Division of Computer and Network Systems (CNS)
group_project
Submitted by Matthew Blaze on Sun, 04/22/2018 - 10:50pm
The Isotropic Cryptography project introduces and lays the theoretical and engineering foundations for information-theoretically secure communication over open channels that meet certain requirements. More specifically, the project identifies and is concerned with {\em isotropic channels,} in which eavesdroppers monitoring the channel are unable to identify the sources and destinations of messages with certainty. Such channels appear to have very interesting and promising security properties.
group_project
Submitted by Tzi-Cker Chiueh on Sun, 04/22/2018 - 10:43pm
A comprehensive cyber attack defense should include (1) an attack detection component that can determine if a network application has been compromised and prevent the attack from further spreading, (2) an attack identification component that can identify the corresponding attack packets and generate the associated attack signatures so as to prevent such attacks from taking place in the future, and (3) an attack repair component that can restore the compromised application's state to that before the attack and allow it to continue normally, and if possible permanently eliminate the vulnerabi
group_project
Submitted by Nicholas Feamster on Sun, 04/22/2018 - 10:37pm
The Kaleidoscope project is developing techniques, tools, and systems to facilitate network operations---a class of tasks that includesnmonitoring network conditions, detecting actionable problems, and taking steps to remediate them. We focus on two areas of network operations: (1) network security (specifically, unwanted traffic) and (2) network monitoring, diagnosis, and troubleshooting. The results from this project will both streamline today's network operations tasks andnprovide design insights for network operations in the next-generationn Internet.
group_project
Submitted by schaum on Sun, 04/22/2018 - 10:16pm
The implementation of a secure cipher within the embedded electronics of a smart-card can have a large number of weak points, which are unrelated to the cryptographic strength of that cipher. Side-channel information leaks may disclose internal secrets through the cipher's power consumption, execution time, and other physical implementation effects. Affecting hardware as well as software, these leaks show that a secure embedded system is no stronger than its weakest link.
group_project
Submitted by Zhijie Shi on Sun, 04/22/2018 - 10:09pm
The enormous number of successful attacks attests to the fact that computer security is a complex issue. It requires research in many layers and components in computer systems, and becomes even more challenging when resource-constrained systems like mobile computing devices and sensor nodes are considered.
group_project
Submitted by Jun Li on Sun, 04/22/2018 - 10:06pm
Accurate detection of Internet worms in their early stages remains an unsolved problem. One could scan Internet traffic for worm signatures or suspicious byte patterns, but worm signatures are often useless for unknown worms that exploit new software vulnerabilities, and suspicious byte patters are problematic because worms can carry virtually arbitrary payloads. Processing and analyzing traffic payloads is also expensive. These limitations have motivated investigations into the behaviors that self-propagating worms may display.
group_project
Submitted by Hao Chen on Sun, 04/22/2018 - 10:03pm
Cellular networks are part of our critical information infrastructure. However, the upcoming broadband cellular data networks and mobile devices have unique vulnerabilities that have attracted little research attention. The PI proposes a five-year plan for understanding the inherent vulnerabilities and developing technologies for improving the security of cellular data networks and mobile devices.
group_project
Submitted by Jared Saia on Sun, 04/22/2018 - 9:59pm
How can a group of agents achieve a goal despite efforts by some of the agents to prevent this? This important question cuts across many disciplines including political science, economics, mathematics and computer science. In this proposal, we are exploring this question by focusing on the following problem. A set of n agents wants to compute the value of a function, f, of n inputs, where each agent holds a unique input of f. Our goal is to create a distributed algorithm that ensures that each agent learns the output of f.
group_project
Submitted by YanLindsaySun on Sun, 04/22/2018 - 9:56pm
When network participants do not know how to trust each other, network operations suffer. Participants that naively trust will be victimized and their resources misused. Mistrustful participants will ignore opportunities and their resources will be wasted through inefficiencies. Current research on the establishment of trust often focuses on narrow models and specific domains. There is a gap between point solutions and a system-wide trust infrastructure. This research will address the major issues in designing such a trust infrastructure.
group_project
Submitted by Zhuoqing Mao on Sun, 04/22/2018 - 9:53pm
This research is developing a framework for better managing IP networks using an intent-based network management approach to address the performance and robustness issues associated with managing complex IP networks. The goal is to automatically generate needed network configurations by requiring only high-level objectives as input while also ensuring network-level objectives such as performance and reliability. The research develops design principles applicable to managing both current and future networks and provides insight into designing networks for manageability.