CORE

group_project

Visible to the public SaTC: CORE: Small: New Approaches to Decentralized Differential Privacy

Recently, Google and Apple have deployed large systems for differentially private collection and analysis of decentralized user data. These systems use a local model of privacy in which no sensitive user data is collected. This local model enjoys many implementation advantages, but does not capture the most expressive private algorithms. These more expressive private algorithms inherently require a central model of privacy, in which a trusted party agrees to collect the sensitive data and reveal only the outcome of some private algorithm.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: ForensicExaminer: Testbed for Benchmarking Digital Audio Forensic Algorithms

The proliferation of powerful smart-computing devices (e.g., smartphones, surveillance systems) capable of production, editing, analysis, and sharing of multimedia files and associated technological advances have affected almost every aspect of our lives. The use of digital multimedia (images, audio, and video) as evidence is rapidly growing in multiple applications, including legal proceedings and law enforcement.

group_project

Visible to the public SaTC: CORE: Small: Better Software Security Through Caging

Software has bugs, quite commonly in libraries that are created by third-party developers. Unfortunately, a bug in any library enables attackers to take control of an application. Furthermore, since popular libraries are used across thousands of applications, these libraries become a high-leverage target for attackers. This work improves the security of software by stopping bugs in one library from impacting other portions of the application. This makes it much more difficult for attackers to compromise software and harm users.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Security Assurance in Short Range Communication with Wireless Channel Obfuscation

As the prevalence of mobile computing technologies and applications, short-range communication over emerging aerial acoustic and visible light channel is undergoing a fast rate of expansion with many promising benefits including low power and peer-to-peer communication, without incurring complex network infrastructure.

group_project

Visible to the public SaTC: CORE: Small: External Obliviousness in Trusted Execution Environments

Processing personal data in "the cloud" is an increasingly common computing application. For example, health monitors collect heartbeat data and upload to cloud for personal healthcare and wellbeing. This increases privacy and data security risks. This project aims to achieve provable security in the cloud by protecting data-access patterns in a security-oriented cloud architecture built on the recently released Intel SGX (Software Guard eXtensions) processor.

group_project

Visible to the public SaTC: CORE: Small: Models and Measurements for Website Fingerprinting

Many private interactions between individuals and their friends, families, employers, and institutions are now carried out on the Internet; disclosure of the contents of these interactions or even the mere associations between these parties can expose people to real financial or physical risks. As a result, encryption and services such as virtual private networks or the Tor project that conceal the connection between a user and the websites they visit are growing in popularity.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: ForensicExaminer: Testbed for Benchmarking Digital Audio Forensic Algorithms

The proliferation of powerful smart-computing devices (e.g., smartphones, surveillance systems) capable of production, editing, analysis, and sharing of multimedia files and associated technological advances have affected almost every aspect of our lives. The use of digital multimedia (images, audio, and video) as evidence is rapidly growing in multiple applications, including legal proceedings and law enforcement.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: A Multi-Layer Learning Approach to Mobile Traffic Filtering

The mobile ecosystem has become an attractive target for various types of abuses. For instance, many mobile applications leak sensitive user information, such as email addresses and location, which is a privacy issue. Second, attackers routinely disguise malware in seemingly legitimate mobile apps to launch attacks, which poses security threats. Third, many mobile apps and sites push intrusive und undesirable ads, such as auto-play and pop-ups, which harm usability.

group_project

Visible to the public SaTC: CORE: Small: Side-channel Attacks Against Mobile Users: Singularity Detection, Behavior Identification, and Automated Rectification

Side-channel attacks have been proven effective to infer sensitive information (such as user activities) that should not be disclosed to unauthorized users. Owing to the closed nature of the cellular network infrastructure, adversaries cannot easily capture encrypted mobile network traffic, thus protecting against side-channel information leakage of mobile users.

group_project

Visible to the public SaTC: CORE: Small: MOSE: Automated Detection of Module-Specific Semantic Errors

System software such as operating system kernels, libraries, and application frameworks provide the foundation for all of the functionality of computing devices, from personal computers and servers to mobile and embedded devices. Security vulnerabilities in system software are particularly serious because they can undermine any of the software running on a device. The most common vulnerabilities in system software are semantic errors such as missing security checks.