Foster Multidisciplinary Approach
group_project
Submitted by Phillip Rogaway on Wed, 10/11/2017 - 12:57pm
OpenSSH reveals excerpts from encrypted login sessions. TLS (HTTPS) reveals encrypted PayPal account cookies. DTLS is no better. EAXprime allows instantaneous forgeries. RFID security has been broken again and again. All of these failures of confidentiality and integrity are failures of authenticated ciphers: algorithms that promise to encrypt and authenticate messages using a shared secret key.
group_project
Submitted by Paul Pavlou on Wed, 10/11/2017 - 12:44pm
A key characteristic of cyberspace is the collection of large amounts of data, and people's privacy becomes vulnerable given the hyper-connectivity of cyberspace and the ease of accessing data. This project aims to enhance the safety and trustworthiness of cyberspace by designing choice architecture interventions informed by the neural processes underlying privacy to help people make better decisions about their privacy in cyberspace.
group_project
Submitted by Norman Sadeh on Wed, 10/11/2017 - 10:14am
Whether it is on their smartphones, in their browsers or on social networks, people are confronted with an increasingly unmanageable number of privacy settings. What is needed is a new, more scalable paradigm that empowers them to regain control over the collection and use of their data. This is particularly the case for mobile apps people download on their smartphones. These apps have been shown to collect and share a wide variety of sensitive data, with users unable to keep up.
group_project
Submitted by tbenzel on Wed, 10/11/2017 - 1:16am
This proposal provides funding for the third GREPSEC: Underrepresented Groups in Security Research workshop, which will held in May 2017, in San Jose CA. This day-and-a-half-long workshop intended for women and underrepresented minorities in computer security and privacy, will be co-located with the IEEE Computer Society's Security and Privacy Symposium, the premier conference in security.
group_project
Submitted by Zachary Peterson on Wed, 10/11/2017 - 12:56am
The project involves the design and development of a pedagogical alternate reality game (ARG) teaching Cybersecurity and Computer Science (CS) concepts to first-year, undergraduate students.
group_project
Submitted by Vinod Lohani on Wed, 10/11/2017 - 12:49am
In this SaTC-EDU project at Virginia Tech, faculty members and graduate students in the Engineering Education, Computer Science (CS), Electrical & Computer Engineering (ECE) and the Hume Center for National Security and Technology in College of Engineering are collaborating to develop and implement a unique curriculum delivery model in cybersecurity into the CS and ECE curricula using Jerome Bruner's spiral theory approach.
group_project
Submitted by ninghui on Tue, 10/10/2017 - 1:05pm
Risk communication is an important part of many cyber security mechanisms. Android's current risk communication mechanism is based on security warnings and has been demonstrated to be ineffective because users become habituated to ignore such warnings and tend to consent to all prompts. This multi-disciplinary research project aims at developing holistic solutions to usable risk communication and control for the Android platform.
group_project
Submitted by Nicholas Feamster on Tue, 10/10/2017 - 11:09am
The proliferation and increasing sophistication of censorship warrants continuing efforts to develop tools to evade it. Yet, designing effective mechanisms for censorship resistance ultimately depends on accurate models of the capabilities of censors, as well as how those capabilities will likely evolve. In contrast to more established disciplines within security, censorship resistance is relatively nascent, not yet having solid foundations for understanding censor capabilities or evaluating the effectiveness of evasion technologies.
group_project
Submitted by Nicholas Feamster on Tue, 10/10/2017 - 11:05am
This project develops methods to provide citizens information about technologies that obstruct, restrict, or tamper with their access to information. Internet users need an objective, independent, third-party service that helps them determine whether their Internet service provider or government is restricting access to content, specific protocols, or otherwise degrading service. Towards this goal, we are (1) monitoring attempts to block or manipulate Internet content and communications; and (2) evaluating various censorship circumvention mechanisms in real-world deployments}.
group_project
Submitted by Mohamed Mahmoud on Mon, 10/09/2017 - 3:32pm
The U.S. power grid is being replaced with a smart grid, a complex network of intelligent electronic devices, distributed generators, and dispersed loads, which requires communication networks for management and coordination. Advanced metering infrastructure (AMI) networks are one part of the smart grid to provide two-way communications between smart meters at the consumers' side and the utility companies. AMI networks allow utilities to collect power consumption data at high frequency rates.