Protect

group_project

Visible to the public TWC: Small: Techniques and Tools for General-Purpose Secure Computing and Outsourcing

The rapid advancement of techniques for secure computation on protected data offers a major incentive for development of tools for general-purpose secure computation that protects data privacy, as opposed to computation of specialized tasks. The recent emergence of cloud computing and the need to protect privacy of sensitive data used in outsourced computation serves as another major motivation for this work. With this in mind, this project targets at developing a compiler suitable for privacy-preserving execution of any functionality specified by a user program.

group_project

Visible to the public TWC: Medium: Collaborative: Studying Journalists to Identify Requirements for Usable, Secure, and Trustworthy Communication

This research focuses on understanding the digital security and privacy needs of journalists and their sources to evaluate and design communication technologies that better support the fundamental operations of a globally free and unfettered press. Journalists -- along with their organizations and sources -- are known to be high-risk targets for cyberattack. This community can serve as a privacy and security bellwether, motivated to use new technologies, but requiring flexibility and ease-of-use. Many existing secure tools are too cumbersome for journalists to use on a regular basis.

group_project

Visible to the public TWC: Medium: Collaborative: Measuring and Improving the Management of Today's PKI

The Public Key Infrastructure (PKI), along with the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, are responsible for securing Internet transactions such as banking, email, and e-commerce; they provide users with the ability to verify with whom they are communicating online, and enable encryption of those communications. While the use of the PKI is mostly automated, there is a surprising amount of human intervention in management tasks that are crucial to its proper operation.

group_project

Visible to the public TWC: Medium: Collaborative: Computational Blinking - Computer Architecture Techniques for Mitigating Side Channels

Computer systems increasingly perform operations on critical and confidential data. Despite best efforts to protect this information, the side effects of computations using this data, e.g., the computation time, the power consumption, electromagnetic radiation, thermal emanations, and acoustics, can be used to decipher secret information even when it is encrypted.

group_project

Visible to the public TWC: Medium: Collaborative Research: Computing on Cryptographic Data

This project is developing new techniques for manipulating sensitive data by exploring two related areas, computing on private keys and computing on authenticated data. Currently, a private key is an inert object that gives its holder the ability to perform a cryptographic operation on all messages, as may be the case when generating a signature. The project is exploring a new vision, in which computing on the private key itself creates new restricted private keys that can only perform restricted operations such as, for example, signing only some messages but not others.

group_project

Visible to the public TWC: Large: Collaborative: Living in the Internet of Things

More and more objects used in daily life have Internet connectivity, creating an "Internet of Things" (IoT). Computer security and privacy for an IoT ecosystem are fundamentally important because security breaches can cause real and significant harm to people, their homes, and their community.

group_project

Visible to the public TWC: Large: Collaborative: Computing Over Distributed Sensitive Data

Information about individuals is collected by a variety of organizations including government agencies, banks, hospitals, research institutions, and private companies. In many cases, sharing this data among organizations can bring benefits in social, scientific, business, and security domains, as the collected information is of similar nature, of about similar populations. However, much of this collected data is sensitive as it contains personal information, or information that could damage an organization's reputation or competitiveness.

group_project

Visible to the public TWC SBES: Small: Anonymity in Cyberspace

Internet users may have compelling reasons to seek anonymity online, for example, to discuss stigmatizing issues with others like themselves, or to express dissident opinions. This project studies what people believe it means to be anonymous online, how their privacy and security are affected by their strategies to achieve anonymity, and how they are likely to use new anonymity services. These questions are important because the traceability of users? actions across sites and contexts is ever greater, increasing risks for users who may misjudge their actual anonymity.

group_project

Visible to the public TWC SBE: Medium: Collaborative: Building a Privacy-Preserving Social Networking Platform from a Technological and Sociological Perspective

Social networks provide many benefits, but also give rise to serious concerns regarding privacy. Indeed, since privacy protections are not intrinsically incorporated into the underlying technological framework, user data is still accessible to the social network and is open to misuse. While there have been efforts to incorporate privacy into social networks, existing solutions are not sufficiently lightweight, transparent, and functional, and therefore have achieved only limited adoption.

group_project

Visible to the public TWC SBE: Medium: Collaborative: Brain Hacking: Assessing Psychological and Computational Vulnerabilities in Brain-based Biometrics

In September of 2015, it was reported that hackers had stolen the fingerprint records of 5.6 million U.S. federal employees from the Office of Personnel Management (OPM). This was a severe security breach, and it is an even bigger problem because those fingerprints are now permanently compromised and the users cannot generate new fingerprints. This breach demonstrates two challenging facts about the current cybersecurity landscape. First, biometric credentials are vulnerable to compromise. And, second, biometrics that cannot be replaced if stolen are even more vulnerable to theft.