Division of Computer and Network Systems (CNS)
group_project
Submitted by Sencun Zhu on Sun, 04/22/2018 - 9:50pm
Worms have emerged as one of the leading threats to our information systems and critical infrastructures. Despite the tremendous research effort in combating worms, new computer and system vulnerabilities are continuously reported and new worm attacks keep succeeding. Another significant trend in worm attacks is that the number of worm attacks against emergent networks, such as P2P networks, cellphone networks, and sensor networks, is rapidly growing.
group_project
Submitted by PMcDaniel on Sun, 04/22/2018 - 9:45pm
This grant supports an investigation of formal models, algorithms, methods, tools, and infrastructure that build upon the information flow guarantees of security-typed languages to achieve high assurance software systems. The information flow guarantees of security-typed languages provide a practical avenue to achieving system security by producing proofs of an implementation's compliance with a specified policy.
group_project
Submitted by kgshin@eecs.umich... on Sun, 04/22/2018 - 9:42pm
This project is developing an automated defense system for enterprise networks against malicious code attacks such as worms, viruses and spyware. This system responds to attacks by dynamically and selectively quarantining hosts, services, and other networked devices. Traditional containment systems based on firewalls and individual host isolation are not adequate for containing the new generation of local-scanning, topological, metaserver and contagion worms that can spread very quickly through an enterprise.
group_project
Submitted by jkatz on Sun, 04/22/2018 - 9:38pm
Unstructured, decentralized systems --- including ad-hoc/sensor networks and peer-to-peer networks --- are emerging as a central focus of computer science research. Methods for securing these systems are critical; however, these systems differ markedly from classical distributed systems (which are, in comparison, more ``structured'' and well-organized) and thus current cryptographic models and mechanisms are simply not sufficient for addressing the full range of security requirements.
group_project
Submitted by Vern Paxson on Sun, 04/22/2018 - 9:33pm
The combination of widespread software homogeneity and the Internet's unrestricted communication model creates an ideal climate for infectious, self-propagating pathogens - "worms" and "viruses" - with each new generation of outbreaks demonstrating increasing speed, virulence, and sophistication. The Center for Internet Epidemiology and Defenses aims to address twin fundamental needs: to better understand the behavior and limitations of Internet epidemics, and to develop systems that can automatically defend against new outbreaks in real-time.
group_project
Submitted by Stefan S on Sun, 04/22/2018 - 9:25pm
The combination of widespread software homogeneity and the Internet's unrestricted communication model creates an ideal climate for infectious, self-propagating pathogens - "worms" and "viruses" - with each new generation of outbreaks demonstrating increasing speed, virulence, and sophistication. The Center for Internet Epidemiology and Defenses aims to address twin fundamental needs: to better understand the behavior and limitations of Internet epidemics, and to develop systems that can automatically defend against new outbreaks in real-time.
group_project
Submitted by John Black on Sun, 04/22/2018 - 9:07pm
While some researchers have aimed at efficiency, they have often developed algorithms without proving them secure. Conversely, researchers focussed on provable security have often produced impractical algorithms. Providing both performance and provable security entails great effort in each domain, often entailing a strange marriage of mathematics with implementation considerations.
group_project
Submitted by William Young on Sun, 04/22/2018 - 8:50pm
Virtualization is rapidly becoming a key technology for computing systems, promising significant benefits in security, efficiency, and dependability. Fully realizing these benefits depends upon the reliability of virtual machine monitors (hypervisors).
group_project
Submitted by Fei Xie on Sun, 04/22/2018 - 8:46pm
Electronic System Level ( ESL ) designs , specified behaviorally using high-level languages such as SystemC , raise the level of hardware design abstraction . This approach crucially depends on behavioral synthesis , which compiles ESL designs to Register Transfer Level ( RTL ) designs . However , optimizations performed by synthesis tools make their implementation error-prone , undermining the trustworthiness of synthesized hardware. This research develops a mechanized infrastructure for certifying hardware designs generated by behavioral synthesis .
group_project
Submitted by Elsa Gunter on Sun, 04/22/2018 - 8:42pm
Computer systems are commonly coupled with human operators who add hands, eyes, and judgment to the computer programming and its sensors and actuators. The operators can be viewed as programming platforms in their own right, where manuals, training, and system feedback provide the programming. However, operators have unique platform characteristics compared to computers, including, in particular, the likelihood of making numerous and diverse errors.