AFOSR: Information, Operations, and Security Program Review (Oct '12)

page

Visible to the public Integrating Programming Language and Operating System Information Security Mechanisms

The interaction between language-based security mechanisms and operating system security mechanisms has remained largely unexamined, and unexploited. Language-based information security uses programming language abstractions and techniques to reason about and enforce information security, and can provide strong fine-grained application-specific information security guarantees.

page

Visible to the public Timing-based Inference: The Good, the Bad, and the Ugly

ABSTRACT

Timing can provide a new degree of freedom for communication and causal inference, but it may also be exploited to learn or leak information by adversaries. We investigate the power of timing analysis in three scenarios. First, we quantify the amount of information leakage in timing side channels and provide some counter measures. Second, we present robust and transparent steganographic timing codes. Finally, we introduce efficient algorithms for causal inference in networks.

page

Visible to the public On the (Im)Possibility of Tamper-Resilient Cryptography

ABSTRACT

We initiate a study of the security of cryptographic primitives in the presence of efficient tampering attacks to the randomness of honest parties. More precisely, we consider p-tampering attackers that may tamper with each bit of the honest parties' random tape with probability p, but have to do so

in an "online" fashion. We present both positive and negative results:

page

Visible to the public Controllability of Complex Networks

ABSTRACT

Controlling complex networks is relevant to many areas of science and engineering, and has the potential to generate technological breakthroughs. The aim of the talk is to discuss recent results from AFOSR sponsored research on complex networks at Arizona State University: (1) optimization of network controllability and (2) energy required for controlling complex networks.