Special Projects-CISE

group_project

Visible to the public Applied Privacy Research Coordination Network: An Industry-Academic Network to Transition Promising Privacy Research to Practice

The Future of Privacy Forum Education and Innovation Foundation (FPF EIF) is establishing the Applied Privacy Research Coordination Network (Applied Privacy RCN) to support the transition of academic privacy research to commercial practice by providing ongoing, structured networking and opportunities for privacy scholars to meet industry leaders involved in their research areas and develop working partnerships. The Applied Privacy RCN will promote new knowledge, techniques and practices to better protect individual privacy.

group_project

Visible to the public SHF: Small: Adapting VLSI Test Principles for VLSI Trust

If an Integrated Circuit (IC) is designed and fabricated in a foundry that is outside the direct control of the (fab-less) design house, reverse engineering, malicious circuit modification, and Intellectual Property (IP) piracy are all possible. An attacker, anywhere in this design flow, can reverse engineer the functionality of design, and steal and claim ownership of the IP. An untrustworthy IC foundry may overbuild ICs and sell the excess parts in the gray market.

group_project

Visible to the public SaTC: CORE: Small: Practical and Robust Hidden Voice Commands

Systems like Amazon's Alexa, Google Home and Apple's Siri allow users to issue voice commands and pose questions to personal digital assistants. Since these systems often have access to sensitive data and can perform tasks with serious impact (e.g., spend money to make a purchase), attacks against them could have significant consequences. Unfortunately, recent research has shown that attacks against such voice-based interfaces are feasible.

group_project

Visible to the public EAGER: PUF-Locked Circuit Obfuscation for Counterfeit and Piracy Prevention

The economic impacts and security hazards of hardware piracy is not apt to be neglected compared to software, but is even more severe. The loss due to global hardware piracy has now reached the level of billions per month, with a major share in almost all electronic devices. It was reported by the Alliance for Gray Market and Counterfeit Abatement that about 10% of the start-of-the-art technology products available on market are counterfeits.

group_project

Visible to the public Identifying Research Approaches, Technologies, Options, and Tradeoffs for Encrypted Communications Access

This National Academies study examines the tradeoffs associated with mechanisms to provide authorized government agencies with access to the plaintext version of encrypted information. The study describes the context in which decisions about such mechanisms would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information sought by the government for law enforcement or intelligence investigations.