Division of Computer and Network Systems (CNS)

group_project

Visible to the public CAREER: Combating Worm Propagation in Emergent Networks

Worms have emerged as one of the leading threats to our information systems and critical infrastructures. Despite the tremendous research effort in combating worms, new computer and system vulnerabilities are continuously reported and new worm attacks keep succeeding. Another significant trend in worm attacks is that the number of worm attacks against emergent networks, such as P2P networks, cellphone networks, and sensor networks, is rapidly growing.

group_project

Visible to the public CAREER: Realizing Practical High Assurance through Security-Typed Information Flow Systems

This grant supports an investigation of formal models, algorithms, methods, tools, and infrastructure that build upon the information flow guarantees of security-typed languages to achieve high assurance software systems. The information flow guarantees of security-typed languages provide a practical avenue to achieving system security by producing proofs of an implementation's compliance with a specified policy.

group_project

Visible to the public CT-ISG: Protection Against Malicious Attacks via Quarantine-Tolerant Service Partitioning

This project is developing an automated defense system for enterprise networks against malicious code attacks such as worms, viruses and spyware. This system responds to attacks by dynamically and selectively quarantining hosts, services, and other networked devices. Traditional containment systems based on firewalls and individual host isolation are not adequate for containing the new generation of local-scanning, topological, metaserver and contagion worms that can spread very quickly through an enterprise.

group_project

Visible to the public CAREER: Models and Cryptographic Protocols for Unstructured, Decentralized Systems

Unstructured, decentralized systems --- including ad-hoc/sensor networks and peer-to-peer networks --- are emerging as a central focus of computer science research. Methods for securing these systems are critical; however, these systems differ markedly from classical distributed systems (which are, in comparison, more ``structured'' and well-organized) and thus current cryptographic models and mechanisms are simply not sufficient for addressing the full range of security requirements.

group_project

Visible to the public Collaborative Proposal Cybertrust: Center for Internet Epidemiology and Defenses

The combination of widespread software homogeneity and the Internet's unrestricted communication model creates an ideal climate for infectious, self-propagating pathogens - "worms" and "viruses" - with each new generation of outbreaks demonstrating increasing speed, virulence, and sophistication. The Center for Internet Epidemiology and Defenses aims to address twin fundamental needs: to better understand the behavior and limitations of Internet epidemics, and to develop systems that can automatically defend against new outbreaks in real-time.

group_project

Visible to the public Collaborative Research: Cybertrust Center for Internet Epidemiology and Defenses

The combination of widespread software homogeneity and the Internet's unrestricted communication model creates an ideal climate for infectious, self-propagating pathogens - "worms" and "viruses" - with each new generation of outbreaks demonstrating increasing speed, virulence, and sophistication. The Center for Internet Epidemiology and Defenses aims to address twin fundamental needs: to better understand the behavior and limitations of Internet epidemics, and to develop systems that can automatically defend against new outbreaks in real-time.

group_project

Visible to the public CAREER: Highly-Optimized Provably-Secure Cryptography

While some researchers have aimed at efficiency, they have often developed algorithms without proving them secure. Conversely, researchers focussed on provable security have often produced impractical algorithms. Providing both performance and provable security entails great effort in each domain, often entailing a strange marriage of mathematics with implementation considerations.

group_project

Visible to the public TC: Small: V2M2: Towards a Verified Virtual Machine Monitor

Virtualization is rapidly becoming a key technology for computing systems, promising significant benefits in security, efficiency, and dependability. Fully realizing these benefits depends upon the reliability of virtual machine monitors (hypervisors).

group_project

Visible to the public TC: Small: Collaborative Research: Trustworthy Hardware from Certified Behavioral Synthesis

Electronic System Level ( ESL ) designs , specified behaviorally using high-level languages such as SystemC , raise the level of hardware design abstraction . This approach crucially depends on behavioral synthesis , which compiles ESL designs to Register Transfer Level ( RTL ) designs . However , optimizations performed by synthesis tools make their implementation error-prone , undermining the trustworthiness of synthesized hardware. This research develops a mechanized infrastructure for certifying hardware designs generated by behavioral synthesis .

group_project

Visible to the public TC: Small: Formalizing Operator Task Analysis

Computer systems are commonly coupled with human operators who add hands, eyes, and judgment to the computer programming and its sensors and actuators. The operators can be viewed as programming platforms in their own right, where manuals, training, and system feedback provide the programming. However, operators have unique platform characteristics compared to computers, including, in particular, the likelihood of making numerous and diverse errors.