TC

group_project

Visible to the public TC: Small: Collaborative Research:Models and Techniques for Enterprise Network Security Metrics

This research investigates efficient and effective quantitative risk analytics methods for enterprise network security. The research uses attack graphs, a widely used and well-tested technique for enterprise network security analysis, as the foundation to build a metric model. It aims to produce a theoretically sound model with extensive empirical evaluation on continuous fresh data from production networks.

group_project

Visible to the public TC: Small: Collaborative Research: Exploration and Validation of Hardware Primitives for Security and Trust

Hardware-level security and trust in many of society's microelectronic-based infrastructures, e.g., transportation, energy, etc., is inadequate. This project investigates chip-level hardware primitives that are designed to improve the security and trust in such systems. In particular, many security mechanisms depend on a secret, unique identifier that is associated with the chip or board in the system. An embedded digital signature inserted by the manufacturer is not secure because it can be extracted by adversaries.

group_project

Visible to the public TC: Small: Higher-Speed Cryptography

Internet users can now use https://www.google.com instead of http://www.google.com, protecting their text searches against espionage and sabotage by network attackers. However, Google still does not support encryption for high-volume data such as images and maps.

group_project

Visible to the public TC: Small: Collaborative Research: Symbiosis in Byzantine Fault Tolerance and Intrusion Detection

Two principal components for providing protection in large-scale distributed systems are Byzantine fault-tolerance (BFT) and intrusion detection systems (IDS). BFT is used to implement strictly consistent replication of state in the face of arbitrary failures, including those introduced by malware and Internet pathogens. Intrusion detection relates to a broad set of services that detect events that could indicate the presence of an ongoing attack. IDSs are far from perfect -- they can both miss attacks or misinterpret events as being malicious.

group_project

Visible to the public TC: Small: Collaborative Research: Symbiosis in Byzantine Fault Tolerance and Intrusion Detection

Two principal components for providing protection in large-scale distributed systems are Byzantine fault-tolerance (BFT) and intrusion detection systems (IDS). BFT is used to implement strictly consistent replication of state in the face of arbitrary failures, including those introduced by malware and Internet pathogens. Intrusion detection relates to a broad set of services that detect events that could indicate the presence of an ongoing attack. IDSs are far from perfect -- they can both miss attacks or misinterpret events as being malicious.

group_project

Visible to the public TC: Small: LockBox: Enabling Users to Keep Data Safe

Modern computer security requires bug-free code at every layer of the software stack. But in a world where operating systems and hypervisors are increasingly buggy, it can be dangerous to assume these components are trustworthy. LockBox provides an additional layer of security such that if the operating system or other system management software fails, certain portions of the system remain resistant to attack.

group_project

Visible to the public TC: Small: EDICT: Evaluation and Design of IC's for Trustworthiness

High cost differentials are causing many steps of IC manufacturing to increasingly move overseas. This project considers the problem of evaluating trustworthiness of digital ICs fabricated by untrusted vendors who may insert hardware Trojans. The proposed EDICT framework (Evaluation and Design of IC's for Trustworthiness) tackles two main challenges, namely the unavailability of a gold-standard chip combined with high process variations, and the fact that Trojans are introduced by intelligent adversaries.

group_project

Visible to the public TC: Small: Designing New Authentication Mechanisms using Hardware Capabilities in Advanced Mobile Devices

Authentication is a quintessential problem in computer security. However, most commonly used authentication mechanisms suffer from a variety of shortcomings. Passwords, the most common authentication mechanism, are vulnerable to replay attacks. Physical authentication tokens overcome some of these problems; however, they face deployment and compatibility obstacles.

group_project

Visible to the public TC: EAGER: Investigations of Next-generation Network Reconnaissance Attack Techniques and Limitations

This goal of this project is to investigate next-generation network attack reconnaissance techniques, and explore the limitation for existing defenses. The result of this investigation offers understanding of potential game-changing in network reconnaissance attacks and how they can evolve in order to enable discovering and navigating the network quickly and safely. The project particularly explores novel scanning techniques to discover firewall security polices remotely via intelligent active probing, and without probing the end-hosts.

group_project

Visible to the public EAGER: TC: Collaborative Research: Experimental Study of Accountability in Existing Anonymous Networks

To stop anonymous tools designed for free speech from being abused by criminals, this project investigates practical solutions to trace back criminals while support free speech for benign users, by exploiting two unique perspectives. First, it utilizes the resource advantages of law enforcement to explore the limitations of anonymous tools. As criminals operated from remote locations usually do not have resources to build large-scale systems, they have to rely on existing anonymous tools with third-party resources to hide their traces.