Protect

group_project

Visible to the public  TWC: Large: Collaborative: Verifiable Hardware: Chips that Prove their Own Correctness

This project addresses how semiconductor designers can verify the correctness of ICs that they source from possibly untrusted fabricators. Existing solutions to this problem are either based on legal and contractual obligations, or use post-fabrication IC testing, both of which are unsatisfactory or unsound. As a sound alternative, this project designs and fabricates verifiable hardware: ICs that provide proofs of their correctness for every input-output computation they perform in the field.

group_project

Visible to the public TWC: Medium: Collaborative: New Protocols and Systems for RAM-Based Secure Computation

Secure computation allows users to collaboratively compute any program on their private data, while ensuring that they learn nothing beyond the output of the computation. Existing protocols for secure computation primarily rely on a boolean-circuit representation for the program being evaluated, which can be highly inefficient. This project focuses on developing secure-computation protocols in the RAM model of computation. Particularly challenging here is the need to ensure that memory accesses are oblivious, and do not leak information about private data.

group_project

Visible to the public CAREER: The Value of Privacy

This project takes a new approach to problems involving sensitive data, by focusing on rigorous mathematical modeling and characterization of the value of private information. By focusing on quantifying the loss incurred by affected individuals when their information is used -- and quantifying the attendant benefits of such use -- the approaches advanced by this work enable concrete reasoning about the relative risks and rewards of a wide variety of potential computations on sensitive data.

group_project

Visible to the public TWC: Small: Bridging the Gap Between Cutting-Edge Cryptography and Practice

The cloud is becoming increasingly integral to our daily lives, the business ecosystem, and society at large. Recently, cutting-edge cryptosystems have been developed that provide the first-ever theoretical solutions to many cloud-related tasks. Such tasks include fine-grained access control to encrypted data, broadcasting to a set of recipients with minimal communication overhead, hiding secrets in public code, and much more.

group_project

Visible to the public  SaTC: STARSS: Design of Low-Cost Memory-Based Security Primitives and Techniques for High-Volume Products

Ensuring a high level of security and reliability in the electronic computing devices is a significant challenge. Central issues include secure and reliable identification, authentication and integrity checking of underlying hardware. Hardware-based security primitives such as physical unclonable functions (PUFs) are still a work-in-progress in terms of the cost they require to guarantee reliable operation and their resistance to physical attacks.

group_project

Visible to the public TWC: Small: Using a Capability-Enhanced Microkernel as a Testbed for Language-based Security (CEMLaBS)

This project is investigating the potential for language-based security techniques in the construction of low-level systems software. The specific focus is on the development of an open, capability-enhanced microkernel whose design is based on seL4, a "security enhanced" version of the L4 microkernel that was developed, by a team in Australia, as the first fully verified, general purpose operating system.

group_project

Visible to the public EAGER: Understanding Cybersecurity Needs and Gaps at the Local Level

This project investigates the degree to which businesses at a local level are dependent on computers and the Internet for daily operations. Of those that are, the project investigates the degree to which they implement good or bad cybersecurity practices with an particular emphasis on very small businesses. Understanding their needs helps fill a knowledge gap within the cybersecurity industry and has local as well as national security and economic implications.

group_project

Visible to the public TWC: Small: Self-Recovering Certificate Authorities using Backward and Forward Secure Key Management

Recent years have shown the fallacy of Certificate Authorities (CAs); insiders are able to steal master signing keys and impersonate certificates, exploitation of system vulnerabilities and other means of infiltration allow attackers to gain access to CAs and copy their keys, etc. At stake is the mere survival of public key infrastructures as trust in them is bootstrapped from trust in certificates that bind public keys to known identities. The current attack surface exposed by CAs makes trust in their issued certificates questionable.

group_project

Visible to the public TWC: Medium: Leakage of Communications Signatures: Analysis of Eavesdropping Attacks and Proactive Countermeasures

As society continues to depend on the rapidly expanding wireless ecosystem, we are challenged with serious threats related to user privacy, data confidentiality, and critical system availability. A significant portion of these threats is attributed to the broadcast nature of wireless transmissions. Using commodity radio hardware, unauthorized parties can easily eavesdrop on over-the-air transmissions and breach the privacy of communicating users by tracking their whereabouts and movements, and inferring their associations, health state, and preferences.

group_project

Visible to the public TWC: Medium: Collaborative: Active Security

Computer and network security is currently challenged by the need to secure diverse network environments including clouds and data-centers, PCs and enterprise infrastructures. This diversity of environments is coupled to increased attack sophistication. Today's tools for securing network and computing infrastructures can be painstakingly composed and configured using available components, but fail to automatically learn from their environment and actively protect it.