Usability

group_project

Visible to the public TWC SBE: TTP Option: Medium: Collaborative: EPICA: Empowering People to Overcome Information Controls and Attacks

This project studies the security of representative personalized services, such as search engines, news aggregators, and on-line targeted advertising, and identifies vulnerabilities in service components that can be exploited by pollution attacks to deliver contents intended by attackers.

group_project

Visible to the public EAGER: Exploring Spear-Phishing: A Socio-Technical Experimental Framework

A safe and productive society increasingly depends on a safe and trustworthy cyberspace. However, extensive research has repeatedly shown that the human factor is often the weakest part in cyberspace, and that users of information systems are often exposed to great risks when they respond to credible-looking emails. Thus, spear phishing attacks - which attempt to get personal or confidential information from users through well-targeted deceptive emails - represent a particularly severe security threat.

group_project

Visible to the public TWC SBE: Option: Frontier: Collaborative: Towards Effective Web Privacy Notice and Choice: A Multi-Disciplinary Prospective

Natural language privacy policies have become a de facto standard to address expectations of notice and choice on the Web. Yet, there is ample evidence that users generally do not read these policies and that those who occasionally do struggle to understand what they read. Initiatives aimed at addressing this problem through the development of machine implementable standards or other solutions that require website operators to adhere to more stringent requirements have run into obstacles, with many website operators showing reluctance to commit to anything more than what they currently do.

group_project

Visible to the public TWC: Small: Middleware for Certificate-Based Authentication

Every time someone uses a phone or computer to connect to an Internet site, software determines whether the connection is safe or being intercepted by attackers. Unfortunately, this software is error-prone, leaving users vulnerable to having their privacy violated or their personal information stolen due to phishing attacks, identity theft, and unauthorized inspection of their encrypted traffic. A number of solutions are being proposed, but the software is fragmented across many platforms and redundantly or incorrectly implemented.

group_project

Visible to the public GREPSEC II: Underrepresented Groups in Security Research

This proposal provides funding for the second GREPSEC: Underrepresented Groups in Security Research workshop, which will be affiliated with the annual IEEE Symposium on Research in Security & Privacy, in May 2015, in San Jose CA. The first event, held in May 2013, attracted 50 participants, two-thirds of them students, and almost all from underrepresented groups.

group_project

Visible to the public EAGER: Neurobiological Basis of Decision Making in Online Environments

Considerable research in the field has been focused on developing new technologies to enhance privacy; encryption of personal data is often presented as a potential solution. Many of the technologies resulting from this research are not being effectively utilized because of issues rooted in human judgment under risk and uncertainty. The majority of existing models and products related to human judgement are based on a limited number of documented incidents and on questionable assumptions about user intent and behavior.

group_project

Visible to the public  EAGER: The Role of Emotion in Risk Communication and Warning: Application to Risks of Failures to Update Software

End-users' online behavior can significantly affect the reliability and security of next-generation software systems. For instance, skipping repeated requests to update software or ignoring security warnings while visiting unknown websites, while extremely dangerous, are not uncommon. Although end-users' actions (or inactions) often open up the opportunity for cyber-attacks, the lack of emotional appeals and poor design of the current software update/warning messages are to blame to a large extent for such risky behavior, which is addressed as follows.

group_project

Visible to the public TWC: TTP Option: Small: Differential Introspective Side Channels --- Discovery, Analysis, and Defense

Side channels in the security domain are known to be challenging to discover and eliminate systematically. Nevertheless, they can lead to a variety of stealthy attacks seriously compromising cybersecurity. This work focuses on an important class of side channels that are fundamental to the operations of networked systems.

group_project

Visible to the public  EDU: Enhancing Cybersecurity Education for Native Students Using Virtual Laboratories

This proposal will develop an educational link between the Yakama Nation and the University of Washington at Bothell to enhance Cybersecurity education for Native students using virtual laboratories. The laboratories will use scenarios to provide hands-on experience in the practical aspects of Cybersecurity. The project will use a new approach to Cybersecurity education that focuses on established success indicators for Native students. The project will focus on an educational design that appeals to the students in areas that are defined as key indicators of academic success.

group_project

Visible to the public TWC: Small: Discovering and Restricting Undesirable Information Flows Between Multiple Spheres of Activities

Loss of personal data or leakage of corporate data via apps on mobile devices poses a significant risk to users. It can have both a huge personal and financial cost. This work is designing new novel techniques to help reduce the risks for end-users who use a single device for multiple spheres of activity. Getting security right when a single device is used for multiple spheres of activity is a major research challenge, with unforeseen information flows between various subsystems that are currently difficult to control.