Understand and Measure Privacy

group_project

Visible to the public EAGER: Cybercrime Science

This project examines three properties of underground cybercrime communities: 1) profitability, 2) connectivity, 3) and sustainability. It identifies qualitative and quantitative metrics for these properties as well as discusses the relative effectiveness of distinct operationalization of these metrics under different levels of data granularity. The goal is to develop metrics that provide meaning indicators even when data is limited. for example, if public posts are available but not private messages between individual cybercriminals.

group_project

Visible to the public TWC: TTP Option: Small: Differential Introspective Side Channels --- Discovery, Analysis, and Defense

Side channels in the security domain are known to be challenging to discover and eliminate systematically. Nevertheless, they can lead to a variety of stealthy attacks seriously compromising cybersecurity. This work focuses on an important class of side channels that are fundamental to the operations of networked systems.

group_project

Visible to the public CAREER: Secure and Trustworthy Provenance for Accountable Clouds

Cloud computing has emerged as one of the most successful computing models in recent years. However, lack of accountability and non-compliance with data protection regulations have prevented major users such as business, healthcare, and defense organizations from utilizing clouds for sensitive data and applications. Due to the lack of information about cloud internals and the inability to perform trustworthy audits, today's clouds are often not used in regulated industries, preventing their widespread adoption.

group_project

Visible to the public TWC: Medium: Collaborative: Deconstructing Encryption

Cryptographers have invented many different types of encryption. The PIs' research brings many of these under one umbrella, thereby reconceptualizing the landscape of modern cryptography. In the process, the research puts forward some entirely new kinds of encryption. The work is motivated by the needs of existing security practice. Sample questions include how to save space when storing encrypted copies of the same material in the cloud, and how to encrypt a credit-card number by reimagining the process as the shuffling of a deck of cards.

group_project

Visible to the public TWC: Medium: Collaborative: Capturing People's Expectations of Privacy with Mobile Apps by Combining Automated Scanning and Crowdsourcing Techniques

The goal of our work is to (a) capture people's expectations and surprises in using mobile apps in a scalable manner, and to (b) summarize these perceptions in a simple format to help people make better trust decisions. Our main idea is analyzing privacy in the form of people's expectations about what an app will and won't do, focusing on where an app breaks people's expectations. We are building an App Scanner that combines automated scanning techniques with crowdsourcing.

group_project

Visible to the public TWC: Medium: Collaborative: Capturing People's Expectations of Privacy with Mobile Apps by Combining Automated Scanning and Crowdsourcing Techniques

The goal of our work is to (a) capture people's expectations and surprises in using mobile apps in a scalable manner, and to (b) summarize these perceptions in a simple format to help people make better trust decisions. Our main idea is analyzing privacy in the form of people's expectations about what an app will and won't do, focusing on where an app breaks people's expectations. We are building an App Scanner that combines automated scanning techniques with crowdsourcing.

group_project

Visible to the public TWC: Small: Assessing Online Information Exposure Using Web Footprints

This research project studies a new area of research - exposure detection - that is at the intersection of data mining, security, and natural language processing. Exposure detection refers to discovering components/attributes of a user's public profile that reduce the user's privacy. To help the public understand the privacy risks of sharing certain information on the web, this research project focuses on developing efficient algorithms for modeling how an adversary learns information using incomplete and schemaless public data sources.

group_project

Visible to the public TWC: Small: Physically Unclonable Function (PUF) Enhancements Via Lithography and Design Partnership

Silicon physically unclonable function (PUF) is a supplemental circuit embedded in an IC which generates signatures unique to its native IC. This signature could be used for authentication, protection of data and secure communication. PUFs rely on the presence of uncontrollable variations in the fabrication process causing the circuit parameters to exhibit randomness. Current approaches for PUF design have mostly investigated circuit and architectural aspects. PUF quality is severely marred by a lack of understanding of exactly how fabrication process variations impact the PUF responses.

group_project

Visible to the public TWC: Small: Collaborative: Towards Agile and Privacy-Preserving Cloud Computing

Cloud computing offers many benefits to users, including increased availability and flexibility of resources, and efficiency of equipment. However, privacy concerns are becoming a major barrier to users transitioning to cloud computing. The privilege design of existing cloud platforms creates great challenges in ensuring the trustworthiness of cloud by granting too much power to the cloud administrators, who could launch serious insider attacks by abusing the administrative privileges.

group_project

Visible to the public TC: Large: Collaborative Research: Facilitating Free and Open Access to Information on the Internet

This project develops methods to provide citizens information about technologies that obstruct, restrict, or tamper with their access to information. Internet users need an objective, independent, third-party service that helps them determine whether their Internet service provider or government is restricting access to content, specific protocols, or otherwise degrading service. Towards this goal, we are (1) monitoring attempts to block or manipulate Internet content and communications; and (2) evaluating various censorship circumvention mechanisms in real-world deployments}.