CORE

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Techniques for Enhancing the Security and Trust of FPGAs-Based Systems

Secret keys that are stored and used within physical devices can be extracted by adversaries. The attacks involve measuring the power consumption or electromagnetic radiation emanating from the chip as it carries out encryption, and then analyzing them to deduce the secret key. This project investigates techniques that self-mutate the hardware at runtime as a means of significantly reducing and ideally eliminating signal information leveraged by the adversary.

group_project

Visible to the public SaTC: CORE: Small: Super-Human Cryptanalysis for Scalable Side-Channel Analysis

The project takes the rapidly evolving advances in deep learning and applies them in the context of side-channel analysis (SCA). Finding SCA leakages on real devices can be a tedious process, resulting devices ranging from wearables to embedded Internet of Things (IoT) devices entering the marketplace without proper protection. This project explores ways to automate side-channel security analysis using deep learning techniques. To protect devices against SCA, the project also explores a novel approach to countermeasure design by applying the concept of adversarial learning.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Fine Grained Protection for Scalable Single-Use Services

opular Internet servers and web sites may serve thousands of users simultaneously. To handle this volume of activity, these servers share resources, such as processors, memory, and hard disk space. These shared resources provide an avenue for an attacker to affect other users connected to the server if the attacker successfully exploits a vulnerability in the server. This research project aims to eliminate this risk by creating an individual, customized server instance for each user that runs within an isolated single-use container.

group_project

Visible to the public SaTC: CORE: Small: Practical methods for detecting access permission vulnerabilities caused by sysadmin's configuration errors

As data center systems become ever so complex, it has been ever so daunting for system administrators to configure various permission correctly without accidentally opening up permissions for unintended users (and also malicious users) and resulting in catastrophic security disasters.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Fine Grained Protection for Scalable Single-Use Services

Popular Internet servers and web sites may serve thousands of users simultaneously. To handle this volume of activity, these servers share resources, such as processors, memory, and hard disk space. These shared resources provide an avenue for an attacker to affect other users connected to the server if the attacker successfully exploits a vulnerability in the server. This research project aims to eliminate this risk by creating an individual, customized server instance for each user that runs within an isolated single-use container.

group_project

Visible to the public SaTC: CORE: Small: Multivariate Public Key Cryptosystems - Candidates for the Next Generation Post-Quantum Standards

Public-key cryptosystems, a revolutionary breakthrough in cryptography, are indispensable for our modern communication network. The Internet, as well as other communication systems, rely principally on public-key cryptosystems that depend for security on the difficulty of certain number-theoretic problems such as integer factorization or the "discrete log problem." However, it is now known that a quantum computer could efficiently solve these problems, thus rendering all public-key cryptosystems based on such assumptions impotent if a large-scale quantum computer can be built.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Leveraging community oversight to enhance collective efficacy for privacy and security

This research concerns how groups of people can cooperate to protect their privacy. The researchers will study how people can help one another to manage their digital privacy and security. Offline, people support each other informally to make privacy and security decisions, by sharing stories or exchanging advice, but technology designs for privacy do not reflect these social processes.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Leveraging community oversight to enhance collective efficacy for privacy and security

This research concerns how groups of people can cooperate to protect their privacy. The researchers will study how people can help one another to manage their digital privacy and security. Offline, people support each other informally to make privacy and security decisions, by sharing stories or exchanging advice, but technology designs for privacy do not reflect these social processes.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: CPS ACTS: Orchestrating CPS with Action blocks

The integration of computation, communication and sensing technologies into our transportation, power grid, healthcare, and manufacturing systems presents unprecedented challenges in ensuring the security and safety of these systems. Cyber attacks on such systems cross from the cyber realm into the physical world, and we must deal with new attack trends that may cause vehicles to veer off the road, manipulate devices responsible for power generation, distribution and consumption, and exploit robotic/drone systems for malicious activities.

group_project

Visible to the public SaTC: CORE: Small: Understanding, Measuring, and Defending against Malicious Web Crawlers

Given the constant expansion of the web, search engines rely on automated web crawlers to automatically discover new web pages and index them. Next to search engines, many different industries rely on web crawlers, ranging from security-related crawlers that find abusive pages, to crawlers that take snapshots of content in order to show previews of pages on social networks. At the same time, attackers are utilizing malicious crawlers to automatically find and exploit vulnerabilities on websites, to scrape content and email addresses, and to brute-force login forms.