Division of Computer and Network Systems (CNS)
group_project
Submitted by Alfredo Garcia on Wed, 04/25/2018 - 3:03pm
With the continuing growth of the use of the Internet for business purposes, the consequences of a possible cyber attack that could create a large scale outage of long time duration is an increasingly important economic issue. In 2003, the President's National Strategy to Secure Cyberspace stated that government action is warranted where alleged "market failures result in underinvestment in cyber security". However, there is scant empirical evidence and/or theoretical support for such "market failure".
group_project
Submitted by Somesh Jha on Wed, 04/25/2018 - 1:11pm
Malware is code with malicious intent that can adversely affect the host on which it executes or the network over which they are transmitted. A malware detector classifies a program as malware or benign. Malware writers continuously test the limitations of malware detectors in an attempt to discover techniques to evade detection. This leads to an arms race, where malware writers find new ways to create malware that are undetected by commercial malware detectors, and where researchers working on malware detection respond by devising new detection techniques.
group_project
Submitted by Dan Boneh on Mon, 04/23/2018 - 3:14pm
In this proposal we consider the question of what constitutes identities in cryptography. Typical examples of identities include your name and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-revoked) Public-Key coming from some trusted public-key infrastructure. In many situations, however, where you are defines your identity. For example, we know the role of a bank-teller behind a bullet-proof bank window not because he or she shows us her credentials but by merely knowing her location.
group_project
Submitted by Norman Sadeh on Mon, 04/23/2018 - 1:59pm
Mobile devices and the services they support are increasingly becoming central in both personal and business life, enabling a variety of pervasive computing applications. Because the vast majority of these devices are unmanaged, lay users are responsible for handling the security and privacy implications they bring.
group_project
Submitted by Yong Guan on Mon, 04/23/2018 - 1:47pm
A wide range of resource-constrained wireless networks including wireless sensor networks have shown considerable promise in bringing many envisioned applications and services to reality, such as healthcare, search and rescue operations, watch-my-child/aging-parent, power grid control and operations, battlefield surveillance, etc. However, due to the nature of their resource-constrained design and ways of being deployed and used, they are vulnerable to attacks.
group_project
Submitted by David Wagner on Mon, 04/23/2018 - 10:08am
Voting systems require end-to-end trustworthiness, commencing with blank ballots and registration lists and concluding with the correct and auditable tallies of the marked ballots, reflecting the choices of the voters. This ballot round trip must resist well financed and organized adversaries that may include the very people who develop, maintain, or deploy the election machinery, and the process must be accessible to all citizens regardless of their disabilities or native language.
group_project
Submitted by Cristina Nita-Rotaru on Mon, 04/23/2018 - 10:03am
Wireless mesh networks are emerging as a promising robust low-cost network architecture able to provide increased coverage and larger bandwidth, resulting in higher quality of service and information availability. Many distributed applications provided on wireless mesh networks enable collaborations and sharing of information. Such applications benefit from scalable, robust and secure group services such as one-to-many or many-to-many multicast and distributed data access.
group_project
Submitted by Telang Rahul on Mon, 04/23/2018 - 9:45am
Securing cyberspace and national infrastructure has become a key priority for policy makers. Recognizing the fact that the software vendors are key to building and developing secure products, this CAREER project examines and quantifies vendors incentives to provide secure products. The PI is analyzing three major vendor incentives incentives to provide timely and reliable patches; cost of insecure products to vendors and hence their incentives to provide secure software and, incentives to adopt voluntary security assurance standards.
group_project
Submitted by Leonid Reyzin on Mon, 04/23/2018 - 9:36am
Cryptography is the science of communication in the presence of a potential adversary and is an essential component in computer security. The past three decades of the study of cryptography continue to have a tremendous impact on society, having enabled, for example, world-wide ATM networks, pay TV, private email, VPNs, and electronic commerce. This project is developing cryptography that is more user-friendly, fault-tolerant and secure, thus broadening its applicability to our increasingly electronic lives.
group_project
Submitted by Dan Wallach on Mon, 04/23/2018 - 9:31am
Voting systems require end-to-end trustworthiness, commencing with blank ballots and registration lists and concluding with the correct and auditable tallies of the marked ballots, reflecting the choices of the voters. This ballot round trip must resist well financed and organized adversaries that may include the very people who develop, maintain, or deploy the election machinery, and the process must be accessible to all citizens regardless of their disabilities or native language.