TC

group_project

Visible to the public TC: Medium: Collaborative Research: Program Analysis for Smartphone Application Security

This project investigates a new approach for describing and reasoning about security properties of smartphone applications. Smartphones are becoming pervasive, and smartphone applications are increasingly used for a variety of social, health, scientific, and military purposes. However, the capabilities these phones provide, such as access to GPS, camera, Internet, calendar, contacts, and other sensitive information can lead to major security risks. Today's smartphone development methodologies do little to help developers construct applications that safely access sensitive resources.

group_project

Visible to the public TC: Medium: Collaborative Research: Building Trustworthy Applications for Mobile Devices

Mobile handheld devices such as smartphones, PDAs, and smart media players have outpaced the growth of wired hosts, and are emerging as the predominant vehicle for Internet access. In recent years, newer mobile phones, including various versions from Apple, Google, Nokia, and others, have promoted greater programmability, radically changing the age-old model of mobile phones being a closed platform. However, openness arrives with new challenges of trustworthiness.

group_project

Visible to the public TC: Medium: Reimagining Cryptography by Identifying its Culturally-Rooted Assumptions

In the last few years, universally composable (UC) security, defined and extensively investigated by Ran Canetti, has become a popular and important topic in modern cryptography. Canetti's notion has enormous appeal, promising a unified framework under which one can define virtually any cryptographic protocol goal, and further promising that the resulting definitions will be composable in the sense that a protocol solution for some goal will comprise a suitable primitive to use within any other protocol that desires its abstracted functionality.

group_project

Visible to the public TC: Medium: Collaborative Research: Unification Laboratory: Increasing the Power of Cryptographic Protocol Analysis Tools

The project develops cryptographic protocol reasoning techniques that take into account algebraic properties of cryptosystems. Traditionally, formal methods for cryptographic protocol verification view cryptographic operations as a black box, ignoring the properties of cryptographic algorithms that can be exploited to design attacks. The proposed research uses a novel approach based on equational unification to build new more expressive and efficient search algorithms for algebraic theories relevant to cryptographic protocols.

group_project

Visible to the public TC: Small: Scalable Censorship Resistant Overlay Networks

Freedom of speech is a founding principle of democratic society, and the Internet has become one of the most effective and common means of conveying expression that is likely to be controversial or suppressed. One threat to the freedom of speech online is the now widespread practice of Internet censorship by both private and state interests. These censors use a variety of social and technological means to limit availability or expression of information, stifling the democratic process.

group_project

Visible to the public TC: Small: V2M2: Towards a Verified Virtual Machine Monitor

Virtualization is rapidly becoming a key technology for computing systems, promising significant benefits in security, efficiency, and dependability. Fully realizing these benefits depends upon the reliability of virtual machine monitors (hypervisors).

group_project

Visible to the public TC: Small: Collaborative Research: Trustworthy Hardware from Certified Behavioral Synthesis

Electronic System Level ( ESL ) designs , specified behaviorally using high-level languages such as SystemC , raise the level of hardware design abstraction . This approach crucially depends on behavioral synthesis , which compiles ESL designs to Register Transfer Level ( RTL ) designs . However , optimizations performed by synthesis tools make their implementation error-prone , undermining the trustworthiness of synthesized hardware. This research develops a mechanized infrastructure for certifying hardware designs generated by behavioral synthesis .

group_project

Visible to the public TC: Small: Formalizing Operator Task Analysis

Computer systems are commonly coupled with human operators who add hands, eyes, and judgment to the computer programming and its sensors and actuators. The operators can be viewed as programming platforms in their own right, where manuals, training, and system feedback provide the programming. However, operators have unique platform characteristics compared to computers, including, in particular, the likelihood of making numerous and diverse errors.

group_project

Visible to the public TC: Small: Keeping Jack in the Box: Confining the Role of Untrusted Inputs in Web Scenarios

A significant number of attacks on Web browsers and Web applications are successful through the use of malicious inputs. For instance, attacks on web browser extensions target browsers by exploiting vulnerable extensions (add-ons) by supplying malicious input. Malicious inputs exercise unintended behaviors leading to attacks that compromise confidentiality, integrity and availability of web-based systems.

group_project

Visible to the public  TC: Small: Informing Users of Their Privacy in Practice

This project proposes to inform computer users of the privacy that they receive in practice. To do so, the project will record network and system measurements of laptop and desktop computers as they are used. It will then analyze those measurements to discover what personal information is exposed to whom and by which applications. This will be done as real users undertake real tasks to produce individual privacy assessments.