TC

group_project

Visible to the public TC: Small: Anchoring Trust with a Verified Reference Kernel

Many complex software-based systems must be certified in order to be deployed in safety-critical environments. Modern software certification processes require trustworthy evidence supporting the verification claims. While verification tools have made tremendous gains in power, they lack the ability to generate concise and independently checkable evidence. The V Kernel project develops a practical approach to reconciling trust and automation. The claims generated by the fast but untrusted front-line verification tools are certified offline by slower but verified back-end checkers.

group_project

Visible to the public TC: Small: Runtime and Static Analysis for Web Application Security

Web applications are prevalent and enable much of today's online business including banking, shopping, university admissions, and various governmental activities. However, the quality of such applications is usually low, and they are increasingly popular targets for attack. This project aims at developing practical testing and analysis mechanisms and tools to secure web applications.

group_project

Visible to the public TC: EAGER: Measuring Architectures for Resilient Security (MARS)

A system has resilient security if it retains a degree of secure functioning despite the compromise of some components. Since vulnerable components will long be in widespread use, resilient security is what counts against sophisticated adversaries with persistent footholds in American systems.

Resiliency infrastructures can help secure application components that may have many intrinsic weaknesses. They can structure systems so the risk of successful attack can be meaningfully measured.

group_project

Visible to the public TC:Medium:Collaborative Research:Foundations, Architectures, and Methodologies for Secure and Private Cyber-Physical Vehicles

Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular networks and bridged to external networks as well. While this transformation has driven major advancements in efficiency, safety and convenience, it has also introduced a broad range of new potential risks.

group_project

Visible to the public TC:Medium: Collaborative Research: Towards Formal, Risk Aware Authorization

Traditional security authorization decisions are black and white: a user either satisfies a particular access policy or does not. This rigidity is a handicap in our complex and unpredictable world. As a result, even security-conscious organizations typically grossly overprovision principals with access rights and/or underconstrain access policies to ensure that principals can always carry out the organization's mission effectively and respond to unexpected opportunities and challenges.

group_project

Visible to the public TC: Medium: Collaborative Research: Towards Formal, Risk-Aware Authorization

Traditional security authorization decisions are black and white: a user either satisfies a particular access policy or does not. This rigidity is a handicap in our complex and unpredictable world. As a result, even security-conscious organizations typically grossly overprovision principals with access rights and/or underconstrain access policies to ensure that principals can always carry out the organization's mission effectively and respond to unexpected opportunities and challenges.

group_project

Visible to the public TC: Medium: Collaborative Research: Experience-Based Access Management (EBAM) for Hospital Information Technology

Insufficient attention has been given to enterprise Identity and Access Management (IAM) as a process that needs to be carried out on a continuing basis in the presence of change and evolution. In particular, there is little formal support for how IAM can exploit experience the enterprise collects over time.

group_project

Visible to the public TC: Medium: Dissemination and Analysis of Private Network Data

The goal of this research project is to enable statistical analysis and knowledge discovery on networks without violating the privacy of participating entities. Network data sets record the structure of computer, communication, social, or organizational networks, but they often contain highly sensitive information about individuals. The availability of network data is crucial for analyzing, modeling, and predicting the behavior of networks.

group_project

Visible to the public TC: Medium: Collaborative Research: Pay-as-you-Go Security and Privacy for Integrated Transportation Payment Systems

Pay-as-you-Go investigates security and privacy for Integrated Transportation Payment Systems (ITPS). The research addresses integrated payments for trains, subways, buses, ferries, and recharging of electric cars, as well as toll collection for roads, bridges, and tunnels. Multi-disciplinary aspects include novel cryptographic protocols and lightweight implementations of privacy-preserving payment systems. Challenges include providing security and privacy in a low-cost, usable, and reliable manner.

group_project

Visible to the public TC: Medium: Collaborative Research: Towards Formal, Risk-Aware Authorization

Traditional security authorization decisions are black and white: a user either satisfies a particular access policy or does not. This rigidity is a handicap in our complex and unpredictable world. As a result, even security-conscious organizations typically grossly overprovision principals with access rights and/or underconstrain access policies to ensure that principals can always carry out the organization's mission effectively and respond to unexpected opportunities and challenges.