CORE

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Learning Dynamic and Robust Defenses Against Co-Adaptive Spammers

Online reputation systems are ubiquitous for customers to evaluate businesses, products, people, and organizations based on reviews from the crowd. For example, Yelp and TripAdvisor rank restaurants and hotels based on user reviews, and RateMDs allows patients to review doctors and hospitals. These systems can however be leveraged by spammers to mislead and manipulate the inexperienced customers with fake but well-disguised reviews (spams). To comprehensively protect customers and honest businesses, advanced spam detection techniques have been deployed.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Learning Dynamic and Robust Defenses Against Co-Adaptive Spammers

Online reputation systems are ubiquitous for customers to evaluate businesses, products, people, and organizations based on reviews from the crowd. For example, Yelp and TripAdvisor rank restaurants and hotels based on user reviews, and RateMDs allows patients to review doctors and hospitals. These systems can however be leveraged by spammers to mislead and manipulate the inexperienced customers with fake but well-disguised reviews (spams). To comprehensively protect customers and honest businesses, advanced spam detection techniques have been deployed.

group_project

Visible to the public SaTC: CORE: Medium: ADIDS: An Air-gapped Distributed Intrusion Detection System for the Power Grid

The power grid is a highly complex control system and one of the most impressive engineering feats of the modern era. Nearly every facet of modern society critically relies on the proper operation of the power grid such that long or even short interruptions can impose significant economic and social hardship on society. The current power grid is undergoing a transformation to a Smart Grid, that seeks to monitor and track diagnostic and operational information so as to enable a more efficient and resilient system.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Hardware-assisted Plausibly Deniable System for Mobile Devices

Mobile computing devices typically use encryption to protect sensitive information. However, traditional encryption systems used in mobile devices cannot defend against an active attacker who can force the mobile device owner to disclose the key used for decrypting the sensitive information. This is particularly of concern to dissident users who are targets of nation states.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Hardware-assisted Plausibly Deniable System for Mobile Devices

Mobile computing devices typically use encryption to protect sensitive information. However, traditional encryption systems used in mobile devices cannot defend against an active attacker who can force the mobile device owner to disclose the key used for decrypting the sensitive information. This is particularly of concern to dissident users who are targets of nation states.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative Research: Understanding and Mitigating the Privacy and Societal Risks of Advanced Advertising Targeting and Tracking

Advertising now funds most of the popular web sites and internet services: companies often provide their services for free, in exchange for collecting data from their users as they interact with the service. In recent years, the scale and resolution of user data that platforms collect has led to a dramatic increase in the variety of targeting, reporting, measurement, and tracking mechanisms that platforms offer to advertisers.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative Research: Understanding and Mitigating the Privacy and Societal Risks of Advanced Advertising Targeting and Tracking

Advertising now funds most of the popular web sites and internet services: companies often provide their services for free, in exchange for collecting data from their users as they interact with the service. In recent years, the scale and resolution of user data that platforms collect has led to a dramatic increase in the variety of targeting, reporting, measurement, and tracking mechanisms that platforms offer to advertisers.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: New Directions in Public-Key and Identity-Based Encryption

Developments in public-key encryption (PKE) and identity-based encryption (IBE) have revolutionized the field of cryptography and secure communication in general. PKE allowed remote parties to establish secure channels in front of eavesdropping adversaries, and led to public-key directories storing parties' public-keys. The stronger primitive of IBE eliminated the need for a large public-key directory, though this comes at the cost of trusting a central private-key generation authority.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: New Directions in Public-Key and Identity-Based Encryption

Developments in public-key encryption (PKE) and identity-based encryption (IBE) have revolutionized the field of cryptography and secure communication in general. PKE allowed remote parties to establish secure channels in front of eavesdropping adversaries, and led to public-key directories storing parties' public-keys. The stronger primitive of IBE eliminated the need for a large public-key directory, though this comes at the cost of trusting a central private-key generation authority.

group_project

Visible to the public SaTC: CORE: Medium: Knowledge Work and Coordination to Improve O&M and IT Collaboration to Keep Our Buildings Smart AND Secure

Government organizations, businesses, and universities are increasingly adding Internet of Things (IoT) devices, such as room occupancy sensors, into their buildings. As these sensors are connected to the internet and networked to building technology (such as heating and lights), an attacker could shut down a building or steal sensitive information.