Division of Computer and Network Systems (CNS)

group_project

Visible to the public EAGER: SaTC: Early-Stage Interdisciplinary Collaboration: Collaborative: Advances in Socio-Algorithmic Information Diversity

Social media now play an important role in exposing people to information about a wide range of topics ranging from entertainment to hard news and political debate. What can be seen on these platforms is heavily influenced by algorithms that are designed to select the most engaging and relevant content for each user. By seeking to maximize engagement, these algorithms may inadvertently amplify factually dubious or poor quality information that reinforces users' existing beliefs. In doing so, these algorithms could reduce the diversity of information to which users are exposed.

group_project

Visible to the public CAREER: FormalDP: Formally Verified, Private, Accurate and Efficient Data Analysis

Data-driven technology is having an impressive impact on society but privacy concerns restrict the way data can be used and released. Differential privacy has emerged as a leading notion supporting efficient and accurate data analyses that respect privacy. But designing and implementing efficient differentially private data analyses with high utility can be challenging and error prone. Even privacy experts have released code with bugs or designed incorrect algorithms.

group_project

Visible to the public EAGER: SaTC: Early-Stage Interdisciplinary Collaboration: Collaborative: Advances in Socio-Algorithmic Information Diversity

Social media now play an important role in exposing people to information about a wide range of topics ranging from entertainment to hard news and political debate. What can be seen on these platforms is heavily influenced by algorithms that are designed to select the most engaging and relevant content for each user. By seeking to maximize engagement, these algorithms may inadvertently amplify factually dubious or poor quality information that reinforces users' existing beliefs. In doing so, these algorithms could reduce the diversity of information to which users are exposed.

group_project

Visible to the public EAGER: SaTC: Early-Stage Interdisciplinary Collaboration: Privacy-Preserving Mobile Data Collection for Social and Behavioral Research

Social and behavioral research has a long history of collecting digitized data. With more and more studies incorporating participants' smartphone sensor and usage data, individual privacy has become a serious concern. Although researchers are trained to exercise confidentiality, sensitive information can be inferred from the smartphone data about the participants and their environment (e.g., families and communities). Without a systematic solution to address privacy concerns, participants may withdraw and request removal of their data from studies.

group_project

Visible to the public CAREER: Securing Cyberspace: Gaining Deep Insights into the Online Underground Ecosystem

As the Internet becomes increasingly ubiquitous, it offers a low-risk harbor for cybercrime -- illegal activities such as hacking and online scams. Cybercrime is increasingly enabled by an online underground ecosystem, within which are anonymous forums and so-called dark web platforms for cybercriminals to exchange knowledge and trade in illicit products and services.

group_project

Visible to the public CAREER: Amplifying Developer-Written Tests for Code Injection Vulnerability Detection

Code injection vulnerabilities are a class of security vulnerabilities that have been exploited increasingly often, including in the high-profile 2017 Equifax breach as well as in many recent attacks on our country's election and financial systems. These vulnerabilities are very tricky to detect, and there are no existing automated techniques to protect critical software from being released with these dangerous flaws. This project is developing new and transformative approaches for detecting code injection vulnerabilities in complex, large-scale systems.

group_project

Visible to the public EAGER: SaTC: Early-Stage Interdisciplinary Collaboration: Collaborative: A Sociotechnical Metrics Framework for Network and Security Operations Centers

Network and Security Operations Centers (SOCs) are central components of modern enterprise networks. SOCs manage network operations, defend against cyber threats, and maintain regulatory compliance. Typically, management and SOC operators use monitoring software and metrics, such as open and closed tickets, to manage SOC efficiency. These metrics may fail to represent the real effectiveness of the SOC and the security posture of the network.

group_project

Visible to the public EAGER: SaTC: Early-Stage Interdisciplinary Collaboration: Collaborative: A Sociotechnical Metrics Framework for Network and Security Operations Centers

Network and Security Operations Centers (SOCs) are central components of modern enterprise networks. SOCs manage network operations, defend against cyber threats, and maintain regulatory compliance. Typically, management and SOC operators use monitoring software and metrics, such as open and closed tickets, to manage SOC efficiency. These metrics may fail to represent the real effectiveness of the SOC and the security posture of the network.

group_project

Visible to the public CRII: SaTC: Multi-User Authentication and Access Control in the Internet of Things

Computing is transitioning from single-user devices, such as laptops and phones, to the Internet of Things (IoT), in which numerous users interact with a particular device, such as an Amazon Echo or Internet-connected door lock. The desired level of access to particular capabilities, such as ordering items using a shared voice assistant, likely differs across members of a household (e.g., children and parents).

group_project

Visible to the public CRII: SaTC: Democratizing Differential Privacy via Algorithms for Hybrid Models

Individuals generate enormous amounts of personal data that are subsequently collected and stored by organizations and governments. The data powers many innovative applications in areas such as web services, health care, and transportation, but they also increase privacy risks. Differential privacy, a framework to rigorously reason about privacy properties of algorithms, holds tremendous promise for enabling privacy-preserving yet useful data analyses. However, its adoption has been limited to entities with massive user bases.