CORE

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Techniques for Enhancing the Security and Trust of FPGAs-Based Systems

Secret keys that are stored and used within physical devices can be extracted by adversaries. The attacks involve measuring the power consumption or electromagnetic radiation emanating from the chip as it carries out encryption, and then analyzing them to deduce the secret key. This project investigates techniques that self-mutate the hardware at runtime as a means of significantly reducing and ideally eliminating signal information leveraged by the adversary.

group_project

Visible to the public SaTC: CORE: Small: Detecting Social Engineering Attacks Using Semantic Language Analysis

A critical threat to information security is social engineering, the psychological manipulation of people in order to gain access to a system for which the attacker is not authorized. Cyberattackers target the weakest link, and people are often more vulnerable than a hardened computer system. Phishing emails, which fraudulently request private information, are a common version of the attack, but social engineering comes in many more complex conversational forms designed to exploit psychological weaknesses of the target.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Understanding and Mitigating Adversarial Manipulation of Content Curation Algorithms

Online social networks (OSNs) have fundamentally transformed how billions of people use the Internet. These users are increasingly discovering books, music bands, TV shows, movies, news articles, products, and other content through posts from trusted users that they follow. All major OSNs have deployed content curation algorithms that are designed to increase interaction and act as the "gatekeepers" of what users see.

group_project

Visible to the public SaTC: CORE: Small: Secure Cloud Storage Verification Methods

With the continuously decreasing costs of cloud services, many organizations including government agencies, healthcare providers, financial institutions, universities, and enterprises outsource large data repositories to cloud service providers (CSPs). Doing this relieves organizations from the financial burden of deploying and maintaining in-house data infrastructures. However, storing data with third parties exposes organizations to legal and financial liabilities should the data leak, become unavailable, or be lost.

group_project

Visible to the public SaTC: CORE: Small: Techniques for Software Model Checking of Hyperproperties

Most manufacturers and companies employ a set of security and privacy policies that specify how the data produced by their products can be accessed and propagated. Violation of such policies may result in catastrophic consequences such as breach of public services and safety or compromising highly sensitive data and privacy of citizens. Frequent reports of security exploits and loss of information privacy have unfortunately become everyday occurrences.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: CPS ACTS: Orchestrating CPS with Action blocks

The integration of computation, communication and sensing technologies into our transportation, power grid, healthcare, and manufacturing systems presents unprecedented challenges in ensuring the security and safety of these systems. Cyber attacks on such systems cross from the cyber realm into the physical world, and we must deal with new attack trends that may cause vehicles to veer off the road, manipulate devices responsible for power generation, distribution and consumption, and exploit robotic/drone systems for malicious activities.

group_project

Visible to the public SaTC: CORE: Small: Design of Efficient, Horizontally-Scaling, and Strongly Anonymous Communication Networks

Anonymous communication is an important aspect of freedom of speech. In many cases, anonymity remains the most important defense for persons expressing unpopular or prohibited opinions, from protest organizers who are fighting against repressive governments to whistleblowers who report sensitive news against powerful entities. Owing to its importance, there have been many systems that were designed to protect users' anonymity in the past several decades.

group_project

Visible to the public SaTC: CORE: Small: Enhanced Security and Reliability for Embedded Control Systems

Today, embedded devices are ubiquitous. These devices are inherently networked, which exposes them to malware attacks. Windows devices remain the most prominent targets of malware attacks to date. But this playing field is quickly changing, as demonstrated with firmware attacks to private access points or closed-circuit television cameras. Other intrusions to industrial and governmental infrastructure have been reported in the power grid, for industrial control and automotive systems, even in small devices in private homes that are networked, often referred to as the Internet-of-Things.

group_project

Visible to the public SaTC: CORE: Small: verifying security for data non-interference

Many security problems today stem from bugs in software. Although there has been significant effort in reducing bugs through better testing, fuzzing, model checking, and so on, subtle bugs remain and continue to be exploited. This proposal explores the use of formal verification to prove security of a file system implementation along with an example application in the form of a mail server. Machine-checked verification is a powerful approach that can eliminate a large class of bugs in software by proving that an implementation meets a precise specification.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Evaluating Performance and Security of Executable Steganography for Surreptitious Programs

Intellectual property protection of software remains a priority for the commercial sector because counterfeiting and piracy erode profits and market share, ultimately causing impacts on companies, consumers and governments. Watermarking for proving digital ownership and obfuscation for hindering adversarial reverse engineering are currently used to provide some level of deterrence against this. This project will investigate novel methods of software protection, hiding executable programs within other executable code.