Breakthrough

group_project

Visible to the public Collaborative Research: CT-T: Cryptographic Techniques for Searching and Processing Encrypted Data

In this proposal we consider the question of what constitutes identities in cryptography. Typical examples of identities include your name and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-revoked) Public-Key coming from some trusted public-key infrastructure. In many situations, however, where you are defines your identity. For example, we know the role of a bank-teller behind a bullet-proof bank window not because he or she shows us her credentials but by merely knowing her location.

group_project

Visible to the public CPS: Breakthrough: Multi-Sensory Event Detection for Cross-Platform Coordination and Verification

As researchers and developers move from digital to cyber-physical systems, a gap is emerging that is revealing challenges to performance and security in many different cyber-physical system domains. In particular, cybersecurity protections in the digital domain provide desirable protection and verification mechanisms that currently have no analog in the physical domain, limiting verification capabilities in cyber-physical systems.

group_project

Visible to the public Breakthrough: CPS-Security: Towards Provably Correct Distributed Attack-Resilient Control of Unmanned-Vehicle-Operator Networks

Inherent vulnerabilities of information and communication technology systems to cyber-attacks (e.g., malware) impose significant security risks to Cyber-Physical Systems (CPS). This is evidenced by a number of recent accidents. Noticeably, current distributed control of CPS is not really attack-resilient (ensuring task completion despite attacks). Although provable resilience would significantly lift the trustworthiness of CPS, existing defenses are rather ad-hoc and mainly focus on attack detection.

group_project

Visible to the public Breakthrough: Enhancing Privacy in Smart Buildings and Homes

The design of smart electric grids and buildings that automatically optimize their energy generation and consumption is critical to advancing important societal goals, including increasing energy-efficiency, improving the grid's reliability, and gaining energy independence. To enable such optimizations, smart grids and buildings increasingly rely on Internet-connected sensors in smart devices, including digital electric meters, web-enabled appliances and lighting, programmable outlets and switches, and intelligent HVAC systems.

group_project

Visible to the public Breakthrough: Collaborative: Secure Algorithms for Cyber-Physical Systems

Modern systems such as the electric smart grid consist of both cyber and physical components that must work together; these are called cyber-physical systems, or CPS. Securing such systems goes beyond just cyber security or physical security into cyber-physical security. While the threats multiply within a CPS, physical aspects also can reduce the threat space. Unlike purely cyber systems, such as the internet, CPS are grounded in physical reality.

group_project

Visible to the public TWC: Breakthrough: Inspection Resistance in Cyber-Physical Systems

As computing devices continue to be embedded in more and more physical devices, they are now privy to the most confidential information about our lives. The ability to safely keep a secret in memory is central to the vast majority of security systems, but storing and erasing these secrets is a difficult problem in the face of an attacker who can obtain unrestricted physical access to these devices and the underlying hardware. Depending on the memory technology, the very act of storing a 1 instead of a 0 can have physical side effects measurable even after the power has been cut.

group_project

Visible to the public Breakthrough: Collaborative: Secure Algorithms for Cyber-Physical Systems

Modern systems such as the electric smart grid consist of both cyber and physical components that must work together; these are called cyber-physical systems, or CPS. Securing such systems goes beyond just cyber security or physical security into cyber-physical security. While the threats multiply within a CPS, physical aspects also can reduce the threat space. Unlike purely cyber systems, such as the internet, CPS are grounded in physical reality.