Understand and Measure Privacy
group_project
Submitted by Swaroop Ghosh on Tue, 12/19/2017 - 11:11am
The Complementary Metal Oxide Semiconductor (CMOS) based security primitives typically suffer from area/power overhead, sensitivity to environmental fluctuations and limited randomness and entropy offered by Silicon substrate. Spintronic circuits can complement the existing CMOS based security and trust infrastructures. This project explores ways to uncover the security specific properties of the magnetic nanowire and capture them in detailed circuit model.
group_project
Submitted by Swaroop Ghosh on Tue, 12/19/2017 - 11:10am
The Complementary Metal Oxide Semiconductor (CMOS) based security primitives typically suffer from area/power overhead, sensitivity to environmental fluctuations and limited randomness and entropy offered by Silicon substrate. Spintronic circuits can complement the existing CMOS based security and trust infrastructures. This project explores ways to uncover the security specific properties of the magnetic nanowire and capture them in detailed circuit model.
group_project
Submitted by April Edwards on Tue, 12/19/2017 - 11:07am
Youths of the digital age live parallel lives online and in the real world, frequently disclosing personal information to cyberfriends and strangers, regardless of race, class or gender. Race and gender do make a difference, however, when these online disclosures lead to acts of cyberaggression. The PIs' previous work revealed that some youths are resistant to cyberaggression and that there are differences in perceptions of cyberbullying among youths from different cultural and racial backgrounds.
group_project
Submitted by Michael Bailey on Tue, 12/19/2017 - 10:49am
Today's Internet has some 1.7 billion users, fosters an estimated $1.5 trillion in annual global economic benefits, and is widely agreed to offer a staggering array of societal benefits. The network sees enormous demand---on the order of 40 Tbps of inter-domain traffic and an annual growth rate of 44.5%. Remarkably, in spite of the Internet's importance and rapid growth, the core protocols that support its basic functions (i.e., addressing, naming, routing) have seen little fundamental change over time.
group_project
Submitted by Giuseppe Ateniese on Tue, 12/19/2017 - 10:20am
Informally speaking, Secure Multi-Party Computation (SMPC) allows two or more parties to jointly compute some function on their private inputs in a distributed fashion (i.e., without the involvement of a trusted third party) such that none of the parties learns anything beyond its dedicated output and what it can deduce from considering both this output and its own private input. Since its inception in 1982 by Yao, SMPC has advanced greatly and over the years a large body of work has been developed.
group_project
Submitted by Aravind Prakash on Mon, 12/18/2017 - 5:59pm
Computer software play a ubiquitous role in the modern way of life. Attacks against vulnerable software lead to compromise and loss of financial and personal information. While the application stores and the software manufacturers may strive to provide vulnerability-free software, the onus to defend against attacks and ensure integrity of one?s personal information and resources is on the end-user.
group_project
Submitted by Yang Wang on Mon, 12/18/2017 - 5:52pm
Technology advances have brought numerous benefits to people and society, but also heightened risks to privacy. This project will investigate mechanisms and build tools to help people make privacy-aware decisions in different online contexts. The outcomes will help people to better understand their own privacy preferences and behavior, and enable them to better manage their privacy on the Internet. The project will create designs that can be integrated into mobile app markets and web browsers. The results will also inform Internet standards and governmental policies on Internet privacy.
group_project
Submitted by Fareena Saqib on Mon, 12/18/2017 - 5:50pm
Crucial and critical needs of security and trust requirements are growing in all classes of applications such as in automobiles and for wearable devices. Traditional cryptographic primitives are computation-intensive and rely on secrecy of shared or session keys, applicable on large systems like servers and secure databases. This is unsuitable for embedded devices with fewer resources for realizing sufficiently strong security. This research addresses new hardware-oriented capabilities and mechanisms for protecting Internet of Things (IoT) devices.
group_project
Submitted by Hemanta Maji on Mon, 12/18/2017 - 5:31pm
Understanding the computational hardness of securely realizing cryptographic primitives is a fundamental problem in cryptography. One such vital cryptographic primitive is oblivious transfer and understanding the essence of implementing it has significant consequences to cryptography, like bringing secure multi-party computation closer to reality. This research develops a new theory to explore this broad concept, namely the theory of computational correlations.
group_project
Submitted by Hoda Mehrpouyan on Mon, 12/18/2017 - 5:26pm
As mobile and network technologies proliferate, so does society's awareness of the vulnerability of private data within cyberspace. Protecting private information becomes specially important, since researchers estimate that 87% of Americans can be identified by name and address, if their zip code, gender, and birthday are known to intruders. The goal of this proposal will be to develop a new set of verification tools, algorithms, and interfaces that enable secure, effective and unobtrusive management of users' private information.