Division of Computer and Network Systems (CNS)

group_project

Visible to the public CT-ISG: A Game Theoretic Framework for Privacy Preservation in Community-Based Mobile Applications

The explosive growth of mobile devices coupled with near universal connectivity creates new opportunities for community based mobile social networking applications. In this class of applications each user in a community contributes their knowledge about their surrounding environments and the collective knowledge is used by the group members for a personal or social benefit. The foundational underpinning of all mobile social networks is a participant's desire to take advantage of the collective knowledge gained from other users in the community.

group_project

Visible to the public Practical Privacy Preserving Technologies

Privacy is an important concern in the digital age, yet the adoption of privacy preserving technologies has lagged behind that of other

group_project

Visible to the public Collaborative Research: CT-T: Towards Behavior-Based Malware Detection

Malware is code with malicious intent that can adversely affect the host on which it executes or the network over which they are transmitted. A malware detector classifies a program as malware or benign. Malware writers continuously test the limitations of malware detectors in an attempt to discover techniques to evade detection. This leads to an arms race, where malware writers find new ways to create malware that are undetected by commercial malware detectors, and where researchers working on malware detection respond by devising new detection techniques.

group_project

Visible to the public CAREER: Securing Channel Access in Multi-Channel Ad Hoc Networks

An increasing number of mobile users rely on wireless technologies to gain secure and uninterrupted access to network services. As the volume of data disseminated via the wireless medium rapidly expands, provision of performance, reliability, and security become challenging problems. These problems can be alleviated by the use of multiple orthogonal frequency bands (channels) that has been demonstrated to substantially reduce contention and interference.

group_project

Visible to the public CAREER: Internet Measurement in the Cat's Cradle of Global Internet Censorship

The Internet will shape the history of the 21st century. Governments around the world realize this, which is why, out of 40 countries studied by the Open Net Initiative, Internet censorship increased from 3 of 40 in 2002 to 26 of 40 in 2007. The U.S. must set effective policy regarding this, but the inherently computational issues lead to a great deal of uncertainty.

group_project

Visible to the public CAREER: Novel Techniques for Detecting and Localizing Hardware Trojans in Integrated Circuits

Design and fabrication of integrated circuits (ICs) are becoming increasingly vulnerable to malicious activities and alterations with globalization. These vulnerabilities have raised serious concerns regarding possible threats to many critical applications. An adversary can introduce a Trojan designed to disable and/or destroy a system at some future time or the Trojan may serve to leak confidential information covertly to the adversary. This research develops efficient procedures for detection of malicious alterations and subtle modifications in integrated circuits.

group_project

Visible to the public CAREER: Malware Immunization and Forensics Based on Another Sense of Self

Despite recent advances in malware defense, computer malwares (e.g., virus, worm, botnets, rootkit, spyware) continue to pose serious threats to all computers and networks. Besides being more damaging, modern malwares (e.g., blue pill, agobot) are becoming increasingly stealthy and evasive. This has made it increasingly difficult to protect our computer systems and networks from malwares and ensure the trustworthiness of our mission critical systems.

group_project

Visible to the public CAREER: Practical Privacy for Outsourcing Systems

This award is funded under the American Recovery and Reinvestment Act of 2009 (Public Law 111-5).

group_project

Visible to the public CAREER: Local Remediation of Global Internet Epidemics

This award is funded under the American Recovery and Reinvestment Act of 2009 (Public Law 111-5).

group_project

Visible to the public TC: Medium: Collaborative Research: Program Analysis for Smartphone Application Security

This project investigates a new approach for describing and reasoning about security properties of smartphone applications. Smartphones are becoming pervasive, and smartphone applications are increasingly used for a variety of social, health, scientific, and military purposes. However, the capabilities these phones provide, such as access to GPS, camera, Internet, calendar, contacts, and other sensitive information can lead to major security risks. Today's smartphone development methodologies do little to help developers construct applications that safely access sensitive resources.