Skip to main content

Cross-Cutting Thrusts: Software Security

Projects List

As-If Infinitely Ranged Integer Model
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security
Researcher: Robert Seacord

Autonomous Trustworthy Computing Platforms and Devices
Research Area: Trustworthy Computing Platforms and Devices | Security of Cyber-Physical Systems | Mobility
Cross Cutting Thrusts: Software Security
Researcher: Ole Mengshoel

BAP: The Binary Analysis Platform
Cross Cutting Thrusts: Software Security
Researchers: David Brumley, Andres Jager

Behavior-Based Malware Email Filtering
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security
Researchers: James Hoe, Jason Hong

Bridging the Gap Between Systems Security and Language Security
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security
Researchers: Jonathan McCune

Circuit-Level Secure-by-Design Field Programmable Gate Arrays
Research Area: Next Generation Secure and Available Networks
Cross Cutting Thrusts: Software Security
Researcher: Ken Mai

Compiling Epistemic Specifications to Secure Distributed Code
Cross Cutting Thrusts: Software Security | Formal Methods
Researcher: Frank Pfenning

Compositional Security
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Formal Methods | Software Security
Researchers: Anupam Datta, Limin Jia, Amit Vasudevan, Sagar Chaki

Deep Software Assurance: Requirements, Techniques, Field Experience
Cross Cutting Thrusts: Software Security
Researchers: Jonathan Aldrich, William Scherlis

Evaluating and Improving Browser Encryption
Cross Cutting Thrusts: Software Security | Usable Privacy and Security
Researchers: Collin Jackson, Lin-Shung Huang, Eric Chen

Mobile Platform Security
Research Area: Mobility
Cross Cutting Thrusts: Software Security | Formal Methods
Researchers: Lujo Bauer, Limin Jia

Next-Generation Binary Analysis Techniques and Platform
Cross Cutting Thrusts: Software Security | Formal Methods
Researcher: David Brumley

Open Source Evaluation and Assurance
Cross Cutting Thrusts: Software Security | Formal Methods
Researcher: William Scherlis

Principled Approach to Web Security
Cross Cutting Thrusts: Software Security | Formal Methods
Researchers: Anupam Datta, Limin Jia, Deepak Garg

Probabilistic Verification of Security Properties in Self-Adaptive Systems
Cross Cutting Thrusts: Software Security
Researcher: David Garlan

Protecting Browsers from Mixed Content Injection Attacks
Cross Cutting Thrusts: Software Security | Usable Privacy and Security
Researchers: Collin Jackson

Response to Software Vulnerabilities
Cross Cutting Thrusts: Software Security
Researchers: Ashish Arora

Robust, Secure, Efficient Networked Embedded Control Systems
Research Area: Trustworthy Computing Platforms and Devices | Mobility
Cross Cutting Thrusts: Software Security
Researcher: Bruno Sinopoli

Secure Concurrent Distributed Programming
Cross Cutting Thrusts: Software Security | Formal Methods
Researcher: Frank Pfenning

Secure Distributed Logic Programming
Cross Cutting Thrusts: Formal Methods | Software Security
Researcher: Frank Pfenning

Secure Software Development and Operation
Cross Cutting Thrusts: Software Security | Formal Methods
Researchers: David Brumley, Maverick Woo, Manuel Egele

Security Behavior Observatory
Research Area: Secure Home Computing | Privacy Protection
Cross Cutting Thrusts: Software Security | Usable Privacy and Security | Threat Analysis and Modeling
Researchers: Alessandro Acquisti, Nicolas Christin, Lorrie Cranor, Rahul Telang

Security Patterns: Assurance for Secure Concurrent and Distributed Computing
Cross Cutting Thrusts: Software Security | Next Generation Threat Prediction and Response | Formal Methods
Researchers: William Scherlis, Jonathan Aldrich

Security Quality Requirements Engineering (SQUARE) Project
Cross Cutting Thrusts: Formal Methods | Software Security
Researchers: Nancy Mead, Lorrie Cranor

Software-Based Attestation for Peripherals
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security | Threat Analysis and Modeling
Researchers: Adrian Perrig, Jonathan McCune

Studying the Android Malware Ecosystem
Research Area: Mobility
Cross Cutting Thrusts: Software Security
Researcher: Nicolas Christin

Targeted Software Assurance
Research Area: Survivable Distributed Systems
Cross Cutting Thrusts: Software Security | Formal Methods
Researchers: William Scherlis, Jonathan Aldrich

Techniques for Compositional Security: Foundations, Mechanized Reasoning and Applications
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Formal Methods | Software Security
Researchers: Anupam Datta, Limin Jia, Deepak-Garg

Trustworthy Execution Environments on Mobile Devices
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security | Threat Analysis and Modeling
Researchers: Amit Vasudevan, Adrian Perrig, James Newsome, Jonathan McCune

XTREC: Secure Real-time Execution Trace Recording and Analysis on Commodity Platforms
Research Area: Trustworthy Computing Platforms and Devices | Security of Cyber-Physical Systems
Cross Cutting Thrusts: Software Security
Researchers: Adrian Perrig, Virgil Gligor, Amit Vasudevan