Software

group_project

Visible to the public SBE: Small: An Analysis of the Relationship Between Cyberaggression and Self-Disclosure among Diverse Youths

Youths of the digital age live parallel lives online and in the real world, frequently disclosing personal information to cyberfriends and strangers, regardless of race, class or gender. Race and gender do make a difference, however, when these online disclosures lead to acts of cyberaggression. The PIs' previous work revealed that some youths are resistant to cyberaggression and that there are differences in perceptions of cyberbullying among youths from different cultural and racial backgrounds.

group_project

Visible to the public EDU: Motivating and Reaching University Students and Professionals with Software Security Education

This project involves the development and delivery of software security education to university students and professionals, and the dissemination of curricular materials to educators to enable effective security education throughout their courses. A large intentionally vulnerable electronic health record (EHR) application with associated artifacts to support the lessons is provided to all student and educators.

group_project

Visible to the public EAGER: Improving Protocol Vulnerability Discovery via Semantic Interpretation of Textual Specifications

Two methods used for vulnerability discovery in network protocols are testing and a semi-automated technique called model checking. Testing and model checking implementations of network protocols is a tedious and time-consuming task, where significant manual effort goes into designing test cases and protocol property specifications. Both approaches require detailed and structured information about the tested protocols, in the form of messages, state machine, invariants, etc. Most of the time this information is derived manually by people with different levels of expertise.

group_project

Visible to the public CRII: SaTC: Towards Non-Intrusive Detection of Resilient Mobile Malware and Botnet using Application Traffic Measurement

The development of the mobile Internet economy has brought numerous benefits to people and society, with the promise of providing ubiquitous computing and communications. Mobile devices have penetrated almost every aspect of our lives and, as a result, are storing a large amount of personal data.

group_project

Visible to the public CRII: SaTC: Efficient Secure Multiparty Computation of Large-Scale, Complex Protocols

Many challenging real world problems, e.g., voting and blind auction, require computation over sensitive data supplied by multiple mutually-distrustful entities. Elegant cryptographic theories have been developed to solve these problems without relying on a mutually-trusted third party. Practitioners also built prototypes capable of securely computing set intersection, AES encryption, Hamming distance, etc. However, many other applications, such as data mining and running universal machines, are far more complex than what can be supported by the state-of-the-art techniques.

group_project

Visible to the public CRII: SaTC: A Language Based Approach to Hybrid Mobile App Security

The last few years have seen an explosive growth in the share of hybrid mobile apps worldwide, coinciding with the increasing ubiquity of HTML5. Hybrid app frameworks allow mobile developers to design app code using web technologies alone, and supply native and bridge code (APIs for accessing device resources) necessary for instant porting to several mobile platforms.

group_project

Visible to the public CI-EN: Trust-Hub: Development of Benchmarks, Metrics, and Validation Platforms for Hardware Security, and a Web-based Dissemination Portal

The growing hardware security community is faced with an immediate need to develop effective tools and benchmarks. The purpose of this project is to lead a community-wide movement toward stronger assurances in our integrated circuits, computational platforms, and electronics supply chain.

group_project

Visible to the public SaTC-EDU: EAGER: CFEAR: Cyber Forensics Education via Augmented Reality

Creative educational and research programs need to be developed that will inspire young adults (also known as millennials) to pursue critical skills needed to drive our cybersecurity and STEM future and close the ever increasing cybersecurity talent gap. In this regard, educators and researchers must develop innovative curriculum incorporating emerging technologies, in addition to the theoretical content, to help cultivate and retain a highly skilled cybersecurity workforce.

group_project

Visible to the public TWC: Frontier: Collaborative: CORe: Center for Encrypted Functionalities

The Center for Encrypted Functionalities (CORE) tackles the deep and far-reaching problem of general-purpose "program obfuscation," which aims to enhance cybersecurity by making an arbitrary computer program unintelligible while preserving its functionality.

group_project

Visible to the public CAREER: Safety and security for next-generation world-scale real-time medical systems

Interoperable, reconfigurable systems of medical devices are the future of medical technology. They will improve care outcomes by catching common mistakes, reduce clinician cognitive workload by suppressing false alarms, and streamline and simplify continued care, especially when patients move between different medical facilities. As the penetration of "smart" networked medical technology increases, we will see increased problems with cybersecurity of such systems.