ISG

group_project

Visible to the public CT-ISG: BIRT - Biometric Identification Red Team

The BIRT methodology will aid biometric system designers in making effective refinements in their systems. The measurement of biological characteristics (biometrics) such as fingerprints and facial images provides a means of identification that neither needs to be carried nor remembered. Evaluation of biometrics has traditionally been focused on the ability of biometric systems to identify members from a population, e.g., for purposes of authentication.

group_project

Visible to the public COLLABORATIVE RESEARCH: CT-ISG - A Context-Aware Approach to the Design and Evaluation of Privacy Preservation Techniques in Location-Based Services

Privacy protection challenges arising from location-based services (LBS) are critical to users as well as service providers. This project concentrates on designing and evaluating privacy protection techniques in LBS. The important departure of this project from the existing research is in its emphasis of the role of request contexts. A context refers to the external information/knowledge that the attacker may use, together with the requests themselves, to gain user private information.

group_project

Visible to the public Collaborative Research: CT-ISG: Efficient Cryptography Based on Lattices

Only two number-theoretic assumptions --- hardness of factoring and of computing discrete logarithms --- underlie essentially all public-key cryptosystems in widespread use today. For lower-level primitives such as hash functions, random number generators, and stream ciphers, the situation is even worse: existing provably-secure constructions are too inefficient to compete with practical alternatives such as SHA-1 or AES, and so the primitives in use today have no rigorous justification for their security.

group_project

Visible to the public CT-ISG: Collaborative Research: Non-bypassable Kernel Services for Execution Security

Society is dependent on many engineered systems whose increasing complexity and inter-connectedness have, in turn, increased their vulnerability to adversarial attacks. In many of these systems, protecting the execution of their computations is as crucial as ensuring the security of their data. This research investigates how to maintain survivable operation of such systems, even in the face o finvasive attacks where computations are intentionally subverted to interfere with other computations' execution constraints.

group_project

Visible to the public CT-ISG: Collaborative Research: A Framework for the Modeling and Management of Obligations in Security Policies

The correct behavior and reliable operation of an information system relies not only on what users are permitted to do, but often times on what users are required to do. Such obligatory actions are integral to the security procedures of many enterprises. The management of obligations in security policies imposes significant technical challenges since obligations bear quite different properties from traditional access control. For example, obligations assigned to users often cannot be enforced.

group_project

Visible to the public CT-ISG: Improving System Security with a Compiler-based Virtual Machine for Operating System Kernels

The Secure Virtual Architecture (SVA, formerly called LLVA forlow-level virtual architecture) project is developing a novel framework to improve operating system security and reliability. The two broad goals of the project are (a) to develop a compiler-enforced virtual machine that is safe, low-level, efficient, and capable of hosting a standard C/C++-based operating system and all its applications; and (b) to investigate how this organization can improve overall system security and provide new security capabilities.

group_project

Visible to the public CT-ISG: Population Studies in Computer Security via DNS Monitoring

This project seeks to understand and analyze the global demography of cybersecurity threats and solutions. It is structured as a population study, in three majors parts. First, a real time monitoring infrastructure captures a new dataset on the population characteristics of malicious software, and of security tools, as they are actually found across the world.

group_project

Visible to the public CT-ISG: Power to the People: Tools for Explaining Access-Control Consequences

Without their realizing it, end-users have been turned into authors of access-control policies. Everywhere from Google to Facebook to Microsoft HealthVault and beyond, these policies are usually hidden behind simple user interfaces, but ultimately the users are responsible for setting and then taking responsibility for the consequences of these policies. Indeed, the apparent simplicity of the interfaces sometimes belie the significance of the outcomes.

group_project

Visible to the public CT-ISG: Power to the People: Tools for Explaining Access-Control Consequences

Without their realizing it, end-users have been turned into authors of access-control policies. Everywhere from Google to Facebook to Microsoft HealthVault and beyond, these policies are usually hidden behind simple user interfaces, but ultimately the users are responsible for setting and then taking responsibility for the consequences of these policies. Indeed, the apparent simplicity of the interfaces sometimes belie the significance of the outcomes.

group_project

Visible to the public CT-ISG: New Directions in Elliptic Curve, Pairing-Based, and Torus-Based Cryptography

The goal of this research is to solve some important problems in nnnntorus-based, pairing-based, multilinear, and elliptic curve and abelian variety cryptography. Elliptic curve cryptography helps to secure the Internet and is used by the U.S. and other governments and institutions to provide secure communication. Abelian variety cryptography includes elliptic and hyperelliptic curve cryptography, scales well to high security levels, and is especially advantageous in constrained environments.