Protect

group_project

Visible to the public Capacity Building: Collaborative Research: Integrated Learning Environment for Cyber Security of Smart Grid

Ensuring the cyber-security of the smart grid raises significant interest amongst both general public and researchers. However, the corresponding education programs fall behind in many aspects. Very limited curriculum or hands-on learning resources are available for security education about the smart grid, especially for the mutual impacts between cyber and physical systems.

group_project

Visible to the public AF: Small: Minimalist cryptography

Modern cryptography offers an impressive virtual buffet to a consumer who is wealthy in resources, with powerful tools like fully homomorphic encryption (which allows a provider to compute with encrypted values while keeping the client's data safe) and general purpose obfuscation (which allows one to hide the purpose of a given computation). But for more modestly minded users, who seek to perform less lofty tasks using more affordable computing resources or under more time-tested assumptions, the offerings are comparatively paltry.

group_project

Visible to the public CAREER: Sensible Privacy: Pragmatic Privacy Controls in an Era of Sensor-Enabled Computing

Social networking and sensor-rich devices such as smartphones are becoming increasingly pervasive in today's society. People can share information concerning their location, activity, fitness, and health with their friends and family while benefiting from applications that leverage such information. Yet, users already find managing their privacy to be challenging, and the complexity involved in doing so is bound to increase.

group_project

Visible to the public CAREER: Secure and Trustworthy Ocular Biometrics

The need for accurate and unforgeable identity recognition techniques has become an issue of increasing urgency. Biometric approaches such as iris recognition hold huge promise but still have significant limitations, including susceptibility to 'spoofing'. This project seeks to advance our knowledge of security and accuracy of multibiometric systems by inventing, evaluating, and applying innovative methods and tools to combine highly accurate static traits, such as iris patterns, with novel traits based on the dynamics of eye movements.

group_project

Visible to the public TWC: Frontier: Privacy Tools for Sharing Research Data

Information technology, advances in statistical computing, and the deluge of data available through the Internet are transforming computational social science. However, a major challenge is maintaining the privacy of human subjects. This project is a broad, multidisciplinary effort to help enable the collection, analysis, and sharing of sensitive data while providing privacy for individual subjects.

group_project

Visible to the public CAREER: Automatic Learning of Adaptive Network-Centric Malware Detection Models

Malicious software (a.k.a. malware) is at the basis of most cyber-criminal operations, causing significant financial loss and posing great risks to national security.

group_project

Visible to the public TC: Large: Collaborative Research: Privacy-Enhanced Secure Data Provenance

Data provenance refers to the history of the contents of an object and its successive transformations. Knowledge of data provenance is beneficial to many ends, such as enhancing data trustworthiness, facilitating accountability, verifying compliance, aiding forensics, and enabling more effective access and usage controls. Provenance data minimally needs integrity assurance to realize these benefits.

group_project

Visible to the public TC: Large: Collaborative Research: Practical Secure Two-Party Computation: Techniques, Tools, and Applications

Many compelling applications involve computations that require sensitive data from two or more individuals. For example, as the cost of personal genome sequencing rapidly plummets many genetics applications will soon be within reach of individuals such as comparing one?s genome with the genomes of different groups of participants in a study to determine which treatment is likely to be most effective. Such comparisons could have tremendous value, but are currently infeasible because of the privacy concerns both for the individual and study participants.

group_project

Visible to the public TC: Large: Collaborative Research: Privacy-Enhanced Secure Data Provenance

Data provenance refers to the history of the contents of an object and its successive transformations. Knowledge of data provenance is beneficial to many ends, such as enhancing data trustworthiness, facilitating accountability, verifying compliance, aiding forensics, and enabling more effective access and usage controls. Provenance data minimally needs integrity assurance to realize these benefits.

group_project

Visible to the public CAREER: Secure and Reliable Outsourced Storage Systems Using Remote Data Checking

When data is outsourced at a cloud storage provider, data owners lose control over the integrity of their data and must trust the storage provider unconditionally. Coupled with numerous data loss incidents, this prevents organizations from assessing the risk posed by outsourcing data to untrusted clouds, making cloud storage unsuitable for applications that require long-term security and reliability guarantees. This project establishes a practical remote data checking (RDC) framework as a mechanism to provide long-term integrity and reliability for remotely stored data.