Develop System Design Methods

group_project

Visible to the public CRII: SaTC: A System for Privacy Management in Ubiquitous Environments

As mobile and network technologies proliferate, so does society's awareness of the vulnerability of private data within cyberspace. Protecting private information becomes specially important, since researchers estimate that 87% of Americans can be identified by name and address, if their zip code, gender, and birthday are known to intruders. The goal of this proposal will be to develop a new set of verification tools, algorithms, and interfaces that enable secure, effective and unobtrusive management of users' private information.

group_project

Visible to the public CRII: CPS SaTC: Securing Smart Cyberphysical Systems against Man-in-the-Middle Attacks

Cyber-physical systems have increasingly become top targets for hackers around the world. We are also seeing proliferation of internet-connected critical infrastructures that allow for easy monitoring, visualization, and control. In February 2013, US president signed an executive order "Improving Critical Infrastructure Cybersecurity" that underscores the urgent need for securing such critical infrastructure against malicious attacks.

group_project

Visible to the public Collaborative Research: Preserving User Privacy in Server-driven Dynamic Spectrum Access System

Dynamic spectrum access (DSA) technique enables wireless devices, called secondary users (SUs), to use spectrum that are allocated to licensed incumbent users (IUs) as long as they do not interfere with IUs' operation. It has been widely accepted as a crucial solution to mitigate the spectrum scarcity problem for wireless communications. As a key form of DSA, regulators have proposed to release more Federal spectrum for sharing with commercial wireless users, under the umbrella of a spectrum access system (SAS) database to govern the spectrum sharing between IUs and SUs.

group_project

Visible to the public CICI: Center of Excellence: Center for Trustworthy Scientific Cyberinfrastructure

The National Science Foundation funds over seven billion dollars of research annually, nearly all of which relies heavily on information technology. The digital data produced and computing systems used by that research are subject to the same risks as other data and computing systems on the Internet. Appropriate cybersecurity is necessary both to make today's scientific discoveries possible and to ensure that the science is trustworthy. However, NSF science is often necessarily performed in open, collaborative environments that span organizational and national boundaries.

group_project

Visible to the public TWC: Frontier: Collaborative: CORe: Center for Encrypted Functionalities

The Center for Encrypted Functionalities (CORE) tackles the deep and far-reaching problem of general-purpose "program obfuscation," which aims to enhance cybersecurity by making an arbitrary computer program unintelligible while preserving its functionality.

group_project

Visible to the public CIF: Small: Collaborative Research: Security in Dynamic Environments: Harvesting Network Randomness and Diversity

The project aims at quantifying a general network's inner potential for supporting various forms of security by achieving secret common randomness between pairs or groups of its nodes. Statistical and computational secrecy measures are being considered against a general passive adversary. Common-randomness-achieving protocols are classified into two groups: culture-building and crowd-shielding. The former achieves common randomness between nodes situated in close proximity of each other, from correlated observations of specific (natural or induced) network phenomena.

group_project

Visible to the public CAREER: RUI: Understanding Human Cognition in Computer Network Defense

The cyber security threat to organizations and governments has continued to grow with increasing dependence on information technology; meanwhile, the entities behind cyber attacks increase in sophistication. Cyber security professionals, the individuals responsible for keeping organizations secure, investigate network activity to find, identify, and respond to threats. These individuals are among the last lines of defense for an organization. Cyber security professionals depend on automated tools to perform their jobs but must make critical decisions that impact security.

group_project

Visible to the public CAREER: Privacy-Guaranteed Distributed Interactions in Critical Infrastructure Networks

Information sharing between operators (agents) in critical infrastructure systems such as the Smart Grid is fundamental to reliable and sustained operation. The contention, however, between sharing data for system stability and reliability (utility) and withholding data for competitive advantage (privacy) has stymied data sharing in such systems, sometimes with catastrophic consequences. This motivates a data sharing framework that addresses the competitive interests and information leakage concerns of agents and enables timely and controlled information exchange.

group_project

Visible to the public CAREER: Safety and security for next-generation world-scale real-time medical systems

Interoperable, reconfigurable systems of medical devices are the future of medical technology. They will improve care outcomes by catching common mistakes, reduce clinician cognitive workload by suppressing false alarms, and streamline and simplify continued care, especially when patients move between different medical facilities. As the penetration of "smart" networked medical technology increases, we will see increased problems with cybersecurity of such systems.

group_project

Visible to the public CAREER: Practical Control Engineering Principles to Improve the Security and Privacy of Cyber-Physical Systems

This project focuses on tackling the security and privacy of Cyber-Physical Systems (CPS) by integrating the theory and best practices from the information security community as well as practical approaches from the control theory community. The first part of the project focuses on security and protection of cyber-physical critical infrastructures such as the power grid, water distribution networks, and transportation networks against computer attacks in order to prevent disruptions that may cause loss of service, infrastructure damage or even loss of life.