Scientific Foundations

group_project

Visible to the public EAGER: Implementing Practical Provably Secure Authenticated Key Exchange for the Post-Quantum Worl

Cyber security is considered one of the most important aspects of our information technology based society. Key Exchange(KE) is a fundamental cryptographic primitive, and authenticated KE (AKE) is one of the most used cryptographic tools in secure communication protocols (e.g. SSL/TLS, IPSec, SSH) over the Internet. In light of the threat that quantum computers pose to cryptosystems such as RSA and ECC, this project is devoted to the development of secure and efficient AKE alternatives for the post-quantum computer world, which is now considered of a high priority by the US government.

group_project

Visible to the public TWC: Medium: Collaborative: Hiding Hay in a Haystack: Integrating Censorship Resistance into the Mainstream Internet

Freedom and openness of the Internet are under threat. Government censors in non-democratic countries are deploying network filters to block sources of uncensored information, suppress dissent, and prevent citizens from using the Internet to exercise their human rights such as freedom of speech and freedom of assembly.

group_project

Visible to the public STARSS: Small: Collaborative: Physical Design for Secure Split Manufacturing of ICs

The trend of outsourcing semiconductor manufacturing to oversea foundries has introduced several security vulnerabilities -- reverse engineering, malicious circuit insertion, counterfeiting, and intellectual property piracy -- making the semiconductor industry lose billions of dollars. Split manufacturing of integrated circuits reduces vulnerabilities introduced by an untrusted foundry by manufacturing only some of the layers at an untrusted high-end foundry and the remaining layers at a trusted low-end foundry.

group_project

Visible to the public TWC: Medium: Steganography in Empirical Sources Using Acquisition Oracle

The project focuses on advancing the field of digital image steganography -- a covert way of communication in which information is hidden in other objects, such as digital media files, to assure privacy. For a secure steganographic system, it should be impossible to prove the presence of hidden data. Achieving this level of security in practice is extraordinarily difficult because digital media is hard to describe using statistical models with accuracy necessary to guarantee perfect security.

group_project

Visible to the public TWC: Medium: Collaborative: Development and Evaluation of Next Generation Homomorphic Encryption Schemes

Fully homomorphic encryption (FHE) is a promising new technology that enables an untrusted party to efficiently compute directly on ciphertexts. For instance, with FHE a cloud server without access to the user's encrypted content can still provide text search services. An efficient FHE scheme would significantly improve the security of sensitive user data stored and processed on cloud servers. Significant progress has been made in bringing FHE proposals closer to practice.

group_project

Visible to the public TWC: Small: Scalable Hybrid Attack Graph Modeling and Analysis

Cyber-physical systems (CPSs) operate nearly all of society's critical infrastructures (e.g., energy, transportation and medicine). In performing mission critical functions, CPSs exhibit hybrid (both discrete and continuous) behavior as they use digital technology to control and monitor physical processes. CPS security analysis is particularly challenging because an attacker can make use of a wide variety of vulnerabilities in the digital elements of the system (e.g., the network), the physical elements of the system, or some combination.

group_project

Visible to the public  TWC: Medium: A Layered Approach to Securing Web Services

The modern web experience is dynamic, providing users with a highly responsive interface through which to interact with the world. Today's mechanisms allow servers---even those which are controlled by an attacker---to download arbitrary programs into a user's browser. It is extraordinarily difficult to secure the web browser (and its user) against attack in this scenario. While tools and techniques are useful to analyze and restrict downloaded code, they are by their very nature incomplete. As a result, the security of web services relies on a series of ad hoc, service-provided techniques.

group_project

Visible to the public TWC: Small: Automated Protocol Design and Refinement

Online security relies on communication protocols that establish trust and authentication. New protocols are created regularly, such as when Software-as-a-Service companies expose their software through new Web services. In the ideal case, network engineers and protocol experts collaborate to develop a protocol: one responsible for its efficiency and the other for its security. Unfortunately, this ideal is rarely realized.

group_project

Visible to the public TWC SBE: Medium: Collaborative: Building a Privacy-Preserving Social Networking Platform from a Technological and Sociological Perspective

Social networks provide many benefits, but also give rise to serious concerns regarding privacy. Indeed, since privacy protections are not intrinsically incorporated into the underlying technological framework, user data is still accessible to the social network and is open to misuse. While there have been efforts to incorporate privacy into social networks, existing solutions are not sufficiently lightweight, transparent, and functional, and therefore have achieved only limited adoption.

group_project

Visible to the public STARSS: Small: Collaborative: Practical and Scalable Security Verification of Security-Aware Hardware Architectures

Computers form the backbone of any modern society, and often process large amounts of sensitive and private information. To help secure the software, and the sensitive data, a number of secure hardware-software and processor architectures have been proposed. These architectures incorporate novel protection and defense mechanisms directly in the hardware where they cannot be modified or bypassed, unlike software protections.