Division of Computing and Communication Foundations (CCF)
group_project
Submitted by Matthieu Bloch on Wed, 02/07/2018 - 11:42pm
As communication networks play an increasingly vital role in our society, ensuring the confidentiality of information transmission and storage has become an increasing concern. New classes of networks, such as heterogeneous wireless networks and distributed storage networks, are emerging, in which the deployment of off-the-shelf cryptographic solutions faces several limitations.
group_project
Submitted by Ming_Li on Wed, 02/07/2018 - 11:27pm
Mobile devices, including smartphones and tablets, are becoming extremely prevalent nowadays. Equipped with diverse sensors, from GPS to camera, and paired with the inherent mobility of their owners, mobile devices are capable of acquiring rich information of surrounding environment. However, the wide adoption of mobile crowd sensing is largely hindered by its privacy concerns.
group_project
Submitted by Sennur Ulukus on Wed, 02/07/2018 - 7:55pm
In today's communication networks, most data flow through wireless links which are particularly vulnerable to eavesdropping attacks. While currently available cryptographic algorithms provide useful protection against computationally limited eavesdroppers, the ever-increasing computational power of adversaries necessitates techniques that provide stronger forms of security guarantees. Information-theoretic physical layer security provides unconditional security guarantees that are valid even against computationally unlimited adversaries.
group_project
Submitted by Salim El Rouayheb on Wed, 02/07/2018 - 6:44pm
The recent data revolution is driving many aspects of modern societal and economic progress. Most of this massive data is now stored in the cloud to enable easy access for a myriad of users who wish to share information including, for example, photos, videos, publications, opinions, and scientific data. Unfortunately, this has come at the expense of the user's privacy whose online activity can be used to profile him/her, making large parts of the population an easy target for discrimination and possible persecution.
group_project
Submitted by Atanas Rountev on Wed, 02/07/2018 - 5:20pm
In recent years the growth in the number of computing devices has been driven primarily by smartphones and tablets. For such devices, Android is the dominant platform. The correctness, security, and performance of Android devices is of paramount importance for many millions of users. However, the scientific foundations for software analysis, verification, and transformation in this area are still very inadequate. The proposed work will significantly advance the state of the art in software analysis for Android.
group_project
Submitted by Zeev Dvir on Wed, 02/07/2018 - 5:15pm
In recent years the growth in the number of computing devices has been driven primarily by smartphones and tablets. For such devices, Android is the dominant platform. The correctness, security, and performance of Android devices is of paramount importance for many millions of users. However, the scientific foundations for software analysis, verification, and transformation in this area are still very inadequate. The proposed work will significantly advance the state of the art in software analysis for Android.
group_project
Submitted by Ranjit Jhala on Wed, 02/07/2018 - 4:31pm
Web applications play a crucial role in every aspect of our lives, including banking, commerce, education and healthcare and travel. Despite their importance and ubiquity, they remain notoriously hard to design, develop and deploy as they span several tiers and languages: an HTML/JavaScript client that runs on users' browsers, a central server that implements the application's logic in the "cloud" and a database that stores persistent user data. The goal of this research is to build upon recent advances in SMT-based software verification to develop reliable and secure web frameworks.
group_project
Submitted by Oliver Kosut on Tue, 02/06/2018 - 8:15pm
In contrast to the traditional data communications models in which large blocks of data are compressed, the evolving information generation, access, and storage contexts require compressing relatively smaller blocks of data asynchronously and concurrently from a large number of sources, and often, with additional security and privacy constraints. This research addresses this growing need by developing a rigorous framework for universal lossy and lossless compression algorithms in the finite blocklength regime with strong theoretical guarantees.
group_project
Submitted by pramodviswanath on Tue, 02/06/2018 - 8:08pm
Privacy is a fundamental individual right. In the era of big data, large amounts of data about individuals are collected both voluntarily (e.g., frequent flier/shopper incentives) and involuntarily (e.g. US Census or medical records).
group_project
Submitted by Dennis Goeckel on Tue, 02/06/2018 - 8:03pm
This project develops techniques to provide information-theoretic secrecy for messages transmitted in a wireless communication system for the challenging scenario where an eavesdropper receives a stronger signal than the desired recipient: for example, the eavesdropper might be significantly closer to the transmitter than the intended receiver. The approach considered in this project starts with the transmitter and intended receiver sharing an ephemeral cryptographic key, which the transmitter then employs to intentionally distort the transmitted signal.