TC

group_project

Visible to the public TC: Small: Collaborative Research: Provable Security from Group Theory and Applications

Information technology is an established component of the infrastructure of modern societies, and cryptography is a cornerstone of information security. Provable security quantifies the resilience of cryptographic constructions to attacks. This quantification is often relative to the hardness of a handful of reference "intractable" problems like integer factorization. Because of the intrinsic strength of heterogeneity, diversifying the set of intractable problems enhances the robustness of the overall structure.

group_project

Visible to the public TC: Small: Real-Time Intrusion Detection for VoIP over IEEE 802.11 Based Wireless Networks: An Analytical Approach for Guaranteed Performance

Voice over IP (VoIP) over IEEE 802.11 based wireless networks leads to a promising all-IP platform provisioning economic high-quality voice services to mobile users anytime and anywhere. Due to the openness and distributed nature of the protocols involved in the VoIP over wireless, it becomes easy for malicious users to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This project develops a real-time intrusion detection framework, requiring no modification to the relevant standard protocols.

group_project

Visible to the public TC: Small: RUI: Trails of Trustworthiness, Understanding and Supporting Quality of Information in Real-Time Streams

The last decade has seen the tremendous growth of the so-called Social Web and this trend is expected to continue in the years to come. As the distinction between the Web and the Social Web disappears, more and more people turn to them daily for information related to important medical, financial and political decisions. Therefore, there is an indisputable need for reliable information in the online world.

group_project

Visible to the public TC: Small: Exploring Malware Detection on Mobile Platforms

Mobile devices such as smartphones, netbooks and laptops are increasingly beginning to store vast amounts of personal information, such as email, friend lists, current location, and passwords to online banking websites. They are therefore swiftly becoming prized bounties for malicious entities. This project is investigating new techniques to detect malicious software on mobile devices.

group_project

Visible to the public TC: Small: Adaptive Differentially Private Data Release

Current information technology enables many organizations to collect, store, and use massive amount and various types of information about individuals. Governments and other organizations increasingly recognize the critical value and enormous opportunities in sharing such a wealth of information. However data privacy has been a major barrier for such information sharing, bringing much attention to privacy preserving data publishing and analysis techniques. Differential privacy is widely accepted as one of the strongest unconditional privacy guarantees.

group_project

Visible to the public TC: Small: New Directions in Encryption

New application scenarios (most notably arising from cloud computing) have given rise to a host of new security concerns. Unsurprisingly, classical notions of encryption leave much to be desired for dealing with these new application scenarios and concerns. Motivated by these concerns, we develop novel encryption systems that provide vastly greater functionality than classical notions of encryption. In particular, we focus on two broad research directions: Functional encryption and Efficient Secure Encodings of Computation.

group_project

Visible to the public TC: Small: Towards Resettable & Statistical Security in Zero Knowledge

Recent cyber attacks have shown the degree of vulnerability on the individual to the corporate to national level. Everyone is vulnerable, from the consumer using a credit card to make an online purchase, to the multi-national corporation whose systems are hacked, to national infrastructure and defense networks.

group_project

Visible to the public TC: Small: Risk Aware Query Processing in Mixed Security Database Environments

During database query processing, data migrates across different system components each of which may offer different levels of security guarantees and may be susceptible to different attacks. If the underlying data (or part of it) is sensitive, data migration, especially from secure components to those that are relatively insecure could increase risk of data loss.

group_project

Visible to the public TC: Small: THWART: Trojan Hardware in Wireless ICs - Analysis and Remedies for Trust

Towards enhancing trustworthiness of wireless integrated circuits, this project investigates the problem of hardware Trojans in the analog/RF domain. Hardware Trojans are maliciously-intended modifications to fabricated integrated circuits, making them capable of additional functionality which is unknown to the designer and user, but which can be exploited by the perpetrator after chip deployment to sabotage or incapacitate it, or to steal sensitive information.

group_project

Visible to the public TC: Medium: Collaborative Research: Security Services in Open Telecommunications Networks

This award is funded under the American Recovery and Reinvestment Act of 2009 (Public Law 111-5).

The nature of telecommunications networks is rapidly changing.

Commodity smart