TC

group_project

Visible to the public TC: Large: Collaborative Research: Anonymizing Textual Data and its Impact on Utility

Data Protection laws that exempt data that is not individually identifiable have led to an explosion in anonymization research. Unfortunately, how well current de-identification and anonymization techniques control risks to privacy and confidentiality is not well understood. Neither is the usefulness of anonymized data for real-world applications. The project addresses anonymization on three fronts: 1) Textual data, even when explicit identifiers are removed (names, dates, locations), can contain highly identifiable information.

group_project

Visible to the public TC:Large:Collaborative Research:Practical Privacy: Metrics and Methods for Protecting Record-level and Relational Data

Safely managing the release of data containing confidential information about individuals is a problem of great societal importance. Governments, institutions, and researchers collect data whose release can have enormous benefits to society by influencing public policy or advancing scientific knowledge. But dissemination of these data can only happen if the privacy of the respondents' data is preserved or if the amount of disclosure is limited.

group_project

Visible to the public TC:Large:Collaborative Research: Towards Trustworthy Interactions in the Cloud

As one of the most promising emerging concepts in Information Technology, outsourced computation (also known as cloud computing) is transforming our perception of how IT is consumed and managed, yielding improved cost efficiencies and delivering flexible, on-demand scalability. Cloud computing reduces IT resources and services to commodities acquired and paid-for on-demand through a fast-growing set of infrastructure, platform, and service providers.

group_project

Visible to the public TC: Small: Security Provisioning for Cognitive Radio Networks

The emerging wireless paradigm of dynamic spectrum access via cognitive radio technology has been increasingly recognized for its great potential in drastically enhancing spectrum utilization efficiency. The basic requirements of cognitive radio networks (CRNs) are to protect licensed primary users and provide reliable dynamic spectrum access to secondary cognitive users, which give rise to a new fundamental issue in spectrum access related security.

group_project

Visible to the public TC: Small: Mobile Phone Password Managers: An Evaluation and a Re-Design based on Human-Perceptible Communication

Textual passwords and personal identification numbers (PINs) are the most dominant means of authentication used currently; and this trend is very likely to continue in the future. However, passwords are either difficult to use (if they are long and randomly generated), or insecure (if users are given the choice of their own passwords).

group_project

Visible to the public TC: Small: Collaborative Research: An Argumentation-based Framework for Security Management

Computer users are increasingly faced with decisions that impact their personal privacy and the security of the systems they manage. The range of users confronting these challenges has broadened from the early days of computing to include everyone from home users to administrators of large enterprise networks. Privacy policies are frequently obscure, and security settings are typically complex. Missing from the options presented to a user is a decision support mechanism that can assist her in making informed choices.

group_project

Visible to the public TC: Small: Security Architectures for Smartphones

Modern smartphones from Apple, Google, and others have remarkably complex security needs. Applications, installed from a variety of third-party vendors, must be separated from one other, since some might be buggy or malicious, yet they must also communicate and share in a variety of ways, including displaying multimedia, sharing authentication credentials, and acting as local proxies for remote Internet sites to support payment services, advertisements, and so forth.

group_project

Visible to the public TC: Small: Algorithmics and Security of Lattice Cryptography

Lattice cryptography is a cutting-edge area of cryptology which has the potential to deliver new and better solutions to many security problems. Lattice algorithms are routinely used to attack and analyze the security of lattice cryptography. However, our current understanding of state-of-the-art lattice algorithms is weak. As a result, the usability of lattice cryptography is severely limited by the lack of high confidence security estimates. Lattice algorithms are investigated, with the goal of providing better understanding of known algorithms, and develop new algorithms as well.

group_project

Visible to the public TC: Small: Collaborative Research: An Argumentation-based Framework for Security Management

Computer users are increasingly faced with decisions that impact their personal privacy and the security of the systems they manage. The range of users confronting these challenges has broadened from the early days of computing to include everyone from home users to administrators of large enterprise networks. Privacy policies are frequently obscure, and security settings are typically complex. Missing from the options presented to a user is a decision support mechanism that can assist her in making informed choices.

group_project

Visible to the public TC: Small: A Secure Trojan-Resistant Application-Specific Integrated Circuit Architecture

Globalization and horizontal stratification of the semiconductor industry has exacerbated the threat of a compromise in the integrated circuit manufacturing supply chain. Specifically, intellectual property theft, unauthorized production, and hardware Trojan horse insertion are of significant concern. Further, the proliferation of advanced semiconductor fabrication equipment and expertise has enabled novel attacks against integrated circuits in the field.