TC

group_project

Visible to the public TC: Small: WATCHDOG: Hardware-Assisted Prevention of All Use-After-Free Security Vulnerabilities

A use-after-free error is a software flaw that potentially allows an attacker to remotely inject malicious software or corrupt memory values. Such attacks can result in the theft of private data, propagation of worms and viruses, or the creation of botnet nodes that can be programmed to spew spam or disrupt Internet traffic. Recently, use-after-free vulnerabilities have been found in crucial software such as Microsoft's Internet Explorer, Adobe Acrobat Reader, and Firefox among others.

group_project

Visible to the public TC: Medium: Collaborative Research: User-Controllable Policy Learning

As both corporate and consumer-oriented applications introduce new functionality and increased levels of customization and delegation, they inevitably give rise to more complex security and privacy policies. Yet, studies have repeatedly shown that both lay and expert users are not good at configuring policies, rendering the human element an important, yet often overlooked source of vulnerability.

group_project

Visible to the public TC:Large:Collaborative Research:Anonymizing Textual Data and its Impact on Utility

Data Protection laws that exempt data that is not individually identifiable have led to an explosion in anonymization research. Unfortunately, how well current de-identification and anonymization techniques control risks to privacy and confidentiality is not well understood. Neither is the usefulness of anonymized data for real-world applications. The project addresses anonymization on three fronts: 1) Textual data, even when explicit identifiers are removed (names, dates, locations), can contain highly identifiable information.

group_project

Visible to the public TC: Medium: Collaborative Research: Experience-Based Access Management (EBAM) for Hospital Information Technology

Insufficient attention has been given to enterprise Identity and Access Management (IAM) as a process that needs to be carried out on a continuing basis in the presence of change and evolution. In particular, there is little formal support for how IAM can exploit experience the enterprise collects over time.

group_project

Visible to the public TC: Medium: Higher-Level Abstractions for Trustworthy Federated Systems

This project studies higher-level abstractions for constructing distributed systems that integrate information and computation across administrative and trust domains. Current practice does not offer general, principled techniques for implementing these systems securely. To develop these techniques, fundamental problems of security, consistency, performance, and system evolution are being explored.

group_project

Visible to the public TC: Medium: Privacy and Declassification Policy Enforcement Framework

Information systems that handle personal information must adhere to legal regulations, corporate privacy policies, and contractual agreements designed to protect personal privacy. Relying exclusively on application designers and developers for such assurances is unrealistic. There is a need for methods and tools that can identify errors in the handing of personal data and provide formal assurances that personal information is handled appropriately.

group_project

Visible to the public  TC: Large:Self Protecting Electronic Medical Records

The potential benefits from electronic medical records (EMRs), including lab tests, images, diagnoses, prescriptions, and medical histories are without precedent. Patients and insurers can avoid repeating studies that, for example, expose people to additional radiation and incur unnecessary costs. Providers can instantly access patient histories , and patients can take ownership of their medical records, with the potential for greater privacy, and better access to their records when they are needed.

group_project

Visible to the public TC:Large:Collaborative Research: Towards Trustworthy Interactions in the Cloud

As one of the most promising emerging concepts in Information Technology, outsourced computation (also known as cloud computing) is transforming our perception of how IT is consumed and managed, yielding improved cost efficiencies and delivering flexible, on-demand scalability. Cloud computing reduces IT resources and services to commodities acquired and paid-for on-demand through a fast-growing set of infrastructure, platform, and service providers.

group_project

Visible to the public TC:Large:Collaborative Research:Anonymizing Textual Data and its Impact on Utility

Data Protection laws that exempt data that is not individually identifiable have led to an explosion in anonymization research. Unfortunately, how well current de-identification and anonymization techniques control risks to privacy and confidentiality is not well understood. Neither is the usefulness of anonymized data for real-world applications. The project addresses anonymization on three fronts: 1) Textual data, even when explicit identifiers are removed (names, dates, locations), can contain highly identifiable information.

group_project

Visible to the public TC: Large: Collaborative Research: Practical Privacy: Metrics and Methods for Protecting Record-level and Relational Data

Safely managing the release of data containing confidential information about individuals is a problem of great societal importance. Governments, institutions, and researchers collect data whose release can have enormous benefits to society by influencing public policy or advancing scientific knowledge. But dissemination of these data can only happen if the privacy of the respondents' data is preserved or if the amount of disclosure is limited.