TC

group_project

Visible to the public TC: Small: Securing the Router Infrastructure of the Internet

The Internet represents essential communication infrastructure that needs to be protected from malicious attacks. Many existing attacks and corresponding defense mechanisms have focused on the computers connected to the Internet rather than the network infrastructure itself. However, the network can also be attacked since modern network components use software and hardware components that can exhibit vulnerabilities that have not been previously studied.

group_project

Visible to the public TC: Small: Secrecy-Preserving Reasoning: Foundations, Algorithms, and Software

This proposal is developing theoretical foundations as well as algorithms and software for secrecy-preserving reasoning. The key novel idea, rather different from existing work, is to exploit the indistinguishability (as far as the querying agent is concerned) between secret information, on one hand, and incomplete information, on the other hand, under the open world semantics.

group_project

Visible to the public TC: Small: RUI: Digital Laser Microscopy Analysis of Active, Altered, and Damaged Storage Media for Security and Digital Forensic Recovery

Digital storage media failure is a common occurrence, but an understanding of the mechanisms for the failure can be elusive and have far reaching implications. This project utilizes a digital laser microscope to investigate the impact of physical and environmental manipulation of digital storage media on failure rates and data recoverability. This investigation into the physical characteristics of digital media is establishing failure thresholds and their suitability for data recovery.

group_project

Visible to the public TC: Small: Theory and Applications of Min-Entropy Leakage

In this age of identity theft, Facebook, and TSA screening, protecting confidential information from improper disclosure has emerged as a fundamental issue for trustworthy computing, involving both technical and social dimensions. While it is sometimes possible to stop undesirable information flows completely, it is perhaps more typical that some undesirable flows are unavoidable. For instance an ATM machine that rejects an incorrect PIN thereby reveals that the secret PIN is not the one that was entered.

group_project

Visible to the public TC: Small: Protecting Wireless Medical Devices

A mobile health monitoring system generates and monitors data related to a patient?s health using a wireless or wired channel. It may also control dosages of medicine or alter the behavior of medical devices to preserve a patient?s health. Such continuous monitoring and control gives mobile health monitoring systems the promise of improving health for lower costs than traditional methods. The security of mobile health monitoring systems is critical because of the importance of their tasks and the vulnerability of the devices and their operating environments.

group_project

Visible to the public TC: Small: Collaborative Research: Membership Inference in a Differentially Private World and Beyond

The objective of the proposed research is to systematically understand, evaluate and contribute towards the problem of membership inference in aggregate data publishing, a generic, novel, and dangerous privacy threat in a wide variety of real-world applications. The main idea proposed to address the problem of membership inference is an information-theoretic model of privacy disclosure as a noisy communication channel.

group_project

Visible to the public TC: Small: An Empirical Study of Text-based Passwords and Their Users

Text-based passwords are the most commonly used mechanism for authenticating users to computer systems, but are often easy for attackers to compromise. To mitigate the danger of such attacks, system administrators use password-composition policies, which force newly created passwords to adhere to a set of requirements intended to make them harder to guess.

group_project

Visible to the public TC: Small: Automatically Identifying Botnet Command and Control Infrastructures

Unfortunately, cyber crime has become a business today. In contrast to the Internet security situation ten years ago, most of the significant Internet attacks today aim to make a financial profit. A popular and effective choice of criminals today for sending spam, stealing data, and launching attacks are so called bots -- a type of malware that is written with the intent of compromising and taking control of hosts on the Internet. The main distinguishing characteristic of a bot compared to other types of malware is that a bot is able to establish a command and control (C&C) channel.

group_project

Visible to the public TC: Small: A Cryptographic Treatment of the Wiretap Channel

This project provides communication security in a new way, based on channel noise rather than standard cryptographic constructs and algorithms. The idea is old, from work in the 1970s in the information-theory and coding field, but this classical work used weak security metrics and even then was not able to provide any explicit and practical designs. This research bridges the gap between this classical work and modern cryptography.

group_project

Visible to the public TC: Small: Building an Infrastructure for Computer Security History: Phase One -- Mainframes to the Advent of the World Wide Web, 1965-early 1990s

This project will aid understanding of the emergence of computer security. It will examine key computer-security concepts and approaches in the domains of government, universities, industry, and criminal justice. Project activities include: [A] Conducting 30 detailed Oresearch gradeO oral histories with key figures in the field. Transcripts will be publicly available on the website of the Charles Babbage Institute. [B] Collecting and archiving valuable documentary materials, including reports, correspondence, and grey literature, again to be accessible at CBI.