CORE

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Safety and Security for Targets of Digital Violence

This research has a foundational, multi-disciplinary research agenda that examines the role of technology in intimate partner violence and investigates the development of new tools, techniques, and theories to combat technology-enabled abuse. The work is important because digital technologies play an increasingly prominent role in domestic violence, stalking, and surveillance by abusive partners and others known to the victim. The research builds on prior work detailing the ways in which abusers exploit technology to monitor, harass, track, and control victims.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Hardware Architectures for Post-Quantum Cryptography

This research project develops new hardware designs and implementations for a class of post-quantum secure cryptographic (PQC) algorithms. While today's algorithms used for public key cryptography, e.g. the RSA algorithm, or digital signatures are vulnerable to being broken through "cryptanalysis" using quantum computers, PQC algorithms offer protections from such cryptanalysis as they cannot be broken on a quantum computer.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Hardware Architectures for Post-Quantum Cryptography

This research project develops new hardware designs and implementations for a class of post-quantum secure cryptographic (PQC) algorithms. While today's algorithms used for public key cryptography, e.g. the RSA algorithm, or digital signatures are vulnerable to being broken through "cryptanalysis" using quantum computers, PQC algorithms offer protections from such cryptanalysis as they cannot be broken on a quantum computer.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Automatically Answering People's Privacy Questions

As novel technologies collect increasingly large and diverse amounts of data about us, people are unable to keep up and retain control over what happens to their data. The current legal approach to privacy concentrates on the concept of "Notice and Choice", namely the expectation that people are provided sufficient information about the collection and use of their data, and are offered meaningful choices about these practices (e.g., opt out, opt in). A primary element of this approach relies on privacy policies to communicate this information to people.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Automatically Answering People's Privacy Questions

As novel technologies collect increasingly large and diverse amounts of data about us, people are unable to keep up and retain control over what happens to their data. The current legal approach to privacy concentrates on the concept of "Notice and Choice", namely the expectation that people are provided enough information about the collection and use of their data and are offered meaningful choices about these practices (e.g., opt out, opt in). A primary element of this approach relies on privacy policies to communicate this information to people.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Automatically Answering People's Privacy Questions

As novel technologies collect increasingly large and diverse amounts of data about us, people are unable to keep up and retain control over what happens to their data. The current legal approach to privacy concentrates on the concept of "Notice and Choice", namely the expectation that people are provided sufficient information about the collection and use of their data, and are offered meaningful choices about these practices (e.g., opt out, opt in). A primary element of this approach relies on privacy policies to communicate this information to people.

group_project

Visible to the public SaTC: CORE: Small: RUI: Improving Performance of Standoff Iris Recognition Systems Using Deep Learning Frameworks

The iris of the eye enables one of the most accurate, distinctive, universal, and reliable biometrics for authenticating the identity of a person. However, the accuracy of iris recognition depends on the quality of data acquisition, which is negatively affected by the angle of view, occlusion, dilation, and other factors. Since standoff iris recognition systems are much less constrained than traditional systems, the captured iris images are likely to be off-angle, dilated, and otherwise less than ideal.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: New Frontiers in Encryption Systems

Encryption is the process of encoding data into a ciphertext such that only the intended recipient can decode and learn the data. This project pushes the frontiers of what is achievable for encryption. The project's novelties are building encryption systems with advanced capabilities that have provable security under standard assumptions. These include the capability to trace malicious users who leak confidential information as well as the ability to only release select pieces of information to users on a need to know basis.

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Enabling Precise and Automated Insecurity Analysis of Middleware on Mobile Platforms

During the past decade, middleware on mobile platforms (such as the Application Framework in Android and the Core Services layer in iOS) has been flourishing, but the insecurity analysis of such middleware has been lagging behind. For example, while comprehensive studies have been conducted at the application layer of the Android system, there is very limited work analyzing the Android Application Framework (Android Framework, for short), a middleware layer in the Android system.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Effective Formal Reasoning for Mobile Malware

Since their inception a decade ago, smartphones have become the pillars of our digital life, storing security-sensitive information ranging from medical and banking data to our entire electronic communication history. Due to our increasing reliance on mobile applications in daily life, there has been a steady increase in both the number and sophistication of mobile malware samples. This project's impacts are to make it easier for users and organizations to identify malicious applications and thereby prevent people from around the globe from becoming victims of mobile malware.