Skip to main content

Research Projects

2011

Attacking and Defending Unreliable Hardware
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Threat Analysis and Modeling | Next Generation Threat Prediction and Response
Researcher : Onur Mutlu

Augmenting the Wisdom of Crowds for Anti-Phishing
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Jason Hong, Bryan Pendleton

Bridging the Gap Between Systems Security and Language Security
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security
Researcher s: Jonathan McCune

Campus Navigation
Research Area: Privacy Protection | Mobility
Researcher s: James Morris, Norman Sadeh

Casual Authentication
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Jason Hong, Eiji Hayashi

Designing Security Kernels for Verification
Research Area: Trustworthy Computing Platforms and Devices
Researcher s: Anupam Datta, Jonathan McCune

Differentially-Private Synthetic Dataset Release for Machine Learning and Clustering
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher : Avrim Blum

Efficient Trojan Detection in Field Programmable Gate Arrays
Research Area: Trustworthy Computing Platforms and Devices
Researcher s: Shawn Blaton

Measuring and Modeling Security and Privacy Laws
Research Area: Privacy Protection
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications
Researcher s: Alessandro Acquisti, Sasha Romanosky, Richard Sharp

MultiBiometric Signal Exploitation, Analysis and Acceleration
Research Area: Security of Cyber-Physical Systems
Researcher : Marios Savvides

Multichannel Modeling for Enhancing and Masking Speech Communications
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Ted Selker, Ian Lane

Privacy Nudging
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Alessandro Acquisti, Lorrie Cranor, Norman Sadeh

Probabilistic Verification of Security Properties in Self-Adaptive Systems
Cross Cutting Thrusts: Software Security
Researcher : David Garlan

Process Variation-Aware Modeling, Analysis, and Prevention of Thermal Attacks in Many-Core Systems
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Threat Analysis and Modeling
Researcher : Diana Marculescu

Protecting Browsers from Mixed Content Injection Attacks
Cross Cutting Thrusts: Software Security | Usable Privacy and Security
Researcher s: Collin Jackson

Secure Distributed Logic Programming
Cross Cutting Thrusts: Formal Methods | Software Security
Researcher : Frank Pfenning

Security Patterns: Assurance for Secure Concurrent and Distributed Computing
Cross Cutting Thrusts: Software Security | Next Generation Threat Prediction and Response | Formal Methods
Researcher s: William Scherlis, Jonathan Aldrich

Semantic Geotagging for Situational Awareness During Disaster Response
Research Area: Mobility | Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Martin Griss, Anind Dey, Ray Bareiss, Steven Rosenberg, Joy Zhang

Simplifying Access Control for Home Networking
Research Area: Privacy Protection | Security of Cyber-Physical Systems
Researcher s: Jason Hong, Bryan Pendleton

Super-Resolution for Iris Recognition
Research Area: Security of Cyber-Physical Systems
Researcher : Vijayakumar Bhagavatula

User-Controllable Policy Learning
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Norman Sadeh, Lorrie Cranor

User-Controllable Security and Privacy for Pervasive Computing
Research Area: Privacy Protection | Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Norman Sadeh, Jason Hong, Lorrie Cranor, Lujo Bauer

Use Your Illusion: Using Visual Distortion to Secure Image-Based Authentication
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Jason Hong, Nicolas Christin, Eiji Hayashi

2010

Agora: Mobile Cloud-Computing Middleware
Research Area: Mobility
Researcher : Priya Narasimhan

As-If Infinitely Ranged Integer Model
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security
Researcher : Robert Seacord

Automatic Facial Landmark Annotation of Facial Images
Research Area: Security of Cyber-Physical Systems
Researcher : Marios Savvides

Automatic Tracking and Iris Recognition for Rifle Scope
Research Area: Security of Cyber-Physical Systems
Researcher : Marios Savvides

Autonomous Trustworthy Computing Platforms and Devices
Research Area: Trustworthy Computing Platforms and Devices | Security of Cyber-Physical Systems | Mobility
Cross Cutting Thrusts: Software Security
Researcher : Ole Mengshoel

BAP: The Binary Analysis Platform
Cross Cutting Thrusts: Software Security
Researcher s: David Brumley, Andres Jager

Circuit-Level Secure-by-Design Digital Integrated Circuits
Research Area: Trustworthy Computing Platforms and Devices
Researcher : Ken Mai

