CRII

group_project

Visible to the public CRII: SaTC: Transparent Capture and Aggregation of Secure Data Provenance for Smart Devices

Computers are increasingly pervasive and diverse, embedded in devices ranging from smart phones and wearable computers to home automation devices and automotive systems. This explosive growth has far outpaced the speed with which device behaviors can be analyzed and understood, creating unprecedented opportunities for "Internet of Things" devices to engage in nefarious activities such as violating users' privacy or spreading malware.

group_project

Visible to the public  CRII: SaTC: A Principled Approach Aiding the Development of a Compliant Internet PKI

Transport layer security (TLS) and secure socket layer (SSL) protocols aim to establish a secure channel with confidentiality and integrity guarantees over an insecure network. SSL/TLS is currently being used to protect a large number of servers and websites including banks, file servers, and social networks. In fact, 37% of North America's network traffic is now protected by SSL/TLS.

group_project

Visible to the public  CRII: SaTC: Practical Cryptographic Coding Schemes Against Memory Attacks

The goal of this project is to develop practical non-malleable codes, which are encoding schemes that have the property that modifying an encoded message results in either decoding the original message or a totally unrelated message. This will improve upon previous constructions and create practical methods to secure against memory attacks for both computers and portable devices. The practical designs developed in this project would immediately improve the performance in applications that use non-malleable codes.

group_project

Visible to the public CRII: SaTC: Towards Securing Social Robots

Robotics has traditionally focused on industrial and medical applications until recently with the development of robots, known as social robots, that are designed to intelligently and socially interact with humans. There has been little research on the privacy and security implications of these social robots.

group_project

Visible to the public CRII: SaTC: ExHume: An Empirical Approach to Program Analysis for Security

As software controls an ever-increasing number of devices that perform critical tasks, their security and robustness are of paramount importance to society. In addition, malicious software and "greyware" that violates the privacy of users causes billions in damage every year and erodes public confidence in computing systems. However, despite decades of work on techniques to analyze software with automated techniques, it remains a difficult and largely manual task.

group_project

Visible to the public CRII: SaTC: Lendable: Designing Modular Hardware and Unobtrusive Interactions to Enable Convenient and Trustworthy Lending of Small Personal Computing Devices

People often want to borrow or lend personal computing devices for many tasks: to make a phone call, to take some pictures, to navigate, to watch a video. Lending devices is risky, however, because of the amount of personal information they store and the lack of good tools for managing access to that information. This leads lenders to closely monitor borrowers' use, or to not lend the devices at all, both of which limit the usefulness of device lending and can lead to awkward interactions.

group_project

Visible to the public CRII: SaTC: Comprehensive and Automated Techniques for Evaluating Defenses Against Code Reuse Attacks

Modern society relies on computers to manage and transmit sensitive data. These computers run our banks, provide our telecommunications services (such as phone, TV, and Internet), and operate critical systems found in automobiles and power grids. The software on these systems is vulnerable to automated attacks and, if attacked successfully, can be used to cause the loss of money, property, and life. While researchers have developed automated, easy-to-use countermeasures to thwart such attacks, it is unclear whether these countermeasures work.

group_project

Visible to the public CRII: SaTC: Design, Implementation, and Analysis of Quantum-Resistant Algorithms on Smart Handheld Embedded Devices

The prospect of quantum computers is a threat against the security of currently used public key cryptographic algorithms. It has been widely accepted that, both public key cryptosystems including RSA and ECC will be broken by quantum computers employing certain algorithms. Although large-scale quantum computers do not yet exist, but the goal is to develop quantum-resistant cryptosystems in anticipation of quantum computers as most of the public key cryptography that is used on the Internet today is based on algorithms that are vulnerable to quantum attacks.

group_project

Visible to the public CRII: SaTC: Lockdown: Guarded Control-Flow and Data Privacy for Sensitive Data

Software systems are under constant attack: extracting sensitive data from running computer systems is a prime and highly lucrative target for attackers. Yet, current defense mechanisms fail to protect confidential or private data along with the integrity and availability of the underlying system. While it is important to find and fix vulnerabilities, it is unlikely that all vulnerabilities will ever be discovered. Therefore, there is an argument to be had for stronger defense mechanisms that protect software systems even in the presence of vulnerabilities.

group_project

Visible to the public  CRII: SaTC: Expanding the Frontiers of Cryptographic Technologies

As all our data moves to the cloud many new security and privacy concerns arise and traditional cryptographic primitives prove insufficient in such scenarios. A key focus of this research is to advance the state of the art on cryptographic techniques that address these new challenges.