Standard

group_project

Visible to the public Standard Grant: Ethical Algorithms in Autonomous Vehicles

This project supports a team of researchers, including experts in moral philosophy and transportation engineering, who plan to address ethical issues that arise in the development of computer algorithms for autonomous (self-driving) vehicles. The project will address concerns over the expression of ethical values in self-driving vehicle when (for example) the vehicle detects an imminent and unavoidable crash and must select among navigation options, such as colliding with a crowded bus or with a lone motorcyclist.

group_project

Visible to the public GREPSEC II: Underrepresented Groups in Security Research

This proposal provides funding for the second GREPSEC: Underrepresented Groups in Security Research workshop, which will be affiliated with the annual IEEE Symposium on Research in Security & Privacy, in May 2015, in San Jose CA. The first event, held in May 2013, attracted 50 participants, two-thirds of them students, and almost all from underrepresented groups.

group_project

Visible to the public  Secure Execution Partition (SEP) for Remote Voting

Voting is the most fundamental act of participation in our democracy, yet voting technology has suffered diverse failures and crises. Voting is a remarkably hard, interdisciplinary problem, with seemingly conflicting goals of verifying ballots while maintaining secret ballots to safeguard against bribery and coercion. This project is producing innovative and fundamental computer security technologies supporting remote and kiosk voting scenarios, i.e. high assurance applications on un-trusted hardware/software.

group_project

Visible to the public Virtual Laboratory and Curriculum Development for Secure Mobile Computing

The "Virtual Laboratory and Curriculum Development for Secure Mobile Computing" project at the University of Texas at Dallas (UTD) will develop a set of courses and a virtual laboratory in mobile system security with an emphasis on securing smart phones. The courses that will be developed will include topics such as Android taint analysis using existing tools or development of new tools, scalable Android security threat analysis on applications (apps), and smart phone forensics.

group_project

Visible to the public TWC: Small: Techniques and Tools for General-Purpose Secure Computing and Outsourcing

The rapid advancement of techniques for secure computation on protected data offers a major incentive for development of tools for general-purpose secure computation that protects data privacy, as opposed to computation of specialized tasks. The recent emergence of cloud computing and the need to protect privacy of sensitive data used in outsourced computation serves as another major motivation for this work. With this in mind, this project targets at developing a compiler suitable for privacy-preserving execution of any functionality specified by a user program.

group_project

Visible to the public Spreading SEEDs: Large-Scale Dissemination of Hands-on Labs for Security Education

This capacity building project seeks to addresses the lack of opportunities for students for experiential learning of Cybersecurity. Although there is no overall shortage of labs anymore, many instructors do not feel comfortable using them in their courses. This project has a potential to help many instructors to provide hands-on learning opportunities to their students. The project is based on the 30 SEED labs, which were developed and tested by the PI over the last ten years and are used by over 150 instructors from 26 countries.

group_project

Visible to the public SaTC: Small: New Challenges in Functional Encryption

Recent trends in computing have prompted users and organizations to store an increasingly large amount of sensitive data at third party locations in the cloud outside of their direct control. In order to protect this data, it needs to be encrypted. However, traditional encryption systems lack the expressiveness needed for most applications involving big and complex data.

group_project

Visible to the public SaTC: Collaborative: Exploiting Spintronics for Security, Trust and Authentication

The Complementary Metal Oxide Semiconductor (CMOS) based security primitives typically suffer from area/power overhead, sensitivity to environmental fluctuations and limited randomness and entropy offered by Silicon substrate. Spintronic circuits can complement the existing CMOS based security and trust infrastructures. This project explores ways to uncover the security specific properties of the magnetic nanowire and capture them in detailed circuit model.

group_project

Visible to the public SaTC: Collaborative: Exploiting Spintronics for Security, Trust and Authentication

The Complementary Metal Oxide Semiconductor (CMOS) based security primitives typically suffer from area/power overhead, sensitivity to environmental fluctuations and limited randomness and entropy offered by Silicon substrate. Spintronic circuits can complement the existing CMOS based security and trust infrastructures. This project explores ways to uncover the security specific properties of the magnetic nanowire and capture them in detailed circuit model.

group_project

Visible to the public EAGER: An Investigation of the Propagation of Error-Resistant and Error-Prone Messages Over Large-Scale Information Networks

This project seeks to understand how inaccurate messages are propagated over large-scale information networks that are consumed by the general public, how the public responds to such inaccuracy, and what content- or metadata-related characteristics/features make certain messages more error-resistant or error-prone than others. The results of the project have the potential to help build a platform that accurately identifies errors being propagated on an information network and effectively manages/controls such error propagation.