Division of Computer and Network Systems (CNS)
group_project
Submitted by Huijia Lin on Wed, 08/07/2019 - 7:03pm
Many organizations and individuals rely on the cloud to store their data and process their analytical queries. But such data may contain sensitive information. Not only do users want to conceal their data on a cloud, they may also want to hide analytical queries over their data, results of such queries, and data access patterns from a cloud service provider (that may be compromised either from within or by a third party).
group_project
Submitted by Selcuk Kose on Wed, 08/07/2019 - 6:56pm
Digital information has become an integral part of our daily lives and there is a growing concern about the security of information. The amount of information that should be kept secure is increasing with the proliferation of high-tech electronics such as smart-phones, tablets, and wearable devices. Accordingly, the number of attacks from malicious parties to obtain the secret information that is stored in a secure (i.e., encrypted) device increases.
group_project
Submitted by Yunsi Fei on Wed, 08/07/2019 - 5:56pm
Deep learning (DL) has become a foundational means for solving diverse problems ranging from computer vision, natural language processing, digital surveillance to finance and healthcare. Security of the deep neural network (DNN) inference engines and trained DNN models on various platforms have become one of the biggest challenges in deploying artificial intelligence. Confidentiality breaches of the DNN model can facilitate manipulations of the DNN inference, resulting in potentially devastating consequences.
group_project
Submitted by Omer Khan on Wed, 08/07/2019 - 5:52pm
Microprocessors are widely deployed in cloud, fog, edge, and mobile computing platforms. In all cases, the economies of scale stem from our ability (through the use of mature virtualization technologies) to host large sets of applications from diverse domains. These applications increasingly operate on private or confidential user data. A major hurdle for exposing and exploiting virtualization capabilities in next generation processors is the lack of a clear vision for how to address the security challenges associated with co-locating applications that share hardware.
group_project
Submitted by David Cash on Wed, 08/07/2019 - 5:49pm
Individuals and organizations routinely trust third party providers to hold sensitive data, putting it at risk of exposure. While the data could be encrypted under a key that is kept secret from the provider, it rarely is, due to the inconvenience and increased cost of managing the cryptography. This project will develop technologies for working with encrypted data efficiently and conveniently. In particular, it will enable searching on encrypted data, which is prevented by currently deployed encryption, and running arbitrary programs efficiently on encrypted data.
group_project
Submitted by Stefano Tessaro on Wed, 08/07/2019 - 5:45pm
Cryptography provides the basic tools to guarantee confidentiality and integrity of data. It hence plays a pivotal role in securing our digital infrastructure, and in enforcing the right for privacy of individuals. The development of secure cryptographic techniques is however difficult and error-prone, as unknown attack strategies need to be taken into account. To overcome this, modern cryptography advocates the paradigm of provable security, where threat models are precisely formalized using the language of mathematics, and the security of cryptosystems is proved within these models.
group_project
Submitted by David Cash on Wed, 08/07/2019 - 5:39pm
Continuing major breaches and security compromises of computer systems motivate a promising new approach to data protection: encrypt the data so that even if stolen, it will be useless to the attacker, yet reveal just enough information about the data so that commodity systems such as databases and Web servers can still operate on it. This is called property-revealing encryption (PRE), and has already found its way to academic and commercial products that protect sensitive data in cloud services.
group_project
Submitted by Susan Landau on Wed, 08/07/2019 - 3:55pm
Communications metadata is necessary for the delivery of services. But such metadata leaks information about user intent and behavior. Through timing, for example, one can determine whether a Twitter account is a bot, while through packet length, what language is being spoken in an encrypted Voice Over Internet Protocol (VoIP) call. Thus, protecting a user's privacy and security is complicated. By examining multiple different sets of metadata usage, this EAGER seeks to develop a categorization of the types of information that metadata reveals.
group_project
Submitted by Vishal Patel on Wed, 08/07/2019 - 3:52pm
Many physical characteristics, such as face, fingerprints, and iris as well as behavioral characteristics such as voice, gait, and keystroke dynamics, are believed to be unique to an individual. Hence, biometric analysis offers a reliable solution to the problem of identity verification. It is now widely acknowledged that biometric systems are vulnerable to manipulation where the true biometric is falsified using various attack strategies; such attacks are referred to as Presentation Attacks (PAs).
group_project
Submitted by Attila Yavuz on Wed, 08/07/2019 - 3:48pm
Internet of Things (IoT) is a heterogeneous system comprising interrelated smart-objects, sensors and actuators. IoT systems are expected to ultimately usher significant advances in critical domains such as transportation, energy, and healthcare. Due to IoTs' pervasiveness and impact on the cyber-physical world, it is a vital requirement to guarantee their security. In particular, authentication is one of the most fundamental security services required for any viable IoT, since it is necessary to establish trust and secure the communication among parties in a network.