Division of Computer and Network Systems (CNS)
group_project
Submitted by Loukas Lazos on Sun, 03/18/2018 - 3:55pm
Wireless networks are inherently vulnerable to external and internal network attacks, due to the open nature of the wireless medium and the poor physical security of wireless devices. While external attacks can be neutralized through a combination of cryptography-based measures and robustness mechanisms, internal attacks, which are launched from compromised nodes, are much more sophisticated in nature.
group_project
Submitted by Wu-chang Feng on Sun, 03/18/2018 - 3:52pm
As seen by the proliferation of commercial-grade malware, attacking networked applications is a profitable enterprise. There are two advantages malware authors currently have against us. The first advantage is that because users run a diverse set of applications on their systems, anti-virus and anti-malware programs must exhaustively search for specific malware instances across all pieces of software on a system.
group_project
Submitted by H.V. Jagadish on Sun, 03/18/2018 - 3:50pm
Social-networking sites (e.g., Facebook, MySpace, LinkedIn, etc.) and other online collaborative tools have emerged as places where people can post and share information. This information-sharing has many benefits, ranging from practical (e.g., sharing a business document) to purely social (e.g., communicating with distant friends). At the same time, information sharing inevitably poses significant threats to user privacy. In social-networking sites, for example, documented threats range from identity theft to digital stalking and personalized spam.
group_project
Submitted by Adam Lee on Wed, 03/14/2018 - 5:59pm
With the advent of sensor-rich mobile devices such as smartphones, an increasing number of people are sharing personal "contextual" information like location, activity, and health/fitness information with members of their social network. To enhance privacy for people sharing such information, a large body of research has focused on ways for users to specify who should be authorized to access their information. This research improves end-user privacy by addressing the related question of "Who is accessing my information and to what extent?".
group_project
Submitted by Evimaria Terzi on Wed, 03/14/2018 - 5:10pm
Social-networking sites (e.g., Facebook, MySpace, LinkedIn, etc.) and other online collaborative tools have emerged as places where people can post and share information. This information-sharing has many benefits, ranging from practical (e.g., sharing a business document) to purely social (e.g., communicating with distant friends). At the same time, information sharing inevitably poses significant threats to user privacy. In social-networking sites, for example, documented threats range from identity theft to digital stalking and personalized spam.
group_project
Submitted by Jedidiah Crandall on Wed, 03/14/2018 - 5:04pm
Information flow is a central concept in computer security, yet it is still an open problem to tag information in a running system and track how the information flows throughout the system in an accurate manner. We are developing the fundamental concepts in control theory, information theory, and systems to solve this problem using what we call a relaxed static stability approach.
group_project
Submitted by Wenliang Du on Wed, 03/14/2018 - 4:59pm
As the Web is playing a more and more important role in our lives, it has become criminals' preferred targets. Web-based vulnerabilities now outnumber traditional computer security concerns. We believe that the root cause of many of these attacks is the Web's current access control models: they are fundamentally inadequate to satisfy the protection needs of today's web.
group_project
Submitted by XiaoFeng Wang on Wed, 03/14/2018 - 3:51pm
With software-as-a-service (SaaS) rapidly becoming mainstream, web applications increasingly substitute for desktop software. A web application is a two-part program, with its components deployed both in the browser and in the web server. The interactions between these two components inevitably reveal the program's internal states to any observer of the communication stream, simply through the pattern of packet lengths and the timing of interactions, even if stream is entirely encrypted.
group_project
Submitted by Xiaowei Yang on Wed, 03/14/2018 - 3:39pm
This project aims to develop a substrate called SocialLite that can use online social network data to obtain reliable identity and trust information. This work involves three steps: 1) identifying the rich variety of identity and trust information embedded in online social networks; 2) designing algorithms and software to efficiently and robustly abstract this information as a set of flexible API functions without violating a user?s privacy from large online social networks; and 3) evaluating the usefulness of the API by implementing a few sample applications.
group_project
Submitted by SGoldberg on Wed, 03/14/2018 - 3:27pm
Despite a decade of research, the problem of securing the Internet's interdomain routing system is far from solved. For a long time, it seemed there was a problem of technical feasibility; research focused on designing more and more lightweight protocols, by reducing computational or communication overheads, or considering weaker security guarantees. It has now become clear that the challenge of deploying these protocols is not one of technical feasibility, but one of incentives.