Collaborative Mobile Sensor Network Control with Extremely Noisy Measurements
Research Area: Mobility | Security of Cyber-Physical Systems
Researcher s: Pei Zhang, Bruno Sinopoli

Compiling Epistemic Specifications to Secure Distributed Code
Cross Cutting Thrusts: Software Security | Formal Methods
Researcher : Frank Pfenning

Compressed Sensing for Face Recognition
Research Area: Mobility | Security of Cyber-Physical Systems
Researcher : Vijayakumar Bhagavatula

Continuous Authentication of Computer User: How to Avoid Computer Tailgating and Ensure Computer Security
Research Area: Security of Cyber-Physical Systems
Researcher : Marios Savvides

Contractual Anonymity
Research Area: Trustworthy Computing Platforms and Devices | Privacy Protection
Cross Cutting Thrusts: Cryptography
Researcher s: David Brumley, Jonathan McCune

Dynamically Reconfigurable Antenna Arrays
Research Area: Trustworthy Computing Platforms and Devices
Researcher s: Jason Lohn, Derek Linden

Efficient Data-Intensive Computing in Support of Security Applications
Research Area: Next Generation Secure and Available Networks | Survivable Distributed Systems
Cross Cutting Thrusts: Next Generation Threat Prediction and Response
Researcher : Dave Andersen

Empirically-Based Insider Threat Risk Assessment Diagnostic
Cross Cutting Thrusts: Threat Analysis and Modeling | Next Generation Threat Prediction and Response
Researcher s: Andrew Moore, Dawn Cappelli

Exploratory R&D of a Technology-Driven Insider Threat Scoring Metric
Cross Cutting Thrusts: Next Generation Threat Prediction and Response | Threat Analysis and Modeling
Researcher s: Andrew Moore, Randall Trzeciak

Grey Project: device-enabled authorization
Research Area: Mobility | Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researcher : Lujo Bauer

Lockdown: A Safe and Practical Environment for Security Applications
Research Area: Secure Home Computing | Trustworthy Computing Platforms and Devices
Researcher s: Virgil Gligor, Adrian Perrig, Amit Vasudevan

MERIT ITL: The Insider Threat Lab
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications | Threat Analysis and Modeling | Next Generation Threat Prediction and Response
Researcher s: Andrew Moore, Randall Trzeciak, Dawn Cappelli

On Privacy and Compliance
Research Area: Privacy Protection
Cross Cutting Thrusts: Cryptography
Researcher s: Anupam Datta, Zeliha Dilsun Kaynar

Personal Information Security, Conflation of Dissemination and Access, and Illusion of Control
Research Area: Privacy Protection
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications
Researcher : Alessandro Acquisti

Principled Approach to Web Security
Cross Cutting Thrusts: Software Security | Formal Methods
Researcher s: Anupam Datta, Limin Jia, Deepak Garg

Robust, Secure, Efficient Networked Embedded Control Systems
Research Area: Trustworthy Computing Platforms and Devices | Mobility
Cross Cutting Thrusts: Software Security
Researcher : Bruno Sinopoli

Robust Iris & Face Acquisition at 8-13m for the War-Fighter
Research Area: Security of Cyber-Physical Systems
Researcher : Marios Savvides

Robust Multi-Biometrics Identification Using Soft-Biometric Intelligence
Research Area: Security of Cyber-Physical Systems
Researcher : Marios Savvides

Securable, Usable Context Toolkit for Mobile Applications
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Martin Griss, Anind Dey, Pei Zhang, Joy Zhang

Securing the Digital Home
Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Lujo Bauer, Lorrie Cranor, Greg Ganger, Adrian Perrig

Security and Privacy Risk Management in Organizations
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications
Researcher s: Nicolas Christin, Anupam Datta

Security Quality Requirements Engineering (SQUARE) Project
Cross Cutting Thrusts: Formal Methods | Software Security
Researcher s: Nancy Mead, Lorrie Cranor

Survivable Distributed Storage: From Theory to Reality
Research Area: Survivable Distributed Systems
Researcher s: Greg Ganger, Manish Prasad

System Integrity Manager for the Everyday Users
Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Hyong Kim, James Hoe

Targeted Software Assurance
Research Area: Survivable Distributed Systems
Cross Cutting Thrusts: Software Security | Formal Methods
Researcher s: William Scherlis, Jonathan Aldrich

