliability. The two broad goals of the project are (a) to develop a compiler-enforced virtual machine that is safe, low-level, efficient, and capable of hosting a standard C/C++-based operating system and all its applications; and (b) to investigate how this organization can improve overall system security and provide new security capabilities.

group_project

Visible to the public  DIMACS Special Focus on Algorithmic Foundations of the Internet

The Internet has become a part of our everyday lives. We use it to conduct much of our business, government, and social interactions. However, the scale and heterogeneity of the Internet have far surpassed anyone's expectations, and the Internet is responding by showing signs of strain. Security was not a major goal of the original design of Internet protocols, and it is now far too easy for malicious agents to engage in disruptive activities. The need to manage the network was not in mind from the beginning, making it difficult for network administrators.

group_project

Visible to the public CAREER: Foundational Theories and Enforcement Tools for Secure Software Systems

This project addresses the problem that, to be trustworthy yet practical, mechanisms for enforcing software security must (1) undergo rigorous analysis that provides formal security guarantees and (2) be developed quickly. The project addresses this problem by creating (1) formal, foundational theories of software security and (2) convenient tools for quickly generating provably sound enforcement mechanisms.