Division of Computer and Network Systems (CNS)

group_project

Visible to the public CAREER: Architectural Enhancement and Design Methodologies for Secure Processing in Embedded Systems

This award is funded under the American Recovery and Reinvestment Act of 2009 (Public Law III-5).

group_project

Visible to the public CAREER: A Framework for Preventing Web-based Attacks

The World Wide Web is a critical infrastructure that serves our society by facilitating information exchange, business and education. As it continues to evolve, the number of web-based attacks that target innocent web users keeps increasing. Examples of such attacks include Cross-site Scripting, SQL Injection and Cross-site Request Forgery. Recent attacks on end-users and online enterprises through these virulent attacks have resulted in widespread damage.

group_project

Visible to the public CAREER: User-Controlled Wireless Privacy via Client-Oriented De-Identification

This project addresses the challenge of strengthening control over location privacy for users of wireless devices such as smartphones. As these devices and their network services continuously monitor our environment, they enable many novel applications with tremendous societal benefits.

group_project

Visible to the public CAREER:Towards Effective Identification of Application Behaviors in Encrypted Traffic

Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses the network. However, with the increasing popularity of cryptographic protocols the traditional means of inspecting packet contents to enforce security policies is no longer a viable approach as message contents are concealed by encryption.

group_project

Visible to the public CT-ISG: Understanding Botnet Command and Control (C&C) Communication

Botnets are recognized as one of the most serious threats to today's Internet. To combat them, one key step is to effectively understand how the botnet members communicate with each other. Unfortunately, the trend of adopting various obfuscation schemes (e.g., encryption) in recent bots greatly impedes our understanding. The main thrust of this research is the investigation of several interrelated key techniques to overcome the above challenges and significantly enrich the understanding of botnet command and control.

group_project

Visible to the public TC: Medium: Reimagining Cryptography by Identifying its Culturally-Rooted Assumptions

In the last few years, universally composable (UC) security, defined and extensively investigated by Ran Canetti, has become a popular and important topic in modern cryptography. Canetti's notion has enormous appeal, promising a unified framework under which one can define virtually any cryptographic protocol goal, and further promising that the resulting definitions will be composable in the sense that a protocol solution for some goal will comprise a suitable primitive to use within any other protocol that desires its abstracted functionality.

group_project

Visible to the public TC: Medium: Collaborative Research: Unification Laboratory: Increasing the Power of Cryptographic Protocol Analysis Tools

The project develops cryptographic protocol reasoning techniques that take into account algebraic properties of cryptosystems. Traditionally, formal methods for cryptographic protocol verification view cryptographic operations as a black box, ignoring the properties of cryptographic algorithms that can be exploited to design attacks. The proposed research uses a novel approach based on equational unification to build new more expressive and efficient search algorithms for algebraic theories relevant to cryptographic protocols.

group_project

Visible to the public Collaborative Research: CT-CS: A Center for Correct, Usable, Reliable, Auditable, and Transparent Elections (ACCURATE)

Voting systems require end-to-end trustworthiness, commencing with blank ballots and registration lists and concluding with the correct and auditable tallies of the marked ballots, reflecting the choices of the voters. This ballot round trip must resist well financed and organized adversaries that may include the very people who develop, maintain, or deploy the election machinery, and the process must be accessible to all citizens regardless of their disabilities or native language.

group_project

Visible to the public Collaborative Research: CT-CS: A Center for Correct, Usable, Reliable, Auditable, and Transparent Elections (ACCURATE)

Voting systems require end-to-end trustworthiness, commencing with blank ballots and registration lists and concluding with the correct and auditable tallies of the marked ballots, reflecting the choices of the voters. This ballot round trip must resist well financed and organized adversaries that may include the very people who develop, maintain, or deploy the election machinery, and the process must be accessible to all citizens regardless of their disabilities or native language.

group_project

Visible to the public CT-T: The Detection and Prevention of Spyware

This project is building a foundation for understanding spyware, and is advancing the state of the art in detecting and preventing spyware infections. Our research consists of four broad activities: