Authentication

group_project

Visible to the public TWC: Frontier: Collaborative: Rethinking Security in the Era of Cloud Computing

There are at least two key features of the move to cloud computing that introduce the opportunity for significant leaps forward in computer security for tenant services. First, a compute cloud provides a common software, hardware and management basis for rolling out cross-cutting services en masse that have resisted incremental deployment in a one-service-at-a-time fashion. Second, compute clouds offer providers a broad view of activity across an unprecedented diversity of tenant services.

group_project

Visible to the public SaTC: STARSS: Hardware Authentication through High-Capacity PUF-Based Secret Key Generation and Lattice Coding

Hardware authentication is one of the critical needs in the emerging discipline of design for assurance and design for security. It is concerned with establishing the authenticity and provenance of Integrated Circuits (ICs) reliably and inexpensively at any point in a chip's life-time. Physical unclonable functions (PUFs) have significant promise as basic primitives for authentication since they can serve as intrinsically-generated hardware roots-of-trust within specific authentication protocols.

group_project

Visible to the public TWC: Medium: Collaborative: Privacy-Preserving Distributed Storage and Computation

This project aims at developing efficient methods for protecting the privacy of computations on outsourced data in distributed settings. The project addresses the design of an outsourced storage framework where the access pattern observed by the storage server gives no information about the actual data accessed by the client and cannot be correlated with external events. For example, the server cannot determine whether a certain item was previously accessed by the client or whether a certain algorithm is being executed.

group_project

Visible to the public CRII: SaTC: Camera-based mobile device end-user authentication

Secure and useable end-user authentication is a major challenge in a modern society that allocates and relocates more and more resources online. As many users nowadays carry a mobile device (e.g., a smartphone), authentication approaches beyond the often-criticized traditional password leverage auxiliary information that can be received by, displayed on, computed by or sent from these omnipresent personal companions.

group_project

Visible to the public CAREER: A Pathway towards Channel Camouflage and Manipulation Techniques for Wireless Security

Wireless channel exhibits the spatial uncorrelation property, i.e., the characteristic of a wireless channel becomes uncorrelated every half carrier wavelength over distance. This property fertilizes an emerging research area that utilizes wireless channel characteristics to authenticate a wireless transmitter.

group_project

Visible to the public CAREER: Scaling Forensic Algorithms for Big Data and Adversarial Environments

Forged digital images or video can threaten reputations or impede criminal justice, due to falsified evidence. Over the past decade, researchers have developed a new class of security techniques known as 'multimedia forensics' to determine the origin and authenticity of multimedia information, such as potentially falsified images or videos. However, the proliferation of smartphones and the rise of social media have led to an overwhelming increase in the volume of multimedia information that must be forensically authenticated.