ISG

group_project

Visible to the public CT-ISG: Collaborative Research: Router Models and Downscaling Tools for Scalable Security Experiments

It is critical to protect the Internet from attacks such as denial of service, and attacks on inter-domain routing. Although several defenses have been proposed, actual deployments have been limited. A primary reason for this lack of deployment is that most defenses have not been validated under realistic conditions, or at sufficiently large scales. Many attacks also have second-order effects that are not well understood. This is because it is difficult to incorporate all the protocols involved at any reasonable scale in analytical, simulation, or emulation models or testbeds.

group_project

Visible to the public CT-ISG: Collaborative Research: Router Models and Downscaling Tools

It is critical to protect the Internet from attacks such as denial of service, and attacks on inter-domain routing. Although several defenses have been proposed, actual deployments have been limited. A primary reason for this lack of deployment is that most defenses have not been validated under realistic conditions, or at sufficiently large scales. Many attacks also have second-order effects that are not well understood. This is because it is difficult to incorporate all the protocols involved at any reasonable scale in analytical, simulation, or emulation models or testbeds.

group_project

Visible to the public CT-ISG: The Origin of the Code: Automated Identification of Common Characteristics in Malware

Software is a common target of attacks on the current computing / communications infrastructure. Software continues to be vulnerable to attacks that exploit obscure or misunderstood language and program features. Detection of these software exploits (also called "malware") will therefore be needed for the forseeable future as one part of an effective defense. Virus checkers detect many known exploits, and are now widely used, but attackers have adapted by obfuscating and mutating their code to evade virus checkers.

group_project

Visible to the public CT-ISG Collaborative Research: Tamper Proofing Cryptographic Operations

This research project focuses on the development of cryptographic mathematical models and constructions that address realistic security requirements at the implementation level. This is a fundamental problem as cryptographic security formalisms are often criticized for lack of relevance given the wide range of attacks available at the implementation level.

group_project

Visible to the public CT-ISG: New Security Properties for Hash and Trapdoor Functions

The project aims at studying properties of hash and trapdoor functions that are motivated by practical applications and are implicitly held by the random oracles or easy to realize in the idealistic random oracle model. But, are not well-defined and/or not known to be realizable in the standard model. In particular, the research studies non-malleable hash functions and (possibly trapdoor) functions that hide partial information. The project investigates the new appropriate notions of security for these primitives and seeks constructions that probably meet the security definitions.

group_project

Visible to the public CT-ISG: An Architecture and Policies for Secure Network-facing Applications

The near ubiquity of Internet access has put a wealth of information and ever-increasing opportunities for social interaction at the fingertips of users. Driving this revolution is the modern web browser, which has evolved from a relatively simple client application designed to display static data into a complex networked operating system tasked with managing many facets of a users online experience. Support for dynamic content, multimedia data, and third-party plug-ins has greatly enriched users experiences at the cost of increasing the complexity of the browser itself.

group_project

Visible to the public CT-ISG: Improving Security and Privacy in Pervasive Healthcare

This research project advances the understanding of security and privacy in pervasive healthcare by testing technological methods of securing implantable medical devices and by evaluating human factors through patient studies. The most fundamental question is how to balance the opposing goals of safety and effectiveness with security and privacy of wireless, implantable medical devices.

group_project

Visible to the public CT-ISG: Advanced Techniques to Detect Kernel-Level Rootkits

The integrity of commodity operating system kernels is threatened by rootkits that modify key kernel data structures to achieve a variety of malicious goals. While rootkits have historically been known to affect control data in the kernel, recent work demonstrates rootkits that affect system security by modifying non-control data, such as linked lists used to manage bookkeeping information and metadata used for memory management. Existing techniques fail to detect such rootkits effectively.

group_project

Visible to the public CT-ISG: Collaborative Research: Towards Trustworthy Database Systems

Answers to database queries often form the basis for critical decision-making. To improve efficiency and reliability, answers to these queries can be provided by distributed servers close to the querying clients. However, because of the servers' ubiquity, the logistics associated with fully securing them may be prohibitive; moreover, when the servers are run by third parties, the clients may not trust them as much as they trust the original data owners. Thus, the authenticity of the answers provided by servers in response to clients' queries must be verifiable by the clients.

group_project

Visible to the public CT-ISG: The Assumptions for Cryptography

While modern research in cryptography has transformed a significant portion of computer security from an art into a science, ultimately the security guarantees for all current cryptographic protocols (encryption, digital signatures, etc.) rely on conjectures, such as the intractability of factoring large integers is intractable or of finding collisions in certain "hash functions". The possibility that these conjectures are false (as was recently discovered for some popular hash functions) is a genuine threat to cybersecurity.