Division of Computing and Communication Foundations (CCF)

group_project

Visible to the public CIF: Small: Collaborative Research:Towards more Secure Systems: Uniformization for Secrecy

As communication networks play an increasingly vital role in our society, ensuring the confidentiality of information transmission and storage has become an increasing concern. New classes of networks, such as heterogeneous wireless networks and distributed storage networks, are emerging, in which the deployment of off-the-shelf cryptographic solutions faces several limitations.

group_project

Visible to the public CIF: Small: Alignment for Secrecy: One-Time-Pads in the Air without Keys

Mobile devices, including smartphones and tablets, are becoming extremely prevalent nowadays. Equipped with diverse sensors, from GPS to camera, and paired with the inherent mobility of their owners, mobile devices are capable of acquiring rich information of surrounding environment. However, the wide adoption of mobile crowd sensing is largely hindered by its privacy concerns.

group_project

Visible to the public  CIF: Small: Alignment for Secrecy: One-Time-Pads in the Air without Keys

In today's communication networks, most data flow through wireless links which are particularly vulnerable to eavesdropping attacks. While currently available cryptographic algorithms provide useful protection against computationally limited eavesdroppers, the ever-increasing computational power of adversaries necessitates techniques that provide stronger forms of security guarantees. Information-theoretic physical layer security provides unconditional security guarantees that are valid even against computationally unlimited adversaries.

group_project

Visible to the public CAREER:Information Theoretic Methods for Private Information Retrieval and Search in Distributed Storage Systems

The recent data revolution is driving many aspects of modern societal and economic progress. Most of this massive data is now stored in the cloud to enable easy access for a myriad of users who wish to share information including, for example, photos, videos, publications, opinions, and scientific data. Unfortunately, this has come at the expense of the user's privacy whose online activity can be used to profile him/her, making large parts of the population an easy target for discrimination and possible persecution.

group_project

Visible to the public  SHF: Small: Control-Flow and Data-Flow Analysis of Android Software: Foundations and Applications

In recent years the growth in the number of computing devices has been driven primarily by smartphones and tablets. For such devices, Android is the dominant platform. The correctness, security, and performance of Android devices is of paramount importance for many millions of users. However, the scientific foundations for software analysis, verification, and transformation in this area are still very inadequate. The proposed work will significantly advance the state of the art in software analysis for Android.

group_project

Visible to the public AF: Small: New Techniques for Private Information Retrieval and Locally Decodable Codes

In recent years the growth in the number of computing devices has been driven primarily by smartphones and tablets. For such devices, Android is the dominant platform. The correctness, security, and performance of Android devices is of paramount importance for many millions of users. However, the scientific foundations for software analysis, verification, and transformation in this area are still very inadequate. The proposed work will significantly advance the state of the art in software analysis for Android.

group_project

Visible to the public SHF: Small: Refinement Types For Verified Web Frameworks and Applications

Web applications play a crucial role in every aspect of our lives, including banking, commerce, education and healthcare and travel. Despite their importance and ubiquity, they remain notoriously hard to design, develop and deploy as they span several tiers and languages: an HTML/JavaScript client that runs on users' browsers, a central server that implements the application's logic in the "cloud" and a database that stores persistent user data. The goal of this research is to build upon recent advances in SMT-based software verification to develop reliable and secure web frameworks.

group_project

Visible to the public CIF: Small: A Framework for Low Latency Universal Compression with Privacy Guarantees

In contrast to the traditional data communications models in which large blocks of data are compressed, the evolving information generation, access, and storage contexts require compressing relatively smaller blocks of data asynchronously and concurrently from a large number of sources, and often, with additional security and privacy constraints. This research addresses this growing need by developing a rigorous framework for universal lossy and lossless compression algorithms in the finite blocklength regime with strong theoretical guarantees.

group_project

Visible to the public  CIF: Small: Statistical Data Privacy: Fundamental Limits and Efficient Algorithms

Privacy is a fundamental individual right. In the era of big data, large amounts of data about individuals are collected both voluntarily (e.g., frequent flier/shopper incentives) and involuntarily (e.g. US Census or medical records).

group_project

Visible to the public CIF: Small: Everlasting Security for Disadvantaged Wireless Communications

This project develops techniques to provide information-theoretic secrecy for messages transmitted in a wireless communication system for the challenging scenario where an eavesdropper receives a stronger signal than the desired recipient: for example, the eavesdropper might be significantly closer to the transmitter than the intended receiver. The approach considered in this project starts with the transmitter and intended receiver sharing an ephemeral cryptographic key, which the transmitter then employs to intentionally distort the transmitted signal.