CORE

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Contextual Integrity: From Theory to Practice

Current user-facing computer systems apply a "notice and consent" approach to managing user privacy: the user is presented with a privacy notice and then must consent to its terms. Decades of prior research show that this approach is unmanageable: policies are vague, ambiguous, and often include legal terms that make them very difficult to understand, if they are even read at all.

group_project

Visible to the public SaTC: CORE: Student Travel Support: Privacy Enhancing Technologies Symposium (PETS) 2017

This award funds Student Travel Fellowships for US students attending PETS 2017, the 2017 Privacy Enhancing Technologies Symposium.

group_project

Visible to the public  SaTC: CORE: Small: Collaborative: EM and Power Side-Channel Attack Immunity through High-Efficiency Hardware Obfuscations

In the increasingly digitally connected world, data security and privacy have emerged as key challenges, from a personal to a national level. Encryption is at the heart of securing data and when mathematically secure encryption primitives are implemented in physical hardware, they exhibit vulnerability to smart attackers due to unintentional leakage of physical signals during encryption process.

group_project

Visible to the public SaTC: CORE: Small: The Impacts of Human Decision-Making on Security and Robustness of Interdependent Systems

There is a substantial body of work in behavioral economics and psychology showing that people are only partially rational, and thus consistently deviate from classical economic theory. People's perceptions of risks, rewards, and losses can differ substantially from their true values, and these perceptions can have a significant impact on the investments made to protect the systems that the individuals are managing. The objective of this research is to understand the decisions people make to protect their computer systems using realistic models of behavioral decision-making.

group_project

Visible to the public SaTC: CORE: Small: Practical and Robust Hidden Voice Commands

Systems like Amazon's Alexa, Google Home and Apple's Siri allow users to issue voice commands and pose questions to personal digital assistants. Since these systems often have access to sensitive data and can perform tasks with serious impact (e.g., spend money to make a purchase), attacks against them could have significant consequences. Unfortunately, recent research has shown that attacks against such voice-based interfaces are feasible.

group_project

Visible to the public SaTC: CORE: Small: Towards Locating Memory Corruption Vulnerability with Core Dump

Modern operating systems integrate various security mechanisms to prevent software faults from being exploited. To bypass defenses and hijack program execution, an attacker therefore needs to constantly mutate an exploit and make many attempts. While in their attempts, the exploit may terminate a running process abnormally, and leaves behind a snapshot of its crashing state in the form of a core dump.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Information Disclosure and Security Policy Design: A Large-Scale Randomization Experiment in Trans-Pacific Region

With more prominent data breaches and cybersecurity incidents, cyber insecurity is becoming a serious problem for every individual and the society. Such security incidents are partially due to the lack of relevant governmental polices and the insufficient security protection by organizations managing information assets. The investigators will design an independent Trans-Pacific cybersecurity evaluation institution that measures and reports organizations' security weaknesses. The proposed institution aims at effectively motivating organizations to achieve a desirable level of cybersecurity.

group_project

Visible to the public  SaTC: CORE: Small: A Privacy-Preserving Meta-Data Analysis Framework for Cyber Abuse Research - Foundations, Tools and Algorithms

This project develops and deploys a mobile communications metadata analysis platform, designed to predict incidents of youth harassment or abuse, drawing on participatory methods to drive research design decisions and maintain youth privacy. By analyzing communication patterns - rather than content - in collaboration with youth participants, this project makes innovative contributions by facilitating a contextualized understanding of youth abuse and harassment.

group_project

Visible to the public SaTC: CORE: Small: Towards Secure and Reliable Network Tomography in Wireline and Wireless Networks

Today's networks, such as the Internet, cellular networks, and the Internet of Things, provide ubiquitous wired or wireless connections over large areas. Secure and reliable operations are among the most important objectives in these networks. Network tomography has become a promising framework for accurate monitoring of network operation status, which is vital to ensure an efficient and reliable network environment.

group_project

Visible to the public  SaTC: CORE: Small: Toward Usable and Ubiquitous Trust Initialization and Secure Networking in Wireless Ad Hoc Networks

With billions of smart wireless devices being ubiquitously deployed, safeguarding their networking from cyber attacks has become a challenge. Not only can the devices deployed in a network can be heterogeneous in terms of available computing resources and interfaces, but ordinary users typically have limited technical expertise to perform complicated security configurations. What's more, trust among the devices is often lacking because of the different vendors or distribution channels they have traversed.