Division of Computer and Network Systems (CNS)

group_project

Visible to the public CT-ISG: On Imperfect Randomness and Exposure-Resilient Cryptography

Randomization has proved to be a vital part in building essentially any kind of secure cryptographic system: secret keys should be randomly generated and most cryptographic primitives, such as encryption, must be probabilistic. As a common abstraction, it is typically assumed that ideal randomness is available to all the participants of the system. In many situations, this assumption is highly unrealistic, and cryptographic systems have to be built based on *imperfect* sources of randomness.

group_project

Visible to the public Collaborative Research: CT-L: CLEANSE: Cross-Layer Large-Scale Efficient Analysis of Network Activities to Secure the Internet

Layer-8 attacks (e.g., spam and phishing) are launched from a malicious service platform, e.g., botnet, which consists of a large number of infected machines (or bots). Such an attack platform relies on lower-layer network services to achieve efficiency, robustness, and stealth in communication and attack activities. These services include look-up (e.g., DNS), hosting (e.g., Web servers), and transport (e.g., BGP).

The main research goals and approaches of the CLEANSE project are:

group_project

Visible to the public CT-ISG: Collaborative Research: Fault Tolerance in Crypto Hardware via Dynamic Assertion Checking

Secure applications require trustworthy hardware for successful deployment. A trustworthy hardware device (e.g., a smart card) should maintain its security properties even against efforts at probing and reverse engineering; moreover, sensitive data stored on a trustworthy hardware device should be protected at all times. Side-channels attacks are used to learn the secrets stored by a device through monitoring the side effects of its computation. The well known power side-channel attack uses the effect that a cryptographic key has on the power waveform as the cipher runs.

group_project

Visible to the public CT-ISG: Collaborative Research: Key Generation from Physical Layer Characteristics in Wireless Networks

This project focuses on the development of a new class of secret key generation and renewal algorithms for securing wireless networks by taking advantage of physical layer characteristics. The basis of the approach is the identification of measurable quantities of the wireless channel between a pair of nodes that are highly correlated exclusively between them (albeit not identical).

group_project

Visible to the public CT-ISG: Collaborative Research: Tamper Proofing Cryptographic Operations

This research project focuses on the development of cryptographic mathematical models and constructions that address realistic security requirements at the implementation level. This is a fundamental problem as cryptographic security formalisms are often criticized for lack of relevance given the wide range of attacks available at the implementation level.

group_project

Visible to the public CT-ISG Collaborative Research: Trusted Cooperative Transmission: Turning a Security Weakness into a Security Enhancement

Cooperative transmission is an emerging wireless communication paradigm that improves wireless channel capacity by creating multi-user cooperation in the physical layer. In cooperative transmission, when the source node transmits a message to the destination node, the nearby nodes that overheard this transmission will "help" the source and destination by relaying the replicas of the message, and the destination will combine the multiple received waveforms so as to improve the link quality.

group_project

Visible to the public Collaborative Research: CT-ER MiMANSaS: Metrics, Models and Analysis of Network Security and Survivability

Information and Communications Technology (ICT) infrastructure failures and cyber attacks are realities that can have catastrophic societal effects. Information Assurance (IA) can be defined as the operations undertaken to protect and defend ICT systems by ensuring their dependability and security. There is a critical need for systematic IA methods that enable ICT systems to adapt and survive any type of disruption or attack. A major hurdle in the development of IA techniques is the lack of models and metrics which enable one to determine the effectiveness of IA mechanisms.

group_project

Visible to the public CT-ISG: Collaborative Research: Fault Tolerance in Crypto Hardware via Dynamic Assertion Checking

Secure applications require trustworthy hardware for successful deployment. A trustworthy hardware device (e.g., a smart card) should maintain its security properties even against efforts at probing and reverse engineering; moreover, sensitive data stored on a trustworthy hardware device should be protected at all times. Side-channels attacks are used to learn the secrets stored by a device through monitoring the side effects of its computation. The well known power side-channel attack uses the effect that a cryptographic key has on the power waveform as the cipher runs.

group_project

Visible to the public CT-ISG: Collaborative Research: Router Models and Downscaling Tools for Scalable Security Experiments

It is critical to protect the Internet from attacks such as denial of service, and attacks on inter-domain routing. Although several defenses have been proposed, actual deployments have been limited. A primary reason for this lack of deployment is that most defenses have not been validated under realistic conditions, or at sufficiently large scales. Many attacks also have second-order effects that are not well understood. This is because it is difficult to incorporate all the protocols involved at any reasonable scale in analytical, simulation, or emulation models or testbeds.

group_project

Visible to the public CT-M: Collaborative Research: Securing Dynamic Online Social Networks

Considering the popularity and wide adoption of social network systems and the competitive edge these systems provide, there has been a rapid growth in use of these systems to access, store, and exchange personal attribute information in distributed and/or federated environments and this trend is expected to continue. Efficient, secure, and user-centric techniques are important for the successful deployment of such systems.