TC

group_project

Visible to the public EAGER: TC: Collaborative Research: Experimental Study of Accountability in Existing Anonymous Networks

To stop anonymous tools designed for free speech from being abused by criminals, this project investigates practical solutions to trace back criminals while support free speech for benign users, by exploiting two unique perspectives. First, it utilizes the resource advantages of law enforcement to explore the limitations of anonymous tools. As criminals operated from remote locations usually do not have resources to build large-scale systems, they have to rely on existing anonymous tools with third-party resources to hide their traces.

group_project

Visible to the public TC: EAGER: Binary-based Data Structure Revelation for Memory Forensics

Today's computer users often run programs for which they do not have the source code. In some cases, those programs are viruses or other malware, and it is desirable to understand how they work in order to prevent them from causing further damage or to track down the author. Part of the process of understanding the program (sometimes called "reverse engineering")is to understand how it stores data.

group_project

Visible to the public TC: EAGER: Collaborative Research: Parallel Automated Reasoning

The security of the national computing infrastructure is critical for consumer confidence, protection of privacy, protection of valuable intellectual property, and even national security. Logic-based approaches to security have been gaining popularity, in part because they provide a precise way to describe and reason about the kinds of complexity found in real systems. Perhaps even more importantly, automated reasoning techniques can be used to assist users in navigating this complexity. Despite the promise of automated reasoning, its use in practical applications is still limited.

group_project

Visible to the public TC: EAGER: Collaborative Research: Parallel Automated Reasoning

The security of the national computing infrastructure is critical for consumer confidence, protection of privacy, protection of valuable intellectual property, and even national security. Logic-based approaches to security have been gaining popularity, in part because they provide a precise way to describe and reason about the kinds of complexity found in real systems. Perhaps even more importantly, automated reasoning techniques can be used to assist users in navigating this complexity. Despite the promise of automated reasoning, its use in practical applications is still limited.

group_project

Visible to the public TC: Medium: Understanding and Managing the Impact of Global Inference on Online Privacy

Correlation of seemingly innocuous information can create inference chains that tell much more about individuals than they are aware of revealing. However, while media coverage occasionally draws attention to privacy leaks on individual web sites, there is still no comprehensive analysis of the fundamental risks that users face in their online worlds. This project pursues such a study, focusing in particular on the threat of personal, yet publicly available information that can be correlated with modern multimedia retrieval and content analysis technologies.

group_project

Visible to the public TC: EAGER: New Privacy Preserving Architecture for Security Monitoring in Cloud Computing

This research studies new mechanisms for enabling the consumer of the service to reduce the visibility of consumer computations to the service provider and thereby reduce the trust that the consumer places in the provider. At the same time, the mechanisms allow security of the cloud computing environment to be monitored by a trusted third party. The work also develops a quantified method to evaluate the degree to which a user's privacy is disclosed and tools for monitoring causality relationships.

group_project

Visible to the public TC: Small: Integrating Privacy Preserving Biometric Templates and Efficient Indexing Methods

Biometrics, such as fingerprints, provide a great tool for personalized authentication. While people are usually willing to submit their biometric information to government agencies, they are less likely to do so for commercial companies without a guarantee of privacy protection. This project will have significant societal impact by triggering wide acceptability of large-scale biometrics enabled applications.

group_project

Visible to the public TC: Small: Simplification of Obfuscated Executables

Programs with potentially malicious content are becoming increasingly common. Such programs are usually highly obfuscated, using a variety of techniques that make it difficult to analyze the code, figure out its internal logic, and develop countermeasures. Existing tools for reverse engineering such programs are primitive and require a great deal of tedious and time-consuming manual intervention, which hampers the timely development of defenses against newly discovered malware.

group_project

Visible to the public TC:Large:Collaborative Research:Anonymizing Textual Data and its Impact on Utility

Data Protection laws that exempt data that is not individually identifiable have led to an explosion in anonymization research. Unfortunately, how well current de-identification and anonymization techniques control risks to privacy and confidentiality is not well understood. Neither is the usefulness of anonymized data for real-world applications. The project addresses anonymization on three fronts: 1) Textual data, even when explicit identifiers are removed (names, dates, locations), can contain highly identifiable information.

group_project

Visible to the public TC: Small: New Directions in Side Channel Attacks and Countermeasures

This project develops new and promising techniques in the area of side-channel attacks and their corresponding countermeasures. In a side-channel attack, an attacker captures the implementation effects of cryptography, such as power consumption and execution time. A distinctive feature of a side-channel analysis (SCA) attack is that it can reveal a small part of the secret-key. Hence, side-channel attacks avoid the brute-force complexity of cryptanalysis. Using novel side-channel estimation techniques based on Bayesian statistics, the project develops more powerful side-channel attacks.