ISG

group_project

Visible to the public CT-ISG: The Economics of Internet Security: Theoretical and Empirical Analysis

With the continuing growth of the use of the Internet for business purposes, the consequences of a possible cyber attack that could create a large scale outage of long time duration is an increasingly important economic issue. In 2003, the President's National Strategy to Secure Cyberspace stated that government action is warranted where alleged "market failures result in underinvestment in cyber security". However, there is scant empirical evidence and/or theoretical support for such "market failure".

group_project

Visible to the public CT-ISG: Isotropic Cryptography

The Isotropic Cryptography project introduces and lays the theoretical and engineering foundations for information-theoretically secure communication over open channels that meet certain requirements. More specifically, the project identifies and is concerned with {\em isotropic channels,} in which eavesdroppers monitoring the channel are unable to identify the sources and destinations of messages with certainty. Such channels appear to have very interesting and promising security properties.

group_project

Visible to the public CT-ISG: Protection Against Malicious Attacks via Quarantine-Tolerant Service Partitioning

This project is developing an automated defense system for enterprise networks against malicious code attacks such as worms, viruses and spyware. This system responds to attacks by dynamically and selectively quarantining hosts, services, and other networked devices. Traditional containment systems based on firewalls and individual host isolation are not adequate for containing the new generation of local-scanning, topological, metaserver and contagion worms that can spread very quickly through an enterprise.

group_project

Visible to the public CT-ISG: Percolation Processes and the Design of Highly Resilient Wireless Networks

This project establishes a fundamental analytical and design framework for highly resilient wireless networks based on the study of the qualitative and quantitative properties of the largest connected component. The essential mathematical basis for this study comes from the theory of percolation. Building on recent results in continuum percolation, the project designs network structures to greatly enhance the resilience of large-scale wireless networks to node and link failures resulting from attacks, natural hazards or resource depletion.

group_project

Visible to the public CT-ISG: User-Aided Secure Association of Wireless Devices

The popularity of personal gadgets opens up many new services for ordinary users. Many everyday usage scenarios involve two or more devices "working together". (Emerging scenarios are beginning to involve sensors and personal RFID tags.) Before working together, devices must be securely "paired" to enable secure and private communication.