Skip to main content

Cross-Cutting Thrusts: Threat Analysis and Modeling

Projects List

Accountable Mobile Computing Framework Based on User Behavior Modeling
Research Area: Secure Home Computing | Mobility | Privacy Protection | Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Next Generation Threat Prediction and Response | Threat Analysis and Modeling
Researchers: Martin Griss, Anind Dey, Joy Zhang

Adaptive Strategies for Cross-Layer Jamming and Anti-Jamming
Research Area: Next Generation Secure and Available Networks
Cross Cutting Thrusts: Threat Analysis and Modeling | Next Generation Threat Prediction and Response
Researcher: Patrick Tague

Analyzing the Threat Dynamics of Complex Networked Systems
Research Area: Survivable Distributed Systems
Cross Cutting Thrusts: Threat Analysis and Modeling
Researchers: Andrew Moore, Timothy Shimeall

Attacking and Defending Unreliable Hardware
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Threat Analysis and Modeling | Next Generation Threat Prediction and Response
Researcher: Onur Mutlu

Basis for Empowering Business IT Managers
Cross Cutting Thrusts: Threat Analysis and Modeling | Business Risk Analysis and Economic Implications
Researchers: Andrew Moore, Randall Trzeciak, Dawn Cappelli

Empirically-Based Insider Threat Risk Assessment Diagnostic
Cross Cutting Thrusts: Threat Analysis and Modeling | Next Generation Threat Prediction and Response
Researchers: Andrew Moore, Dawn Cappelli

Exploratory R&D of a Technology-Driven Insider Threat Scoring Metric
Cross Cutting Thrusts: Next Generation Threat Prediction and Response | Threat Analysis and Modeling
Researchers: Andrew Moore, Randall Trzeciak

Inference-Based Adaptation Techniques for Next Generation Jamming and Anti-Jamming Capabilities
Research Area: Next Generation Secure and Available Networks
Cross Cutting Thrusts: Next Generation Threat Prediction and Response | Threat Analysis and Modeling
Researcher: Patrick Tague

Insider Threat Analysis Center
Cross Cutting Thrusts: Threat Analysis and Modeling | Next Generation Threat Prediction and Response
Researchers: Andrew Moore, Randall Trzeciak, Dawn Cappelli

MERIT ITL: The Insider Threat Lab
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications | Threat Analysis and Modeling | Next Generation Threat Prediction and Response
Researchers: Andrew Moore, Randall Trzeciak, Dawn Cappelli

Online Crime Economics: Modeling Advertising and Retail Operations
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications | Threat Analysis and Modeling
Researcher: Nicolas Christin

Process Variation-Aware Modeling, Analysis, and Prevention of Thermal Attacks in Many-Core Systems
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Threat Analysis and Modeling
Researcher: Diana Marculescu

Robust, Secure, Efficient Cyber-Physical Systems
Research Area: Security of Cyber-Physical Systems
Cross Cutting Thrusts: Threat Analysis and Modeling
Researcher: Norman Sadeh

Security Behavior Observatory
Research Area: Secure Home Computing | Privacy Protection
Cross Cutting Thrusts: Software Security | Usable Privacy and Security | Threat Analysis and Modeling
Researchers: Alessandro Acquisti, Nicolas Christin, Lorrie Cranor, Rahul Telang

Software-Based Attestation for Peripherals
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security | Threat Analysis and Modeling
Researchers: Adrian Perrig, Jonathan McCune

Trustworthy Execution Environments on Mobile Devices
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Software Security | Threat Analysis and Modeling
Researchers: Amit Vasudevan, Adrian Perrig, James Newsome, Jonathan McCune

Understanding User Investments & Response to Security Threats
Cross Cutting Thrusts: Threat Analysis and Modeling | Business Risk Analysis and Economic Implications
Researcher: Nicolas Christin