Develop Approaches

group_project

Visible to the public Forum on Cyber Resilience

This project provides support for a National Academies Roundtable, the Forum on Cyber Resilience. The Forum will facilitate and enhance the exchange of ideas among scientists, practitioners, and policy makers concerned with the resilience of computing and communications systems, including the Internet, critical infrastructure, and other societally important systems.

group_project

Visible to the public  EAGER: Digital Interventions for Reducing Social Networking Risks in Adolescents

Adolescents are at higher risk of engaging in risky behaviors in online social networks. This project develops digital intervention solutions to motivate, educate, support and engender safe social networking behaviors among adolescents. It significantly extends the current understanding of adolescent motivations for engaging in risky online behaviors and the state-of-the-art solutions for reducing adolescent exposure to such behaviors.

group_project

Visible to the public TWC: TTP Option: Small: Collaborative: Integrated Smart Grid Analytics for Anomaly Detection

The modernized electric grid, the Smart Grid, integrates two-way communication technologies across power generation, transmission and distribution, in order to deliver electricity efficiently, securely and cost-effectively. On the monitoring and control side, it employs real-time monitoring offered by a messaging-based advanced metering infrastructure (AMI), which ensures the grid's stability and reliability, as well as the efficient implementation of demand response schemes to mitigate bursts demand.

group_project

Visible to the public TWC: Small: Collaborative: Practical Security Protocols via Advanced Data Structures

Data structures have a prominent modern computational role, due to their wide applicability, such as in database querying, web searching, and social network analysis. This project focuses on the interplay of data structures with security protocols, examining two different paradigms: the security for data structures paradigm (SD) and the data structures for security paradigm (DS).

group_project

Visible to the public SaTC-EDU:EAGER:A Wiki Space for Information Security Education Exchange

Information security remains a persistent and growing problem in the United States due to ever-progressing reliance on information technologies and systems to provide critical services and enable society's contemporary way of life. The economics of computing favor performance and functionality over security and may continue to do so for some time. This environment is created by graduates of education programs, programs which can be argued to be lacking in emphasis on security impacts associated with this new information age.

group_project

Visible to the public TWC: Small: Towards Robust Crowd Computations

This research explores a new approach to securing systems that are based on crowd computations, where the operator polls the opinions of crowds--arbitrary users of the system--to provide a variety of recommendation services. Examples include services like Yelp, YouTube, Twitter, and TripAdvisor. However, today's services are known to suffer from multiple identity (Sybil) attacks, where an attacker creates many identities to subvert the system (e.g., make their business appear to be more popular on Yelp).

group_project

Visible to the public TWC: Small: On Imperfect Randomness and Leakage-Resilient Cryptography

The availability of ideal randomness is a common assumption used not only in cryptography, but in many other areas of computer science, and engineering in general. Unfortunately, in many situations this assumption is highly unrealistic, and cryptographic systems have to be built based on imperfect sources of randomness. Motivated by these considerations, this project will investigate the validity of this assumption and consider several important scenarios where secure cryptographic systems must be built based on various kinds of imperfect randomness.

group_project

Visible to the public TWC: Small: Collaborative: Spoof-Resistant Smartphone Authentication using Cooperating Wearables

This research is developing methods that leverage a multitude of sensors embedded in hand-held and wearable devices (e.g., smart watches, smart glasses and brain-computer interfaces) for strong user authentication to smart phones. The current point-of-entry solutions, largely based on weak static credentials, such as passwords or PINs for authentication to smart phones are not sufficient because once such credentials are compromised (which is very likely given the many vulnerabilities of passwords), the attacker may gain unfettered access to the smart phone.

group_project

Visible to the public TWC: Small: Finding and Repairing Semantic Vulnerabilities in Modern Software

Software is responsible for many critical government, business, and educational functions. This project aims to develop new methods for finding and repairing some of the most challenging, poorly understood security vulnerabilities in modern software that have the potential to jeopardize the security and reliability of the nation's cyber infrastructure.