Scalability and Composability
biblio
Submitted by willirn1 on Mon, 03/07/2022 - 1:39pm
biblio
Submitted by Heather Lucas on Tue, 03/31/2020 - 10:29am
group_project
Submitted by Claire Tomlin on Thu, 01/16/2020 - 11:37am
group_project
Submitted by Warren Alexander on Mon, 03/19/2018 - 9:08pm
Cyber-Physical Systems (CPS)--cars, airplanes, power plants, and etc.--are increasingly dependent on powerful and complex hardware for higher intelligence and functionalities. However, this complex hardware may also introduce new attack vectors--hardware side-channels--which can be exploited by attackers to steal sensitive information, to disrupt timing of time critical functions that interact with the physical plants, or to break memory protection mechanisms in modern computers.
group_project
Submitted by Warren Alexander on Mon, 03/19/2018 - 9:07pm
Remote attestation provides a run-time capability for appraising system behavior and establishing trust. Using remote attestation, an appraiser requests evidence describing a target. The target responds by performing measurement to gather evidence then adds cryptographic signatures to assure integrity and authenticity. The appraiser takes the evidence and assesses the target's behavior to determine if the target is who and what it claims to be.
group_project
Submitted by Warren Alexander on Mon, 03/19/2018 - 9:06pm
The key to realizing the smart functionalities envisioned through the Internet of Things (IoT) is to securely and efficiently communicate, store, and make sense of the tremendous data generated by IoT devices. Therefore, integrating IoT with the cloud platform for its computing and big data analysis capabilities becomes increasingly important, since IoT devices are computational units with strict performance and energy constraints. However, when data is transferred among interconnected devices or to the cloud, new security and privacy issues arise.
group_project
Submitted by scherlis on Sun, 03/18/2018 - 10:24pm
This project considers models for secure collaboration and contracts in a decentralized environment among parties that have not established trust. A significant example of this is blockchain programming, with platforms such as Ethereum and HyperLedger.
group_project
Submitted by awhitesell on Mon, 11/14/2016 - 4:32pm
Anonymity is a basic right and a core aspect of Internet. Recently, there has been tremendous interest in anonymity and privacy in social networks, motivated by the natural desire to share one's opinions without the fear of judgment or personal reprisal (by parents, authorities, and the public). We propose to study the fundamental questions associated with building such a semi-distributed, anonymous messaging platform, which aims to keep anonymous the identity of the source who initially posted a message as well as the identity of the relays who approved and propagated the message.
group_project
Submitted by mitras on Thu, 10/23/2014 - 12:31pm
Well-intentioned human users continually circumvent security controls. The pandemic/ubiquitous fact of this circumvention undermines the effectiveness of security designs that implicitly assume circumvention never happens. We seek to develop metrics to enable security engineers and other stakeholders to make meaningful, quantifiable comparisons, decisions, and evaluations of proposed security controls in light of what really happens when these controls are deployed.
group_project
Submitted by Matt Caesar on Thu, 10/23/2014 - 12:29pm
This project develops a scientific approach to testing hypotheses about network security when those tests must consider layers of complex interacting policies within the network stack. The work is motivated by observation that the infrastructure of large networks is hideously complex, and so is vulnerable to various attacks on services and data. Coping with these vulnerabilities consumes significant human management time, just trying to understand the network's behavior.