Assure Information Flows

group_project

Visible to the public CRII: SaTC: A System for Privacy Management in Ubiquitous Environments

As mobile and network technologies proliferate, so does society's awareness of the vulnerability of private data within cyberspace. Protecting private information becomes specially important, since researchers estimate that 87% of Americans can be identified by name and address, if their zip code, gender, and birthday are known to intruders. The goal of this proposal will be to develop a new set of verification tools, algorithms, and interfaces that enable secure, effective and unobtrusive management of users' private information.

group_project

Visible to the public Collaborative Research: Preserving User Privacy in Server-driven Dynamic Spectrum Access System

Dynamic spectrum access (DSA) technique enables wireless devices, called secondary users (SUs), to use spectrum that are allocated to licensed incumbent users (IUs) as long as they do not interfere with IUs' operation. It has been widely accepted as a crucial solution to mitigate the spectrum scarcity problem for wireless communications. As a key form of DSA, regulators have proposed to release more Federal spectrum for sharing with commercial wireless users, under the umbrella of a spectrum access system (SAS) database to govern the spectrum sharing between IUs and SUs.

group_project

Visible to the public CI-EN: Trust-Hub: Development of Benchmarks, Metrics, and Validation Platforms for Hardware Security, and a Web-based Dissemination Portal

The growing hardware security community is faced with an immediate need to develop effective tools and benchmarks. The purpose of this project is to lead a community-wide movement toward stronger assurances in our integrated circuits, computational platforms, and electronics supply chain.

group_project

Visible to the public CAREER: Privacy-preserving learning for distributed data

Medical technologies such as imaging and sequencing make it possible to gather massive amounts of information at increasingly lower cost. Sharing data from studies can advance scientific understanding and improve healthcare outcomes. Concern about patient privacy, however, can preclude open data sharing, thus hampering progress in understanding stigmatized conditions such as mental health disorders.

group_project

Visible to the public CAREER: Safety and security for next-generation world-scale real-time medical systems

Interoperable, reconfigurable systems of medical devices are the future of medical technology. They will improve care outcomes by catching common mistakes, reduce clinician cognitive workload by suppressing false alarms, and streamline and simplify continued care, especially when patients move between different medical facilities. As the penetration of "smart" networked medical technology increases, we will see increased problems with cybersecurity of such systems.

group_project

Visible to the public CAREER: Practical, Expressive, Language-based Information Security

Language-based security (the use of programming language abstractions and techniques for security) holds the promise of efficient enforcement of strong, formal, fine-grained, application-specific information security guarantees. However, language-based security has not yet reached its potential, and is not in widespread use for providing rich information security guarantees.

group_project

Visible to the public TWC: Frontier: Privacy Tools for Sharing Research Data

Information technology, advances in statistical computing, and the deluge of data available through the Internet are transforming computational social science. However, a major challenge is maintaining the privacy of human subjects. This project is a broad, multidisciplinary effort to help enable the collection, analysis, and sharing of sensitive data while providing privacy for individual subjects.

group_project

Visible to the public TWC: Medium: Collaborative: Flexible and Practical Information Flow Assurance for Mobile Apps

This project is developing tools and techniques for cost-effective evaluation of the trustworthiness of mobile applications (apps). The work focuses on enterprise scenarios, in which personnel at a business or government agency use mission-related apps and access enterprise networks.

group_project

Visible to the public TC: Large: Collaborative Research: Privacy-Enhanced Secure Data Provenance

Data provenance refers to the history of the contents of an object and its successive transformations. Knowledge of data provenance is beneficial to many ends, such as enhancing data trustworthiness, facilitating accountability, verifying compliance, aiding forensics, and enabling more effective access and usage controls. Provenance data minimally needs integrity assurance to realize these benefits.

group_project

Visible to the public TC: Large: Collaborative Research: Practical Secure Two-Party Computation: Techniques, Tools, and Applications

Many compelling applications involve computations that require sensitive data from two or more individuals. For example, as the cost of personal genome sequencing rapidly plummets many genetics applications will soon be within reach of individuals such as comparing one?s genome with the genomes of different groups of participants in a study to determine which treatment is likely to be most effective. Such comparisons could have tremendous value, but are currently infeasible because of the privacy concerns both for the individual and study participants.