Scientific Foundations

group_project

Visible to the public TC: Large: Collaborative Research: Practical Secure Two-Party Computation: Techniques, Tools, and Applications

Many compelling applications involve computations that require sensitive data from two or more individuals. For example, as the cost of personal genome sequencing rapidly plummets many genetics applications will soon be within reach of individuals such as comparing one?s genome with the genomes of different groups of participants in a study to determine which treatment is likely to be most effective. Such comparisons could have tremendous value, but are currently infeasible because of the privacy concerns both for the individual and study participants.

group_project

Visible to the public TC: Large: Collaborative Research: Privacy-Enhanced Secure Data Provenance

Data provenance refers to the history of the contents of an object and its successive transformations. Knowledge of data provenance is beneficial to many ends, such as enhancing data trustworthiness, facilitating accountability, verifying compliance, aiding forensics, and enabling more effective access and usage controls. Provenance data minimally needs integrity assurance to realize these benefits.

group_project

Visible to the public CAREER: Secure and Reliable Outsourced Storage Systems Using Remote Data Checking

When data is outsourced at a cloud storage provider, data owners lose control over the integrity of their data and must trust the storage provider unconditionally. Coupled with numerous data loss incidents, this prevents organizations from assessing the risk posed by outsourcing data to untrusted clouds, making cloud storage unsuitable for applications that require long-term security and reliability guarantees. This project establishes a practical remote data checking (RDC) framework as a mechanism to provide long-term integrity and reliability for remotely stored data.

group_project

Visible to the public EAGER: Exploring Heuristics and Designing Interface Cues to Understand Revealing or Withholding of Private Information

In individual pursuits of personalized service and other functionalities, people disclose personal and private information by trusting certain online sites and services. Scholars often assume that such trust is based on a careful assessment of the benefits and risks of disclosing information online. This project departs from such an assumption and investigates the possibility that decision-making about online information disclosure is not systematic, but rather based on cognitive heuristics (or mental shortcuts) triggered by cues in the interaction context.

group_project

Visible to the public  TWC: Small: Collaborative: Characterizing the Security Limitations of Accessing the Mobile Web

Mobile browsers are beginning to serve as critical enablers of modern computing. With a combination of rich features that rival their desktop counterparts and strong security mechanisms such as TLS/SSL, these mobile browsers are becoming the basis of many other mobile apps. Unfortunately, the security guarantees provided by mobile browsers and the risks associated with today?s mobile web have not been evaluated in great detail.

group_project

Visible to the public TWC: Small: Collaborative: Cracking Down Online Deception Ecosystems

Used by hundreds of millions of people every day, online services are central to everyday life. Their popularity and impact make them targets of public opinion skewing attacks, in which those with malicious intent manipulate the image of businesses, mobile applications and products. Website owners often turn to crowdsourcing sites to hire an army of professional fraudsters to paint a fake flattering image for mediocre subjects or trick people into downloading malicious software.

group_project

Visible to the public TWC: Small: Online tracking: Threat Detection, Measurement and Response

The project develops new technologies for continual, web-scale measurement and rapid defenses against emerging threats to web privacy and security arising from third-party tracking. It draws from the fields of web security, systems, measurement, statistics, and machine learning. The outputs of this project will enable website administrators to find and fix a large class of privacy and security problems. They will help improve existing browser privacy tools.

group_project

Visible to the public Identifying Research Approaches, Technologies, Options, and Tradeoffs for Encrypted Communications Access

This National Academies study examines the tradeoffs associated with mechanisms to provide authorized government agencies with access to the plaintext version of encrypted information. The study describes the context in which decisions about such mechanisms would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information sought by the government for law enforcement or intelligence investigations.

group_project

Visible to the public CAREER: User-Space Protection Domains for Compositional Information Security

Attacks on software applications such as email readers and web browsers are common. These attacks can cause damages ranging from application malfunction, loss of private data, to a complete takeover of users' computers. One effective strategy for limiting the damage is to adopt the principle of least privilege in application design: the application is split into several protection domains and each domain is given only the necessary privileges to perform its task.

group_project

Visible to the public TWC: Small: Collaborative: Computation and Access Control on Big Multiuser Data

This project is developing new foundational cryptographic techniques for outsourcing data and computations on it, which fully preserve data privacy. The focus is on real-world settings involving multiple users where privacy with respect to all other users is required, as well as privacy from the service provider. The project will aim to minimize the interaction between users in the system, making the computational complexity for each client independent of the total number of users.