Division of Computer and Network Systems (CNS)
group_project
Submitted by Rajeev Bansal on Thu, 04/26/2018 - 2:25pm
This award is funded under the American Recovery and Reinvestment Act of 2009 (Public Law III-5).
group_project
Submitted by V. Venkatakrishnan on Thu, 04/26/2018 - 2:23pm
The World Wide Web is a critical infrastructure that serves our society by facilitating information exchange, business and education. As it continues to evolve, the number of web-based attacks that target innocent web users keeps increasing. Examples of such attacks include Cross-site Scripting, SQL Injection and Cross-site Request Forgery. Recent attacks on end-users and online enterprises through these virulent attacks have resulted in widespread damage.
group_project
Submitted by Marco Gruteser on Thu, 04/26/2018 - 2:15pm
This project addresses the challenge of strengthening control over location privacy for users of wireless devices such as smartphones. As these devices and their network services continuously monitor our environment, they enable many novel applications with tremendous societal benefits.
group_project
Submitted by Fabian Monrose on Thu, 04/26/2018 - 2:08pm
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses the network. However, with the increasing popularity of cryptographic protocols the traditional means of inspecting packet contents to enforce security policies is no longer a viable approach as message contents are concealed by encryption.
group_project
Submitted by Xuxian Jiang on Thu, 04/26/2018 - 1:59pm
Botnets are recognized as one of the most serious threats to today's Internet. To combat them, one key step is to effectively understand how the botnet members communicate with each other. Unfortunately, the trend of adopting various obfuscation schemes (e.g., encryption) in recent bots greatly impedes our understanding. The main thrust of this research is the investigation of several interrelated key techniques to overcome the above challenges and significantly enrich the understanding of botnet command and control.
group_project
Submitted by Phillip Rogaway on Thu, 04/26/2018 - 1:56pm
In the last few years, universally composable (UC) security, defined and extensively investigated by Ran Canetti, has become a popular and important topic in modern cryptography. Canetti's notion has enormous appeal, promising a unified framework under which one can define virtually any cryptographic protocol goal, and further promising that the resulting definitions will be composable in the sense that a protocol solution for some goal will comprise a suitable primitive to use within any other protocol that desires its abstracted functionality.
group_project
Submitted by Jose Meseguer on Wed, 04/25/2018 - 5:13pm
The project develops cryptographic protocol reasoning techniques that take into account algebraic properties of cryptosystems. Traditionally, formal methods for cryptographic protocol verification view cryptographic operations as a black box, ignoring the properties of cryptographic algorithms that can be exploited to design attacks. The proposed research uses a novel approach based on equational unification to build new more expressive and efficient search algorithms for algebraic theories relevant to cryptographic protocols.
group_project
Submitted by Aviel Rubin on Wed, 04/25/2018 - 3:58pm
Voting systems require end-to-end trustworthiness, commencing with blank ballots and registration lists and concluding with the correct and auditable tallies of the marked ballots, reflecting the choices of the voters. This ballot round trip must resist well financed and organized adversaries that may include the very people who develop, maintain, or deploy the election machinery, and the process must be accessible to all citizens regardless of their disabilities or native language.
group_project
Submitted by Douglas Jones on Wed, 04/25/2018 - 3:44pm
Voting systems require end-to-end trustworthiness, commencing with blank ballots and registration lists and concluding with the correct and auditable tallies of the marked ballots, reflecting the choices of the voters. This ballot round trip must resist well financed and organized adversaries that may include the very people who develop, maintain, or deploy the election machinery, and the process must be accessible to all citizens regardless of their disabilities or native language.
group_project
Submitted by Steven Gribble on Wed, 04/25/2018 - 3:07pm
This project is building a foundation for understanding spyware, and is advancing the state of the art in detecting and preventing spyware infections. Our research consists of four broad activities: