Develop System Design Methods

group_project

Visible to the public EAGER: Automated Content-Based Detection of Public Online Harrassment

Public, online harassment takes many forms, but at its core are posts that are offensive, threatening, and intimidating. It is not an isolated problem. The Pew Research Center found 73% of people had witnessed harassment online, and a full 40% of people had experienced harassment directly. This research develops a method for analyzing the things people post online, and automatically detecting which posts fall into the category of severe public online harassment -- messages posted simply to disrupt, offend, or threaten others.

group_project

Visible to the public Identifying Research Approaches, Technologies, Options, and Tradeoffs for Encrypted Communications Access

This National Academies study examines the tradeoffs associated with mechanisms to provide authorized government agencies with access to the plaintext version of encrypted information. The study describes the context in which decisions about such mechanisms would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information sought by the government for law enforcement or intelligence investigations.

group_project

Visible to the public TWC: Small: Collaborative: Computation and Access Control on Big Multiuser Data

This project is developing new foundational cryptographic techniques for outsourcing data and computations on it, which fully preserve data privacy. The focus is on real-world settings involving multiple users where privacy with respect to all other users is required, as well as privacy from the service provider. The project will aim to minimize the interaction between users in the system, making the computational complexity for each client independent of the total number of users.

group_project

Visible to the public CAREER: Securing Critical Infrastructure with Autonomously Secure Storage

Embedded systems currently rely on local and often insecure state retention for process control and subsequent forensic analysis. As critical embedded control systems (e.g., smart grids, SCADA) generate increasing amounts of data and become ever more connected to other systems, secure retention and management of that data is required. Attacks such as Stuxnet show that SCADA and other systems comprising critical infrastructure are vulnerable to the compromise of controllers and sensing devices, as well as falsification of data to circumvent anomaly detection mechanisms.

group_project

Visible to the public TWC: Medium: Collaborative: Studying Journalists to Identify Requirements for Usable, Secure, and Trustworthy Communication

This research focuses on understanding the digital security and privacy needs of journalists and their sources to evaluate and design communication technologies that better support the fundamental operations of a globally free and unfettered press. Journalists -- along with their organizations and sources -- are known to be high-risk targets for cyberattack. This community can serve as a privacy and security bellwether, motivated to use new technologies, but requiring flexibility and ease-of-use. Many existing secure tools are too cumbersome for journalists to use on a regular basis.

group_project

Visible to the public TWC SBE: Small: Towards an Economic Foundation of Privacy-Preserving Data Analytics: Incentive Mechanisms and Fundamental Limits

The commoditization of private data has been trending up, as big data analytics is playing a more critical role in advertising, scientific research, etc. It is becoming increasingly difficult to know how data may be used, or to retain control over data about oneself. One common practice of collecting private data is based on "informed consent", where data subjects (individuals) decide whether to report data or not, based upon who is collecting the data, what data is collected, and how the data will be used.

group_project

Visible to the public TWC: Small: Noisy Secrets as Alternatives to Passwords and PKI

In order to establish a secure communication channel, each communicating party needs some method to authenticate the other, lest it unwittingly establish a channel with the adversary instead. Current techniques for authentication often rely on passwords and/or the public-key infrastructure (PKI). Both of these methods have considerable drawbacks since passwords are frequently breached, and PKI relies on central authorities which have proven to be less than reliable. Thus there is a need to use other sources of information for the communicating parties to authenticate each other.

group_project

Visible to the public TWC: Small: Rigorous and Customizable Spatiotemporal Privacy for Location Based Applications

Rapid advances in location based applications are leading to increased concern about location privacy. Current mobile operating systems only provide users with rudimentary location access controls - either to block or allow location access - which are inadequate and inefficient in mitigating privacy threats. Most existing location obfuscation mechanisms are based on syntactic privacy models that do not consider mobility and are hence vulnerable to inference attacks.

group_project

Visible to the public STARSS: Small: Detection of Hardware Trojans Hidden in Unspecified Design Functionality

Concern about the security and reliability of our electronic systems and infrastructure is at an all-time high. Economic factors dictate that the design, manufacturing, testing, and deployment of silicon chips are spread across many companies and countries with different and often conflicting goals and interests. In modern complex digital designs, behaviors at a good fraction of observable output signals for many operational cycles are unspecified and vulnerable to malicious modifications, known as Hardware Trojans.

group_project

Visible to the public  TWC: Medium: Privacy Preserving Computation in Big Data Clouds

Privacy is critical to freedom of creativity and innovation. Assured privacy protection offers unprecedented opportunities for industry innovation, science and engineering discovery, as well as new life enhancing experiences and opportunities.