Division of Computer and Network Systems (CNS)

group_project

Visible to the public CT-ISG: The Economics of Internet Security: Theoretical and Empirical Analysis

With the continuing growth of the use of the Internet for business purposes, the consequences of a possible cyber attack that could create a large scale outage of long time duration is an increasingly important economic issue. In 2003, the President's National Strategy to Secure Cyberspace stated that government action is warranted where alleged "market failures result in underinvestment in cyber security". However, there is scant empirical evidence and/or theoretical support for such "market failure".

group_project

Visible to the public Collaborative Research: CT-T: Towards Behavior-Based Malware Detection

Malware is code with malicious intent that can adversely affect the host on which it executes or the network over which they are transmitted. A malware detector classifies a program as malware or benign. Malware writers continuously test the limitations of malware detectors in an attempt to discover techniques to evade detection. This leads to an arms race, where malware writers find new ways to create malware that are undetected by commercial malware detectors, and where researchers working on malware detection respond by devising new detection techniques.

group_project

Visible to the public Collaborative Research: CT-T: Cryptographic Techniques for Searching and Processing Encrypted Data

In this proposal we consider the question of what constitutes identities in cryptography. Typical examples of identities include your name and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-revoked) Public-Key coming from some trusted public-key infrastructure. In many situations, however, where you are defines your identity. For example, we know the role of a bank-teller behind a bullet-proof bank window not because he or she shows us her credentials but by merely knowing her location.

group_project

Visible to the public CT-T User-Controllable Security and Privacy for Pervasive Computing

Mobile devices and the services they support are increasingly becoming central in both personal and business life, enabling a variety of pervasive computing applications. Because the vast majority of these devices are unmanaged, lay users are responsible for handling the security and privacy implications they bring.

group_project

Visible to the public CAREER: Practical Scheme Design for Supporting Secure and Resilient Resource-Constrained Wireless Networks

A wide range of resource-constrained wireless networks including wireless sensor networks have shown considerable promise in bringing many envisioned applications and services to reality, such as healthcare, search and rescue operations, watch-my-child/aging-parent, power grid control and operations, battlefield surveillance, etc. However, due to the nature of their resource-constrained design and ways of being deployed and used, they are vulnerable to attacks.

group_project

Visible to the public Collaborative Research: CT-CS: A Center for Correct, Usable, Reliable, Auditable, and Transparent Elections (ACCURATE)

Voting systems require end-to-end trustworthiness, commencing with blank ballots and registration lists and concluding with the correct and auditable tallies of the marked ballots, reflecting the choices of the voters. This ballot round trip must resist well financed and organized adversaries that may include the very people who develop, maintain, or deploy the election machinery, and the process must be accessible to all citizens regardless of their disabilities or native language.

group_project

Visible to the public CAREER: Scalable, Robust and Secure Group-Oriented Services for Wireless Mesh Networks

Wireless mesh networks are emerging as a promising robust low-cost network architecture able to provide increased coverage and larger bandwidth, resulting in higher quality of service and information availability. Many distributed applications provided on wireless mesh networks enable collaborations and sharing of information. Such applications benefit from scalable, robust and secure group services such as one-to-many or many-to-many multicast and distributed data access.

group_project

Visible to the public CAREER: Securing Cyberspace: The Role of Markets and Policy

Securing cyberspace and national infrastructure has become a key priority for policy makers. Recognizing the fact that the software vendors are key to building and developing secure products, this CAREER project examines and quantifies vendors incentives to provide secure products. The PI is analyzing three major vendor incentives incentives to provide timely and reliable patches; cost of insecure products to vendors and hence their incentives to provide secure software and, incentives to adopt voluntary security assurance standards.

group_project

Visible to the public CAREER: Cryptography Outside the Box

Cryptography is the science of communication in the presence of a potential adversary and is an essential component in computer security. The past three decades of the study of cryptography continue to have a tremendous impact on society, having enabled, for example, world-wide ATM networks, pay TV, private email, VPNs, and electronic commerce. This project is developing cryptography that is more user-friendly, fault-tolerant and secure, thus broadening its applicability to our increasingly electronic lives.

group_project

Visible to the public Collaborative Research: CT-CS: A Center for Correct, Usable, Reliable, Auditable, and Transparent Elections (ACCURATE)

Voting systems require end-to-end trustworthiness, commencing with blank ballots and registration lists and concluding with the correct and auditable tallies of the marked ballots, reflecting the choices of the voters. This ballot round trip must resist well financed and organized adversaries that may include the very people who develop, maintain, or deploy the election machinery, and the process must be accessible to all citizens regardless of their disabilities or native language.