Division of Computer and Network Systems (CNS)

group_project

Visible to the public CT-ISG: Opportunistic Secret Key Exchange Using Wireless Link Characteristics and Device Mobility

The objective of this research is to build new measurement-based methods for secure secret key establishment between two wireless devices, without ever communicating the secret key, using diverse physical characteristics of the wireless medium, notably an innovative measurement called temporal link signatures, and using device mobility.

group_project

Visible to the public CT-ISG: SPEAR: Space Encryption based Query Processing for Privacy-Aware Location-based Services

As a result of recent wireless technology advances, mobile devices with significant computational abilities, gigabytes of storage capacities, and wireless communication capabilities have increasingly become popular. In addition, positioning techniques like GPS are incorporated into an increasing number of mobile devices. Emerging mobile applications allow users to issue location-dependent queries in a ubiquitous manner. It is believed that location privacy preservation represents important security and privacy problems in mobile computing environments.

group_project

Visible to the public CT-ISG: Enabling Location Privacy; Moving beyond k-anonymity, cloaking and anonymizers

Location-based services are becoming an important part of our everyday lives. According to the Pew Internet & American Life Project survey, 47% of current cell-phone users prefer to have mapping features on their phones. Similar trends can be shown for other portable devices such as car navigation systems, PDA's and computer laptops. However, recent concerns over how such services can jeopardize a user's private information resulted in the newly coined term "location privacy." Several breaches of subscriber's privacy by stalking their locations have been reported.

group_project

Visible to the public CT-ISG: High-Speed Network Defense with Massive and Diverse Vulnerability Signatures

Given the ever-increasing sophisticated Internet attacks, network-based Intrusion Detection/Prevention Systems (IDS/IPS) are of critical importance. Such systems mainly have two important metrics: accuracy and throuput. Accuracy is of particular importance, especially for IPSes which are inline devices that throttle connections when they are identified as malicious via signature-matching. The latest works assume that regular expressions (RE) are the right choice for signature formatting. However, there are polymorphic and metamorphic variations that can evade the RE-based detection.

group_project

Visible to the public CT-ISG: User-Aided Secure Association of Wireless Devices

The popularity of personal gadgets opens up many new services for ordinary users. Many everyday usage scenarios involve two or more devices "working together". (Emerging scenarios are beginning to involve sensors and personal RFID tags.) Before working together, devices must be securely "paired" to enable secure and private communication. However, the human-imperceptible nature of wireless communication prompts the very real threat of Man-in-the-Middle (MiTM) attacks. Another challenge arises due to the lack of a global security infrastructure.

group_project

Visible to the public  CT-ISG: I-BLOCK: Understanding and Filtering of Malicious IP Traffic

How can network infrastructure be protected from malicious traffic, such as scanning, malicious code propagation, spam, and distributed denial-of-service attacks? This project investigates mechanisms at the network layer for blocking malicious traffic.

group_project

Visible to the public CT-ISG: Memory Safety for Legacy Software, A Quantitative Approach

The inability of programmers to write vulnerability free code is the most pressing problem in practical computer systems security. The most serious class of vulnerabilities is memory vulnerabilities, which generally allow an attacker to subvert the program's control flow. In response to this problem, generic mitigations have been widely deployed that, through changes to the operating system and processor, seek to make it impossible for attackers to exploit errors in programs.

group_project

Visible to the public CT-L: Collaborative Research: Comprehensive Application Analysis and Control

A deep, pervasive problem when attempting to secure modern computer networks arises from the bewildering range of applications that these networks carry. Unless a specific application is understood, its presence cannot be soundly monitored and controlled.

group_project

Visible to the public CT-M: A Real-Time Botnet Monitoring Infrastructure

Large-scale botnets have become a blight on the Internet. Botnets engage in a variety of harmful activities, including initiating DDoS attacks, committing click fraud, propagating adware, and sending enormous volumes of spam. Though there is an increasing awareness of botnets, there are gaping holes in our understanding of botnets, both in terms of macroscopic properties as well as the ability to track and thwart specific attacks.

group_project

Visible to the public CT-ISG: Physiological Value based Security for Body Area Networks

This project addresses the challenge of providing usable (plug-and-play, self-configuring, and autonomic) security solutions for Body Area Networks (BANs): networks of economically powered, wireless, wearable and/or implanted health monitoring nodes (sensors and actuators), for collecting and communicating health information and, appropriately administering medicine or prosthetic actions. BANs have many diverse applications including sports health management, home-based health-care and post-operative care.