Three-Dimensional Craniofacial Modeling for Novel Two-Dimensional Pose Synthesis and Age Progression
Research Area: Security of Cyber-Physical Systems
Researcher : Marios Savvides

Usable security and privacy for context-aware mobile applications
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Martin Griss, Anind Dey, Pei Zhang

User Controllable Security & Privacy for Mobile Social Networking
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Norman Sadeh, Lorrie Cranor, Jason Hong

Visualizing Home Networks
Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researcher : Jason Hong

VMA: Dynamic and Secure Heterogeneous System for Elder Care
Research Area: Next Generation Secure and Available Networks | Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Pei Zhang, Martin Griss, Raj Rajkumar, Daniel Siewiorek, Asim Smailagic

XTREC: Secure Real-time Execution Trace Recording and Analysis on Commodity Platforms
Research Area: Trustworthy Computing Platforms and Devices | Security of Cyber-Physical Systems
Cross Cutting Thrusts: Software Security
Researcher s: Adrian Perrig, Virgil Gligor, Amit Vasudevan

2009

Attention Economics in Information Rich Environments
Research Area: Privacy Protection
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications | Usable Privacy and Security
Researcher : Alessandro Acquisti

Audio CAPTCHAs for Authenticating Human Users
Cross Cutting Thrusts: Usable Privacy and Security
Researcher : Luis von Ahn

Basis for Empowering Business IT Managers
Cross Cutting Thrusts: Threat Analysis and Modeling | Business Risk Analysis and Economic Implications
Researcher s: Andrew Moore, Randall Trzeciak, Dawn Cappelli

Behavior-Based Malware Email Filtering
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security
Researcher s: James Hoe, Jason Hong

Circuit-Level Secure-by-Design Field Programmable Gate Arrays
Research Area: Next Generation Secure and Available Networks
Cross Cutting Thrusts: Software Security
Researcher : Ken Mai

Deep Software Assurance: Requirements, Techniques, Field Experience
Cross Cutting Thrusts: Software Security
Researcher s: Jonathan Aldrich, William Scherlis

Diagnosing and Locating Wireless Disruption
Research Area: Mobility | Next Generation Secure and Available Networks
Researcher s: Srinivasan Seshan, Peter Steenkiste, Dave Andersen

Effective Trust Indicators
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher : Lorrie Cranor

Enhancements to Large-Scale Network Monitoring for Bot Detection
Research Area: Next Generation Secure and Available Networks
Researcher s: Marcus DeShon

Extracting Security Policies from Source Code
Research Area: Privacy Protection
Researcher s: Michael Tschantz

Fast Correlation Filtering for Biometric Recognition
Research Area: Security of Cyber-Physical Systems
Cross Cutting Thrusts: Cryptography
Researcher : Vijayakumar Bhagavatula

Fault-Tolerant Voting
Cross Cutting Thrusts: Formal Methods
Researcher : Ryan O'Donnell

Games and Links: Combating Web Spam
Research Area: Trustworthy Computing Platforms and Devices
Researcher : Manuel Blum

Improved Biometric Encryption by Using Correlation Filters
Research Area: Security of Cyber-Physical Systems
Cross Cutting Thrusts: Cryptography
Researcher : Vijayakumar Bhagavatula

Insider Threat Analysis Center
Cross Cutting Thrusts: Threat Analysis and Modeling | Next Generation Threat Prediction and Response
Researcher s: Andrew Moore, Randall Trzeciak, Dawn Cappelli

Intelligent Video Surveillance Networks for Critical Infrastructures
Research Area: Next Generation Secure and Available Networks | Security of Cyber-Physical Systems
Researcher : Raj Rajkumar

Logical Reasoning About Obligations
Research Area: Privacy Protection
Cross Cutting Thrusts: Formal Methods
Researcher : Frank Pfenning

Machine Learning Techniques for Phishing Attacks
Research Area: Trustworthy Computing Platforms and Devices | Privacy Protection
Researcher : Jason Hong

Making the Support Vector Machine-Based Relays Secure
Research Area: Next Generation Secure and Available Networks
Researcher s: Marija Ilic, Ozan Tonguz

Malicious Fault-Immune Cryptographic Hardware Implementation
Cross Cutting Thrusts: Cryptography
Researcher : Diana Marculescu

