Develop System Design Methods
group_project
Submitted by Allison Lewko on Mon, 12/18/2017 - 1:32pm
Modern cryptography offers an impressive virtual buffet to a consumer who is wealthy in resources, with powerful tools like fully homomorphic encryption (which allows a provider to compute with encrypted values while keeping the client's data safe) and general purpose obfuscation (which allows one to hide the purpose of a given computation). But for more modestly minded users, who seek to perform less lofty tasks using more affordable computing resources or under more time-tested assumptions, the offerings are comparatively paltry.
group_project
Submitted by Apu Kapadia on Thu, 12/14/2017 - 8:08pm
Social networking and sensor-rich devices such as smartphones are becoming increasingly pervasive in today's society. People can share information concerning their location, activity, fitness, and health with their friends and family while benefiting from applications that leverage such information. Yet, users already find managing their privacy to be challenging, and the complexity involved in doing so is bound to increase.
group_project
Submitted by Salil Vadhan on Thu, 12/14/2017 - 6:41pm
Information technology, advances in statistical computing, and the deluge of data available through the Internet are transforming computational social science. However, a major challenge is maintaining the privacy of human subjects. This project is a broad, multidisciplinary effort to help enable the collection, analysis, and sharing of sensitive data while providing privacy for individual subjects.
group_project
Submitted by leavens on Thu, 12/14/2017 - 6:28pm
This project is developing tools and techniques for cost-effective evaluation of the trustworthiness of mobile applications (apps). The work focuses on enterprise scenarios, in which personnel at a business or government agency use mission-related apps and access enterprise networks.
group_project
Submitted by msherr on Thu, 12/14/2017 - 5:53pm
The ability to communicate and readily access information helps make possible positive social and political change. The Internet's effects on developing nations' educational, economic, and governmental institutions have been well explored by social scientists and technical experts. However, in unfortunately many instances, undemocratic governments monitor and censor Internet communication to attempt to control their populations.
group_project
Submitted by David Evans on Mon, 12/11/2017 - 3:30pm
Many compelling applications involve computations that require sensitive data from two or more individuals. For example, as the cost of personal genome sequencing rapidly plummets many genetics applications will soon be within reach of individuals such as comparing one?s genome with the genomes of different groups of participants in a study to determine which treatment is likely to be most effective. Such comparisons could have tremendous value, but are currently infeasible because of the privacy concerns both for the individual and study participants.
group_project
Submitted by Murat Kantarcioglu on Mon, 12/11/2017 - 3:20pm
Data provenance refers to the history of the contents of an object and its successive transformations. Knowledge of data provenance is beneficial to many ends, such as enhancing data trustworthiness, facilitating accountability, verifying compliance, aiding forensics, and enabling more effective access and usage controls. Provenance data minimally needs integrity assurance to realize these benefits.
group_project
Submitted by samyers on Mon, 12/11/2017 - 3:04pm
Many compelling applications involve computations that require sensitive data from two or more individuals. For example, as the cost of personal genome sequencing rapidly plummets many genetics applications will soon be within reach of individuals such as comparing one?s genome with the genomes of different groups of participants in a study to determine which treatment is likely to be most effective. Such comparisons could have tremendous value, but are currently infeasible because of the privacy concerns both for the individual and study participants.
group_project
Submitted by saman.zonouz on Tue, 12/05/2017 - 8:59pm
This project develops a holistic approach to sociotechnical system security that combines innovations in both criminology and engineering/computer science. We design unified sociotechnical security models that capture how sociotechnical intrusions against social as well as technical aspects of the system (i.e., modeled as hidden sequences of system security states) result in observed hard data such as security sensor alerts and soft data produced by human/social sensors such as reports about slow machines.
group_project
Submitted by Arvind Narayanan on Mon, 12/04/2017 - 7:21pm
The project develops new technologies for continual, web-scale measurement and rapid defenses against emerging threats to web privacy and security arising from third-party tracking. It draws from the fields of web security, systems, measurement, statistics, and machine learning. The outputs of this project will enable website administrators to find and fix a large class of privacy and security problems. They will help improve existing browser privacy tools.