Develop System Design Methods
group_project
Submitted by Tal Malkin on Tue, 12/19/2017 - 11:40am
Recent trends in computing have prompted users and organizations to store an increasingly large amount of sensitive data at third party locations in the cloud outside of their direct control. In order to protect this data, it needs to be encrypted. However, traditional encryption systems lack the expressiveness needed for most applications involving big and complex data.
group_project
Submitted by Rashmi Jha on Tue, 12/19/2017 - 11:35am
The Complementary Metal Oxide Semiconductor (CMOS) based security primitives typically suffer from area/power overhead, sensitivity to environmental fluctuations and limited randomness and entropy offered by Silicon substrate. Spintronic circuits can complement the existing CMOS based security and trust infrastructures. This project explores ways to uncover the security specific properties of the magnetic nanowire and capture them in detailed circuit model.
group_project
Submitted by Rashmi Jha on Tue, 12/19/2017 - 11:33am
The Complementary Metal Oxide Semiconductor (CMOS) based security primitives typically suffer from area/power overhead, sensitivity to environmental fluctuations and limited randomness and entropy offered by Silicon substrate. Spintronic circuits can complement the existing CMOS based security and trust infrastructures. This project explores ways to uncover the security specific properties of the magnetic nanowire and capture them in detailed circuit model.
group_project
Submitted by Yinzhi Cao on Tue, 12/19/2017 - 10:26am
Cross-site scripting (XSS) vulnerabilities -- though being known for more than ten years -- are still one of the most commonly-found web application vulnerabilities in the wild. Among all the defenses proposed by researchers, one widely-adopted approach is called Content Security Policy (CSP) -- which has been standardized by W3C and adopted by all major commercial browsers, such as Google Chrome, Internet Explorer, Safari, and Firefox.
group_project
Submitted by Giuseppe Ateniese on Tue, 12/19/2017 - 10:20am
Informally speaking, Secure Multi-Party Computation (SMPC) allows two or more parties to jointly compute some function on their private inputs in a distributed fashion (i.e., without the involvement of a trusted third party) such that none of the parties learns anything beyond its dedicated output and what it can deduce from considering both this output and its own private input. Since its inception in 1982 by Yao, SMPC has advanced greatly and over the years a large body of work has been developed.
group_project
Submitted by Aravind Prakash on Mon, 12/18/2017 - 5:59pm
Computer software play a ubiquitous role in the modern way of life. Attacks against vulnerable software lead to compromise and loss of financial and personal information. While the application stores and the software manufacturers may strive to provide vulnerability-free software, the onus to defend against attacks and ensure integrity of one?s personal information and resources is on the end-user.
group_project
Submitted by Ting Wang on Mon, 12/18/2017 - 5:54pm
Deep Learning (DL)-powered personalization holds great promise to fundamentally transform the way people live, work and travel, but poses high risk to people's individual privacy. This project will address the privacy risks arising in DL-powered contextual mobile services by developing solutions that facilitate the use of personal information while maintaining explicit user control over use of the information.
group_project
Submitted by Nicholas Hopper on Mon, 12/18/2017 - 5:54pm
The Internet has become one of the most effective and common means of conveying expression that is likely to be controversial or suppressed. This freedom of expression is threatened by the now widespread practice of Internet censorship by both private and state interests.
group_project
Submitted by Yan Huang on Mon, 12/18/2017 - 5:38pm
Many challenging real world problems, e.g., voting and blind auction, require computation over sensitive data supplied by multiple mutually-distrustful entities. Elegant cryptographic theories have been developed to solve these problems without relying on a mutually-trusted third party. Practitioners also built prototypes capable of securely computing set intersection, AES encryption, Hamming distance, etc. However, many other applications, such as data mining and running universal machines, are far more complex than what can be supported by the state-of-the-art techniques.
group_project
Submitted by Roopa Vishwanathan on Mon, 12/18/2017 - 5:29pm
This project develops a comprehensive proof construction and verification framework for a well-defined class of cryptographic protocols: attribute-based cryptosystems. In particular, existing automated proof construction and verification frameworks, such as EasyCrypt and CryptoVerif, are extended to provide support for attribute-based cryptography. The extensions consist of libraries of simple transformations, algebraic manipulations, commonly used abstractions and constructs, and proof strategies, which will help in generation and verification of proofs in attribute-based cryptography.