Mobile Users Effectively Control Privacy in a Friend-Finder Application
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Norman Sadeh, Lorrie Cranor, Jason Hong

Multi-Biometrics for Security & Surveillance
Research Area: Security of Cyber-Physical Systems
Researcher s: Marios Savvides, Keshav Thirumalai Seshadri, Shreyas Venugopalan, Taihei Munemoto

One-Finger, Two-Factor Authentication with Number Pads
Research Area: Security of Cyber-Physical Systems
Researcher : Roy Maxion

Open Source Evaluation and Assurance
Cross Cutting Thrusts: Software Security | Formal Methods
Researcher : William Scherlis

Personal Information Revelation in Online Social Networks
Research Area: Privacy Protection
Researcher : Alessandro Acquisti

Privacy and Security in Real Time Monitoring Systems
Research Area: Mobility | Privacy Protection
Researcher s: Daniel Siewiorek, Asim Smailagic, Martin Griss

Protecting Privacy and Confidentiality of Information
Research Area: Privacy Protection
Researcher : Rahul Telang

Risk Analysis for Securing Wireless Ad-Hoc Networks
Research Area: Mobility | Next Generation Secure and Available Networks
Researcher : Radu Marculescu

SAF: Applying Assurance to the Survivability Analysis Framework
Research Area: Survivable Distributed Systems

Saferide
Research Area: Mobility
Researcher : James Morris

Sensor Network Security Monitoring and Management System
Research Area: Next Generation Secure and Available Networks
Researcher : Adrian Perrig

Sluice: Secure Software Upgrades in Sensor Networks
Research Area: Next Generation Secure and Available Networks | Mobility
Researcher s: Priya Narasimhan, Michael Chuang

SQUARE: Requirements Engineering for Improved System Security
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Formal Methods
Researcher : Nancy Mead

Transient Customization of Mobile Computing Infrastructure
Research Area: Mobility
Researcher : Mahadev Satyanarayanan

Trinetra: Mobile Technologies for Assisting the Blind & Visually Impaired
Research Area: Mobility | Secure Home Computing
Researcher s: Priya Narasimhan, Moshe Mahler

Trusted Computing
Research Area: Trustworthy Computing Platforms and Devices
Researcher s: Anupam Datta, Adrian Perrig, Virgil Gligor, Amit Vasudevan

Understanding User Investments & Response to Security Threats
Cross Cutting Thrusts: Threat Analysis and Modeling | Business Risk Analysis and Economic Implications
Researcher : Nicolas Christin

Wireless Sensor Networks for People-Tracking
Research Area: Next Generation Secure and Available Networks | Security of Cyber-Physical Systems
Researcher : Raj Rajkumar

2008

Access Control for Pervasive Computing Information
Researcher : Peter Steenkiste

Analyzing the Threat Dynamics of Complex Networked Systems
Research Area: Survivable Distributed Systems
Cross Cutting Thrusts: Threat Analysis and Modeling
Researcher s: Andrew Moore, Timothy Shimeall

Applying Computational Learning Theory
Researcher : Avrim Blum

Architectural Support for Scalable Program Checkpointing
Researcher s: Babak Falsafi

Artifact-FreeSanitization of Insider-Threat Data
Researcher : Roy Maxion

Automatic Code Generation for Block Ciphers
Cross Cutting Thrusts: Cryptography
Researcher s: Markus Püschel

Avoiding User Downtime Due to Setting & Authenticating Security
Researcher s: Daniel Siewiorek, Asim Smailagic

Beyond SCADA for Electric Power Infrastructures
Researcher : Marija Ilic

Computer-Readable Privacy Policies
Cross Cutting Thrusts: Usable Privacy and Security
Researcher : Lorrie Cranor

Creating Resilient Protocols with Data-Oriented Transport
Researcher : Dave Andersen

Dependably Usable Interfaces for Security in the Real World (Renewal)
Research Area: Mobility
Researcher : Roy Maxion

Design Methodologies for Security Applications
Cross Cutting Thrusts: Formal Methods
Researcher : Roy Maxion

Development & Evaluation of Resource-Aware Configurable Survivability
Researcher : Priya Narasimhan

Development of De-identification Tools for Video Surveillance Data
Researcher s: Jie Yang

