CRII

group_project

Visible to the public CRII: SaTC: Multi-User Authentication and Access Control in the Internet of Things

Computing is transitioning from single-user devices, such as laptops and phones, to the Internet of Things (IoT), in which numerous users interact with a particular device, such as an Amazon Echo or Internet-connected door lock. The desired level of access to particular capabilities, such as ordering items using a shared voice assistant, likely differs across members of a household (e.g., children and parents).

group_project

Visible to the public CRII: SaTC: Democratizing Differential Privacy via Algorithms for Hybrid Models

Individuals generate enormous amounts of personal data that are subsequently collected and stored by organizations and governments. The data powers many innovative applications in areas such as web services, health care, and transportation, but they also increase privacy risks. Differential privacy, a framework to rigorously reason about privacy properties of algorithms, holds tremendous promise for enabling privacy-preserving yet useful data analyses. However, its adoption has been limited to entities with massive user bases.

group_project

Visible to the public CRII: SaTC: Image Publication with Differential Privacy

The publication of image data captured by ubiquitous surveillance devices, such as traffic cameras and security surveillance cameras, would greatly benefit various communities and enable many applications. However, sharing image data with untrusted parties would raise privacy concern due to potential sensitive content, like identities and activities that may be in the images. Standard image obfuscation techniques, such as pixelation and blurring, do not provide effective privacy preservation for people or objects represented in the data.

group_project

Visible to the public CRII: SaTC: New Side-Channel Techniques in Support of Global Monitoring for Network Disruptions

The Internet's size and complexity make it difficult to understand what happens to network packets as they travel from source to destination. Internet service providers and governments sometimes interfere with users' online activities, further complicating this task. This project advances the scientific understanding of network interference detection by developing new methods to remotely measure the manipulation of Internet traffic, such as attempts to censor, tamper with, and monitor users' online activities.

group_project

Visible to the public CRII: SaTC: Enhancing Mobile App Security by Detecting Icon-Behavior Contradiction

Mobile applications (i.e., apps) are becoming critical parts in our daily life. While these apps provide better customized services using users' personal data, certain behavior of the apps is less than desirable or harmful. For example, if an app's user interface (UI) has no texts or images to indicate that it will access users' personal data (e.g., GPS data), but the app discloses users' personal data when an action is performed (e.g., pressing a button), then red flags should be raised.

group_project

Visible to the public CRII: SaTC: Robust Design-for-Security (DFS) Architecture for Enabling Trust in Integrated Circuits (IC) Manufacturing and Test

Due to the prohibitive costs of semiconductor manufacturing, most computer chip design companies outsource their production to offshore foundries. As many of these chips may be manufactured in environments of limited trust, problems of the piracy of intellectual property (IP) and the overproduction of integrated circuits (ICs) have emerged in recent years. This project focuses on designing a secure logic locking technique to enable protection against untrusted IC manufacturing. The developed solution is resistant to all known attacks.

group_project

Visible to the public CRII: SaTC: GEMINI: Guided Execution Based Mobile Advanced Persistent Threat Investigation

Advanced persistent threat (APT) campaigns are increasingly targeting mobile devices deployed across corporations, governments, and financial institutions. Unfortunately, prohibitively slow responses to even high-profile APT attacks have shown that authorities lack the capability to quickly investigate ongoing attacks (in a matter of hours or days rather than months).

group_project

Visible to the public CRII: SaTC: Towards the Development of Stronger Memory-Hard Functions for Secure Password Hashing

Recent data breaches have exposed billions of user passwords to the dangerous threat of an offline password attacker who attempts to guess each user's password by brute force. Because an offline attacker can validate each password guess by itself using stolen password hashes from a data breach it is not possible to "lock out" an offline attacker after several incorrect guesses. The attacker is limited only by the computational resources necessary to mount a brute-force attack.

group_project

Visible to the public CRII: SaTC: Systems That Facilitate Cooperation and Stewardship to Improve End-User Security Behaviors

This proposal explores opportunities to improve cybersecurity systems by encouraging cooperation and stewardship, whereby people work together for mutually beneficial cybersecurity outcomes. For example, coworkers could provide accountability for one another in keeping their software fully up-to-date, or a trusted expert might remotely configure the security settings on a new laptop for a consenting non-expert. Many existing security systems, by contrast, are not designed to enable or encourage social interaction, a situation that often results in confusion and non-compliance.

group_project

Visible to the public CRII: SaTC: Towards Stronger and Verified Security for Real-World Cryptography

Many real-world cryptographic schemes are based on the provable-security paradigm, certifying their security via some proof. However, in several important settings, existing proofs for the in-use constructions give weak security bounds, even to the extent that these results are not meaningful. Moreover, many proofs in the literature are buggy, giving false confidence on the security of constructions which are in fact vulnerable.