Division of Computer and Network Systems (CNS)
group_project
Submitted by Yevgeniy Dodis on Tue, 05/01/2018 - 3:18pm
Randomization has proved to be a vital part in building essentially any kind of secure cryptographic system: secret keys should be randomly generated and most cryptographic primitives, such as encryption, must be probabilistic. As a common abstraction, it is typically assumed that ideal randomness is available to all the participants of the system. In many situations, this assumption is highly unrealistic, and cryptographic systems have to be built based on *imperfect* sources of randomness.
group_project
Submitted by Wenke Lee on Tue, 05/01/2018 - 3:09pm
Layer-8 attacks (e.g., spam and phishing) are launched from a malicious service platform, e.g., botnet, which consists of a large number of infected machines (or bots). Such an attack platform relies on lower-layer network services to achieve efficiency, robustness, and stealth in communication and attack activities. These services include look-up (e.g., DNS), hosting (e.g., Web servers), and transport (e.g., BGP).
The main research goals and approaches of the CLEANSE project are:
group_project
Submitted by Kaijie Wu on Tue, 05/01/2018 - 3:04pm
Secure applications require trustworthy hardware for successful deployment. A trustworthy hardware device (e.g., a smart card) should maintain its security properties even against efforts at probing and reverse engineering; moreover, sensitive data stored on a trustworthy hardware device should be protected at all times. Side-channels attacks are used to learn the secrets stored by a device through monitoring the side effects of its computation. The well known power side-channel attack uses the effect that a cryptographic key has on the power waveform as the cipher runs.
group_project
Submitted by Aggelos Kiayias on Tue, 05/01/2018 - 2:55pm
This project focuses on the development of a new class of secret key generation and renewal algorithms for securing wireless networks by taking advantage of physical layer characteristics. The basis of the approach is the identification of measurable quantities of the wireless channel between a pair of nodes that are highly correlated exclusively between them (albeit not identical).
group_project
Submitted by Aggelos Kiayias on Tue, 05/01/2018 - 2:45pm
This research project focuses on the development of cryptographic mathematical models and constructions that address realistic security requirements at the implementation level. This is a fundamental problem as cryptographic security formalisms are often criticized for lack of relevance given the wide range of attacks available at the implementation level.
group_project
Submitted by YanLindsaySun on Tue, 05/01/2018 - 2:40pm
Cooperative transmission is an emerging wireless communication paradigm that improves wireless channel capacity by creating multi-user cooperation in the physical layer. In cooperative transmission, when the source node transmits a message to the destination node, the nearby nodes that overheard this transmission will "help" the source and destination by relaying the replicas of the message, and the destination will combine the multiple received waveforms so as to improve the link quality.
group_project
Submitted by Kishor.Trivedi on Tue, 05/01/2018 - 2:22pm
Information and Communications Technology (ICT) infrastructure failures and cyber attacks are realities that can have catastrophic societal effects. Information Assurance (IA) can be defined as the operations undertaken to protect and defend ICT systems by ensuring their dependability and security. There is a critical need for systematic IA methods that enable ICT systems to adapt and survive any type of disruption or attack. A major hurdle in the development of IA techniques is the lack of models and metrics which enable one to determine the effectiveness of IA mechanisms.
group_project
Submitted by Ramesh Karri on Tue, 05/01/2018 - 2:19pm
Secure applications require trustworthy hardware for successful deployment. A trustworthy hardware device (e.g., a smart card) should maintain its security properties even against efforts at probing and reverse engineering; moreover, sensitive data stored on a trustworthy hardware device should be protected at all times. Side-channels attacks are used to learn the secrets stored by a device through monitoring the side effects of its computation. The well known power side-channel attack uses the effect that a cryptographic key has on the power waveform as the cipher runs.
group_project
Submitted by Sonia Fahmy on Tue, 05/01/2018 - 2:12pm
It is critical to protect the Internet from attacks such as denial of service, and attacks on inter-domain routing. Although several defenses have been proposed, actual deployments have been limited. A primary reason for this lack of deployment is that most defenses have not been validated under realistic conditions, or at sufficiently large scales. Many attacks also have second-order effects that are not well understood. This is because it is difficult to incorporate all the protocols involved at any reasonable scale in analytical, simulation, or emulation models or testbeds.
group_project
Submitted by Gail-Joon Ahn on Tue, 05/01/2018 - 2:04pm
Considering the popularity and wide adoption of social network systems and the competitive edge these systems provide, there has been a rapid growth in use of these systems to access, store, and exchange personal attribute information in distributed and/or federated environments and this trend is expected to continue. Efficient, secure, and user-centric techniques are important for the successful deployment of such systems.