Distributed Security Monitoring System for Survivable Networks
Research Area: Survivable Distributed Systems
Researcher : Hyong Kim

Distributed Stream Algorithms
Researcher s: Christopher Olston

Engineering Self-Healing Systems to Support Trustworthy Computing
Researcher : David Garlan

Enhancing DMS Software to Secure Electric Power Network Service
Researcher s: Marija Ilic, Ozan Tonguz

Further Investigations into Wireless Broadcast
Researcher : Rohit Negi

Integrated Vehicle-Network-Vision System for Transit Security
Researcher : Yang Cai

Management & Education of Risks of Insider Threat (MERIT)
Researcher s: Andrew Moore, Dawn Cappelli

Multi-Biometric Authentication System (MBAS)
Researcher : Vijayakumar Bhagavatula

Multi-Modal Biometric Sensor Networks
Researcher : Marios Savvides

Multi-Modal Biometric Verification
Research Area: Security of Cyber-Physical Systems
Researcher : Vijayakumar Bhagavatula

Open Source & Outsourced Software Acceptance Evaluation & Assurance
Researcher s: James Herbsleb, Jonathan Aldrich

PASIS
Researcher : Greg Ganger

Pi (Path Identifier) Packet Marking Scheme
Researcher : Adrian Perrig

Privacy, Information Disclosure, & Authorization from a Logical Perspective
Researcher s: Frank Pfenning, Lujo Bauer

Privacy and Usability in Pervasive Computing Environments
Cross Cutting Thrusts: Usable Privacy and Security
Researcher s: Norman Sadeh, Lujo Bauer

Proposal: Trust-free Garbage Collection for Mobile Code
Research Area: Survivable Distributed Systems
Researcher : Karl Crary

Prototyping Security Applications for Ambient Intelligence
Researcher : Radu Marculescu

Providing Privacy & Authentication
Research Area: Privacy Protection
Researcher : Rohit Negi

Response to Software Vulnerabilities
Cross Cutting Thrusts: Software Security
Researcher s: Ashish Arora

RFMaster: RFID-based Secure Access to Physical Spaces
Researcher : Raj Rajkumar

Secure Access to Buildings using RFID Technologies & Video Logging
Researcher : Raj Rajkumar

Secure Ad Hoc Routing Protocols
Research Area: Mobility
Researcher : Adrian Perrig

Secure Broadcast Communication: in Wired and Wireless Networks
Research Area: Next Generation Secure and Available Networks
Researcher : Adrian Perrig

Secure Communication in Sensor Networks
Research Area: Next Generation Secure and Available Networks
Researcher : Adrian Perrig

Secure Network & Communication Infrastructure
Research Area: Next Generation Secure and Available Networks
Researcher : Ozan Tonguz

Secure Routing in Sensor Networks
Researcher : Adrian Perrig

Secure Sensor Networks
Research Area: Next Generation Secure and Available Networks
Researcher : Adrian Perrig

Self-Configuring Wireless Networks
Researcher s: Srinivasan Seshan, Peter Steenkiste

Self-Securing Devices
Researcher : Greg Ganger

Self-Securing Storage
Researcher : Greg Ganger

Semantic Web Reasoning Technologies for Web Privacy
Researcher : Norman Sadeh

SENSIBLEIntegrating SENSing & Processing
Researcher : Diana Marculescu

Starfish: Scalable Survivable Middleware
Researcher : Priya Narasimhan

Statistical Methodology and Disclosure Limitation
Researcher : Stephen Fienberg

Supporting Trust Decisions
Researcher s: Lorrie Cranor, Norman Sadeh

Surviving Network Partitioning in Distributed Wireless Systems
Research Area: Survivable Distributed Systems
Researcher : Priya Narasimhan

System Quality Requirements Engineering Process (SQUARE)
Researcher : Nancy Mead

The CAPTCHA Project
Researcher s: Manuel Blum, Luis von Ahn

The Dragnet System for Network Forensic Analysis
Researcher : Hui Zhang

The Economic Incentive to Improve Software Security
Researcher s: Rahul Telang, Ashish Arora

The TESLA Broadcast Authentication Protocol
Researcher : Adrian Perrig

Vajra: Benchmarking Survivability in Distributed Systems
Researcher : Priya Narasimhan

Wireless Video Sensor Networks for Security Applications
Researcher : Radu Marculescu