Division of Computer and Network Systems (CNS)
group_project
Submitted by Somesh Jha on Mon, 04/30/2018 - 11:16am
Mobile handheld devices such as smartphones, PDAs, and smart media players have outpaced the growth of wired hosts, and are emerging as the predominant vehicle for Internet access. In recent years, newer mobile phones, including various versions from Apple, Google, Nokia, and others, have promoted greater programmability, radically changing the age-old model of mobile phones being a closed platform. However, openness arrives with new challenges of trustworthiness.
group_project
Submitted by Abhi Shelat on Mon, 04/30/2018 - 11:13am
Secure multi-party computation (MPC) allows several mutually untrusting parties to perform joint computations while keeping their inputs private. This project develops new techniques for constructing two-party secure computation protocols with low communication overhead. Building on the Principal Investigator's prior work for constructing special-purpose secure MPC protocols for greedy algorithms, this project develops new techniques that exploit the algorithmic structure of a function in order to develop more efficient secure computation protocols.
group_project
Submitted by Hoda Mehrpouyan on Mon, 04/30/2018 - 11:11am
As mobile and network technologies proliferate, so does society's awareness of the vulnerability of private data within cyberspace. Protecting private information becomes specially important, since researchers estimate that 87% of Americans can be identified by name and address, if their zip code, gender, and birthday are known to intruders. The goal of this proposal will be to develop a new set of verification tools, algorithms, and interfaces that enable secure, effective and unobtrusive management of users' private information.
group_project
Submitted by Berk Sunar on Mon, 04/30/2018 - 11:08am
Cloud computing is growing at exponential rates due to its great benefits to virtually all companies relying on IT systems. The biggest concern preventing further cloud adoption is data security and privacy. The main security principle in the design of cloud servers has been virtual isolation which ignores information leakage through subtle channels shared by the processes running on the same physical hardware.
group_project
Submitted by ckruegel on Thu, 04/26/2018 - 4:39pm
This award is funded under the American Recovery and Reinvestment Act of 2009 (Public Law 111-5).
Malicious software is one of the most pressing security problems on the Internet. The main reason for the apparent failure of current defense approaches is that malware detection techniques are too specific. This is most obvious with virus scanners, which rely on
signatures that are specific to individual malware instances. However, also behavioral detection techniques typically target only specific
group_project
Submitted by Thomas Shrimpton on Thu, 04/26/2018 - 4:29pm
Cryptographic hash functions are ubiquitous in modern cryptography. They are an integral part of digital signature and public-key encryption schemes, access control mechanisms, digital time-stamping routines, message authentication codes, and file synchronization utilities. They are implemented in point-of-sale terminals, ATM machines, operating systems, web browsers, routers, and mobile phones,mto name just a few.
group_project
Submitted by Moses Liskov on Thu, 04/26/2018 - 3:20pm
Over the past few decades, there has been great progress in cryptography towards provable security. Security properties for many cryptographic techniques are based, provably, on simple computational assumptions (such as the hardness of factoring), with strong proofs. Symmetric cryptography algorithms such as blockciphers and hash functions are typically designed without the benefit of strong proofs of security.
group_project
Submitted by Wenyuan Xu on Thu, 04/26/2018 - 3:17pm
With the continuing proliferation of wireless technology, a wide spectrum of emerging applications using this technology will be tightly interwoven into the fabric of our everyday lives: wireless sensor networks can monitor personal health or critical infrastructures. The viability and success of many of these applications critically hinges on the availability of the underlying wireless communication. As wireless networks become increasingly pervasive, the problem of radio interference and jamming will be inevitable, raising a serious threat to the availability of wireless services.
group_project
Submitted by Murat Kantarcioglu on Thu, 04/26/2018 - 2:36pm
Increasingly, different organizations need to securely share their private data to execute many critical tasks. Recently, several different approaches based on secure multi-party computation (SMC) and data sanitization techniques have emerged to enable privacy preserving distributed data analytics. Although SMC based privacy-preserving protocols allow the participating parties to learn only the final (accurate) result, they do not scale well for large amounts of data.
group_project
Submitted by Abhi Shelat on Thu, 04/26/2018 - 2:34pm
To assert their legitimacy, French kings were borne under witness, and awoke, bathed, and dressed in public. America's Congress implemented a Freedom of Information Act to create methods for citizens to audit their government. These examples show how traditionally, organizations establish their legitimacy through protocols for disclosure. But disclosure has its practical limits; even organizations need a modicum of privacy.