Transition to Practice

group_project

Visible to the public CRII: SaTC: Efficient Secure Multiparty Computation of Large-Scale, Complex Protocols

Many challenging real world problems, e.g., voting and blind auction, require computation over sensitive data supplied by multiple mutually-distrustful entities. Elegant cryptographic theories have been developed to solve these problems without relying on a mutually-trusted third party. Practitioners also built prototypes capable of securely computing set intersection, AES encryption, Hamming distance, etc. However, many other applications, such as data mining and running universal machines, are far more complex than what can be supported by the state-of-the-art techniques.

group_project

Visible to the public CRII: SaTC: A System for Privacy Management in Ubiquitous Environments

As mobile and network technologies proliferate, so does society's awareness of the vulnerability of private data within cyberspace. Protecting private information becomes specially important, since researchers estimate that 87% of Americans can be identified by name and address, if their zip code, gender, and birthday are known to intruders. The goal of this proposal will be to develop a new set of verification tools, algorithms, and interfaces that enable secure, effective and unobtrusive management of users' private information.

group_project

Visible to the public CRII: SaTC CPS: RUI: Cyber-Physical System Security in Implantable Insulin Injection Systems

Increasingly medical devices are dependent on software and the wireless channel for their operations, which also pose new vulnerabilities to their safe, dependable, and trustworthy operations. Medical devices such as implantable insulin pumps, which are in wide use today, continuously monitor and manage a patient's diabetes without the need for frequent daily patient interventions. These devices, not originally designed against cyber security threats, must now mitigate these threats.

group_project

Visible to the public CI-EN: Trust-Hub: Development of Benchmarks, Metrics, and Validation Platforms for Hardware Security, and a Web-based Dissemination Portal

The growing hardware security community is faced with an immediate need to develop effective tools and benchmarks. The purpose of this project is to lead a community-wide movement toward stronger assurances in our integrated circuits, computational platforms, and electronics supply chain.

group_project

Visible to the public CIF: Small: Collaborative Research: Security in Dynamic Environments: Harvesting Network Randomness and Diversity

The project aims at quantifying a general network's inner potential for supporting various forms of security by achieving secret common randomness between pairs or groups of its nodes. Statistical and computational secrecy measures are being considered against a general passive adversary. Common-randomness-achieving protocols are classified into two groups: culture-building and crowd-shielding. The former achieves common randomness between nodes situated in close proximity of each other, from correlated observations of specific (natural or induced) network phenomena.

group_project

Visible to the public CAREER: RUI: Understanding Human Cognition in Computer Network Defense

The cyber security threat to organizations and governments has continued to grow with increasing dependence on information technology; meanwhile, the entities behind cyber attacks increase in sophistication. Cyber security professionals, the individuals responsible for keeping organizations secure, investigate network activity to find, identify, and respond to threats. These individuals are among the last lines of defense for an organization. Cyber security professionals depend on automated tools to perform their jobs but must make critical decisions that impact security.

group_project

Visible to the public CAREER: Safety and security for next-generation world-scale real-time medical systems

Interoperable, reconfigurable systems of medical devices are the future of medical technology. They will improve care outcomes by catching common mistakes, reduce clinician cognitive workload by suppressing false alarms, and streamline and simplify continued care, especially when patients move between different medical facilities. As the penetration of "smart" networked medical technology increases, we will see increased problems with cybersecurity of such systems.

group_project

Visible to the public Capacity Building: Collaborative Research: Integrated Learning Environment for Cyber Security of Smart Grid

Ensuring the cyber-security of the smart grid raises significant interest amongst both general public and researchers. However, the corresponding education programs fall behind in many aspects. Very limited curriculum or hands-on learning resources are available for security education about the smart grid, especially for the mutual impacts between cyber and physical systems.

group_project

Visible to the public TWC: Frontier: Privacy Tools for Sharing Research Data

Information technology, advances in statistical computing, and the deluge of data available through the Internet are transforming computational social science. However, a major challenge is maintaining the privacy of human subjects. This project is a broad, multidisciplinary effort to help enable the collection, analysis, and sharing of sensitive data while providing privacy for individual subjects.

group_project

Visible to the public TC: Large: Collaborative Research: Practical Privacy: Metrics and Methods for Protecting Record-level and Relational Data

Safely managing the release of data containing confidential information about individuals is a problem of great societal importance. Governments, institutions, and researchers collect data whose release can have enormous benefits to society by influencing public policy or advancing scientific knowledge. But dissemination of these data can only happen if the privacy of the respondents' data is preserved or if the amount of disclosure is limited.