Division of Computer and Network Systems (CNS)
group_project
Submitted by Manuel Egele on Wed, 08/07/2019 - 12:59pm
Modern computing systems are under constant attack by organized crime syndicates, nation-state adversaries, and regular cyber-criminals alike. Among the most damaging attacks are those that exploit so-called memory corruption vulnerabilities which often confer the attacker with access to sensitive information or allow the attacker to execute arbitrary code on the victim's machine. To counter the threat posed by memory corruption vulnerabilities, this project will research and develop new defensive capabilities realized through the joint design of hardware and software.
group_project
Submitted by Kevin Steinmetz on Wed, 08/07/2019 - 12:52pm
Numerous challenges confront law enforcement investigations and prosecutions of cybercrime offenses, including under-reporting by victims, jurisdictional conflicts and limitations, insufficient resources, training, and expertise, as well as organizational constraints. This research is a study of cybercrime investigators, their departments, and the challenges they face in fighting cybercrime. The research consists of social scientific research on how law enforcement investigators and their units conduct cybercrime investigations.
group_project
Submitted by Brian Schaefer on Wed, 08/07/2019 - 12:31pm
Numerous challenges confront law enforcement investigations and prosecutions of cybercrime offenses, including under-reporting by victims, jurisdictional conflicts and limitations, insufficient resources, training, and expertise, as well as organizational constraints. This research is a study of cybercrime investigators, their departments, and the challenges they face in fighting cybercrime. The research consists of social scientific research on how law enforcement investigators and their units conduct cybercrime investigations.
group_project
Submitted by Damon McCoy on Wed, 08/07/2019 - 12:12pm
This research has a foundational, multi-disciplinary research agenda that examines the role of technology in intimate partner violence and investigates the development of new tools, techniques, and theories to combat technology-enabled abuse. The work is important because digital technologies play an increasingly prominent role in domestic violence, stalking, and surveillance by abusive partners and others known to the victim. The research builds on prior work detailing the ways in which abusers exploit technology to monitor, harass, track, and control victims.
group_project
Submitted by Nicola Dell on Wed, 08/07/2019 - 12:09pm
This research has a foundational, multi-disciplinary research agenda that examines the role of technology in intimate partner violence and investigates the development of new tools, techniques, and theories to combat technology-enabled abuse. The work is important because digital technologies play an increasingly prominent role in domestic violence, stalking, and surveillance by abusive partners and others known to the victim. The research builds on prior work detailing the ways in which abusers exploit technology to monitor, harass, track, and control victims.
group_project
Submitted by Nabil Alshurafa on Wed, 08/07/2019 - 11:56am
This project is designed to advance research on problematic eating behavior. The project investigates wearable sensors to measure eating behavior and developing models of behavior that comprise multiple observable behaviors such as eating alone or with friends, or chewing speed. These data can help scientists improve upon current traditional methods such as self-reported eating diaries, which tend to be inconsistent, sparse, and rarely timely. We capture human behavior using a custom wearable augmented camera. Wearable cameras provide rich data, but raise privacy concerns.
group_project
Submitted by Hoda Mehrpouyan on Wed, 08/07/2019 - 11:42am
The goal of the project is to develop a multi-layer security framework to provide control technicians and engineers with far superior mechanisms to address the increasing risk of cybersecurity attack on vulnerable water treatment plants and reduce latent risks to public health and safety, industry, and national security. The findings will generate knowledge base and forensic tools to help control engineers to quickly detect and mitigate potential security flaws in central components across control systems, including industrial control software, sensors, and actuators.
group_project
Submitted by Jean-Francois Biasse on Wed, 08/07/2019 - 11:40am
This project involves research into the computational hardness of the search for short elements of the so-called Euclidean lattices. The hardness of this task is the measure of the security of one of the most promising family of cryptographic protocols that are conjectured to resist attacks from quantum computers. The transition toward such protocols is an immediate priority for the cryptography community. Indeed, quantum-safe primitives will need to be ready and deployed long before the construction of large scale quantum computers to account for the shelf life of encrypted data.
group_project
Submitted by cmartens on Wed, 08/07/2019 - 11:36am
Data collection and analysis enable great advancements in digital technology, but the stewards of this data have a responsibility to society to ensure that the practices of collection, storage, and user control abide by user expectations. Policies and regulations governing data privacy play a critical role in communicating privacy expectations to users and defining the bounds of permissible data use. However, in practice, there are severe mismatches between user expectations and the actual practices of software companies, even when those practices conform with their privacy policies.
group_project
Submitted by Suman Jana on Wed, 08/07/2019 - 11:33am
Fuzzing is an automated software testing technique that involves feeding a stream of invalid, unexpected, or rare data as inputs to a computer program for discovering bugs leading to crashes, assertion failures, or memory corruption. Fuzzing is the de facto standard technique for finding software vulnerabilities. However, despite their tremendous promise, popular fuzzers, especially for large programs, often tend to get stuck trying redundant test inputs and struggle to find security vulnerabilities hidden deep into the program logic.