TWC

group_project

Visible to the public TWC: Small: Quantitative Analysis and Reporting of Electromagnetic Covert and Side Channel Vulnerabilities

Most traditional approaches to computer security assume that information from the system can only be sent through intended output channels, such as network connection, monitor, portable disk drive, etc. Side-channel and covert-channel attacks circumvent these protections by extracting information that is leaked or deliberately sent from the system through unintended signals, such as electromagnetic emanations, power consumption, timing of computational activity, etc.

group_project

Visible to the public TWC: Medium: Title: SDR Shield: A Hardware-based Security Solution for Software Defined Radio

Software Defined Radio (SDR) technology has the flexibility of implementing a large part of physical layer functions in software. It is one of the major technologies that will provide broadband services to millions of US residences. However, unlike conventional radio whose RF signals are tightly regulated by FCC-certified hardware, the software components of SDR can be easily exploited by hackers to create a wide range of unauthorized waveforms to launch attacks on many security-critical wireless systems.

group_project

Visible to the public TWC: Small: Understanding and Mitigating the Security Hazards of Mobile Fragmentation

Mobile computing technologies are rapidly evolving and phone (and other mobile device) manufacturers are under constant pressure to offer new product models. Each manufacturer customizes operating system software for its devices and often changes this software to support its new models. Given the many manufacturers in the mobile device marketplace and the many different generations of products, there are many customized branches of mobile operating systems in use at any time.

group_project

Visible to the public TWC: Small: Privacy Preserving Cooperation among Microgrids for Efficient Load Management on the Grid

Smart grid integrates sensors and communication infrastructure into the existing power grid to enable operational intelligence. The concept of microgrid is emerging in conjunction with the smart grid wherein small segments of the grid can be isolated into self-sufficient islands to feed their own demand load with their local energy, e.g., wind, solar.

group_project

Visible to the public TWC: Small: Intelligent Malware Detection Utilizing Novel File Relation-Based Features and Resilient Techniques for Adversarial Attacks

Malware (e.g., viruses, worms, and Trojans) is software that deliberately fulfills the harmful intent of an attacker. It has been used as a major weapon by the cyber-criminals to launch a wide range of attacks that cause serious damages and significant financial losses to many Internet users. To protect legitimate users from these attacks, the most significant line of defense against malware is anti-malware software products, which predominately use signature-based methods to recognize threats.

group_project

Visible to the public TWC: Small: General and Modular Secure Computation in the Offline-Online Paradigm

Secure multi-party computation (MPC) allows mutually distrusting parties to securely compute over their private data. The goal of this project is to provide novel MPC solutions that are efficient and simultaneously support operations of varying complexity on the input under their respective native representations. Driven by efficiency goals, this project studies the theory of MPC protocol design in the offline-online paradigm.

group_project

Visible to the public TWC: Small: Finding Optimality in Practical Cryptography

This project aims to obtain provably optimal cryptographic constructions, using objectively practical techniques, for a wide range of tasks. To achieve this goal, the project makes progress on three technical fronts. First, a general-purpose framework is developed that encompasses and systematizes known practical cryptographic techniques from many domains. Second, the project develops techniques for proving concrete, fine-grained lower bounds about constructions within this framework. Finally, techniques from program synthesis will be applied to the new framework.

group_project

Visible to the public TWC: Small: Enhancing the Security and Performance of GPU Access in Web Browsers

Modern personal computers have embraced increasingly powerful Graphics Processing Units (GPUs), hardware components that enable high performance graphics. The software that controls the programming of these GPUs in today's computers (i.e., the graphics stack) was designed to be used by applications acquired from trustworthy developers and installed directly by the user. However, web applications (i.e., applications running inside a web browser) are gaining in popularity and WebGL is a recent industry effort to provide GPU-based graphics for web applications.

group_project

Visible to the public TWC: Small: Efficient Traffic Analysis Resistance for Anonymity Networks

Internet users concerned about their privacy, including whistleblowers and dissident citizens of totalitarian states, depend on reliable means to access Internet services anonymously. However, recent events publicized in popular press demonstrate that these services offer little privacy and anonymity in practice. For example, recent subpoena requiring Twitter to provide connection details of suspected Wikileaks supporters showed that governments can readily discover the network identities of Web users.

group_project

Visible to the public TWC: Small: Collaborative: Reputation-Escalation-as-a-Service: Analyses and Defenses

Living in an age when services are often rated, people are increasingly depending on reputation of sellers or products/apps when making purchases online. This puts pressure on people to gain and maintain a high reputation by offering reliable and high-quality services and/or products, which benefits the society at large. Unfortunately, due to extremely high competition in e-commerce or app stores, recently reputation manipulation related services have quickly developed into a sizable business, which is termed Reputation-Escalation-as-a-Service (REaaS).