Skip to main content

Research Area: Trustworthy Computing Platforms and Devices

Projects List

Accountable Mobile Computing Framework Based on User Behavior Modeling
Research Area: Secure Home Computing | Mobility | Privacy Protection | Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Next Generation Threat Prediction and Response | Threat Analysis and Modeling
Researchers: Martin Griss, Anind Dey, Joy Zhang

As-If Infinitely Ranged Integer Model
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security
Researcher: Robert Seacord

A Static Approach to Operating System Security IV
Research Area: Trustworthy Computing Platforms and Devices
Researcher: Karl Crary

Attacking and Defending Unreliable Hardware
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Threat Analysis and Modeling | Next Generation Threat Prediction and Response
Researcher: Onur Mutlu

Autonomous Trustworthy Computing Platforms and Devices
Research Area: Trustworthy Computing Platforms and Devices | Security of Cyber-Physical Systems | Mobility
Cross Cutting Thrusts: Software Security
Researcher: Ole Mengshoel

Behavior-Based Malware Email Filtering
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security
Researchers: James Hoe, Jason Hong

Bridging the Gap Between Systems Security and Language Security
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security
Researchers: Jonathan McCune

Circuit-Level Secure-by-Design Digital Integrated Circuits
Research Area: Trustworthy Computing Platforms and Devices
Researcher: Ken Mai

Compositional Security
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Formal Methods | Software Security
Researchers: Anupam Datta, Limin Jia, Amit Vasudevan, Sagar Chaki

Contractual Anonymity
Research Area: Trustworthy Computing Platforms and Devices | Privacy Protection
Cross Cutting Thrusts: Cryptography
Researchers: David Brumley, Jonathan McCune

Cyber-Security Threats to Industrial Control Systems
Research Area: Trustworthy Computing Platforms and Devices | Security of Cyber-Physical Systems
Researchers: Virgil Gligor, Soo Bum Lee

Designing Security Kernels for Verification
Research Area: Trustworthy Computing Platforms and Devices
Researchers: Anupam Datta, Jonathan McCune

Dynamically Reconfigurable Antenna Arrays
Research Area: Trustworthy Computing Platforms and Devices
Researchers: Jason Lohn, Derek Linden

Efficient, Secure Encryption Implementations
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Cryptography
Researcher: Ken Mai

Efficiently Securing Non-Volatile Storage in Portable Systems
Research Area: Mobility | Trustworthy Computing Platforms and Devices | Secure Home Computing
Researcher: Ken Mai

Efficient Trojan Detection in Field Programmable Gate Arrays
Research Area: Trustworthy Computing Platforms and Devices
Researchers: Shawn Blaton

Games and Links: Combating Web Spam
Research Area: Trustworthy Computing Platforms and Devices
Researcher: Manuel Blum

Inherently Trojan-Resistant Integrated Circuit Architectures
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Cryptography
Researcher: Ken Mai

Lockdown: A Safe and Practical Environment for Security Applications
Research Area: Secure Home Computing | Trustworthy Computing Platforms and Devices
Researchers: Virgil Gligor, Adrian Perrig, Amit Vasudevan

Machine Learning Techniques for Phishing Attacks
Research Area: Trustworthy Computing Platforms and Devices | Privacy Protection
Researcher: Jason Hong

Next Generation Available Internet
Research Area: Trustworthy Computing Platforms and Devices | Next Generation Secure and Available Networks
Researchers: Virgil Gligor, Adrian Perrig, Soo Bum Lee

Process Variation-Aware Modeling, Analysis, and Prevention of Thermal Attacks in Many-Core Systems
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Threat Analysis and Modeling
Researcher: Diana Marculescu

Robust, Secure, Efficient Networked Embedded Control Systems
Research Area: Trustworthy Computing Platforms and Devices | Mobility
Cross Cutting Thrusts: Software Security
Researcher: Bruno Sinopoli

SCION: Scalability, Control, and Isolation On Next-Generation Networks
Research Area: Trustworthy Computing Platforms and Devices | Next Generation Secure and Available Networks
Researchers: Adrian Perrig, Dave Andersen, Virgil Gligor, Soo Bum Lee

Secure, Reliable, Efficient Physical Unclonable Functions
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Cryptography
Researcher: Ken Mai

Semantic Geotagging for Situational Awareness During Disaster Response
Research Area: Mobility | Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Martin Griss, Anind Dey, Ray Bareiss, Steven Rosenberg, Joy Zhang

Software-Based Attestation for Peripherals
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security | Threat Analysis and Modeling
Researchers: Adrian Perrig, Jonathan McCune

SQUARE: Requirements Engineering for Improved System Security
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Formal Methods
Researcher: Nancy Mead

Techniques for Compositional Security: Foundations, Mechanized Reasoning and Applications
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Formal Methods | Software Security
Researchers: Anupam Datta, Limin Jia, Deepak-Garg

Trusted Computing
Research Area: Trustworthy Computing Platforms and Devices
Researchers: Anupam Datta, Adrian Perrig, Virgil Gligor, Amit Vasudevan

Trust Establishment in Interactive Human Protocols Over the Internet
Research Area: Trustworthy Computing Platforms and Devices
Researchers: Virgil Gligor, Adrian Perrig, Tiffany Hyun-Jin Kim

Trustworthy Computing Platforms and Devices
Research Area: Trustworthy Computing Platforms and Devices
Researchers: Virgil Gligor, Anupam Datta, Adrian Perrig, Amit Vasudevan, Limin Jia

Trustworthy Execution Environments on Mobile Devices
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security | Threat Analysis and Modeling
Researchers: Amit Vasudevan, Adrian Perrig, James Newsome, Jonathan McCune

XTREC: Secure Real-time Execution Trace Recording and Analysis on Commodity Platforms
Research Area: Trustworthy Computing Platforms and Devices | Security of Cyber-Physical Systems
Cross Cutting Thrusts: Software Security
Researchers: Adrian Perrig, Virgil Gligor, Amit Vasudevan