Skip directly to content

Minimize RSR Award Detail

Research Spending & Results

Award Detail

Awardee:REGENTS OF THE UNIVERSITY OF CALIFORNIA, THE
Doing Business As Name:University of California-Berkeley
PD/PI:
  • S. Shankar Sastry
  • (510) 642-1857
  • sastry@eecs.berkeley.edu
Co-PD(s)/co-PI(s):
  • Virgil Gligor
  • John C. Mitchell
  • Janos Sztipanovits
  • Stephen B Wicker
Award Date:08/01/2005
Estimated Total Award Amount: $ 19,000,000
Funds Obligated to Date: $ 40,814,545
  • FY 2008=$4,020,220
  • FY 2005=$3,000,000
  • FY 2012=$4,954,430
  • FY 2014=$2,932,125
  • FY 2010=$4,000,000
  • FY 2017=$233,075
  • FY 2007=$4,000,000
  • FY 2006=$3,960,000
  • FY 2011=$5,167,895
  • FY 2015=$334,250
  • FY 2009=$4,658,325
  • FY 2013=$3,554,225
Start Date:06/01/2005
End Date:10/31/2018
Transaction Type: Cooperative Agreements
Agency:NSF
Awarding Agency Code:4900
Funding Agency Code:4900
CFDA Number:47.070
Primary Program Source:040100 NSF RESEARCH & RELATED ACTIVIT
Award Title or Description:Team for Research in Ubiquitous Secure Technology (TRUST)
Federal Award ID Number:0424422
DUNS ID:124726725
Parent DUNS ID:071549000
Program:STC CLASS OF 2005
Program Officer:
  • Sylvia Spengler
  • (703) 292-8930
  • sspengle@nsf.gov

Awardee Location

Street:Sponsored Projects Office
City:BERKELEY
State:CA
ZIP:94710-1749
County:Berkeley
Country:US
Awardee Cong. District:13

Primary Place of Performance

Organization Name:University of California-Berkeley
Street:Sponsored Projects Office
City:BERKELEY
State:CA
ZIP:94710-1749
County:Berkeley
Country:US
Cong. District:13

Abstract at Time of Award

PROJECT ABSTRACT Team for Research in Ubiquitous Secure Technology (TRUST) Dr. S. Shankar Sastry, Principal Investigator University of California at Berkeley Computer trustworthiness continues to increase in importance as a pressing scientific, economic, and social problem. The last decade has seen a rapid increase in computer security attacks at all levels, as more individuals connect to common networks and as motivations and means to conduct sophisticated attacks increase. A parallel and accelerating trend of the last decade has been the rapidly growing integration role of computing and communication in critical infrastructure systems, such as financial, energy distribution, telecommunication and transportation which now have complex interdependencies rooted in information technologies. These overlapping and interacting trends and needs force us to recognize that trustworthiness of our computer systems is not an IT issue alone; it has a direct and immediate impact on our nation's critical infrastructure and workforce issues. As a consequence, there is an acute need for developing a much deeper understanding of the scientific foundations of cybersecurity and critical infrastructure systems, understanding the economic and public policy drivers and impacts for cybersecurity, and assuring the workforce required for research and development. In response to these needs, the Team for Research in Ubiquitous Secure Technology (TRUST) will be devoted to the development of a new science and technology that will radically transform the ability of organizations (software vendors, operators, local and federal agencies) to design, build, and operate trustworthy information systems for our critical infrastructure. The Center will bring together a team with a proven track record in relevant areas of computer security, systems modeling and analysis, software technology, economics, and social sciences. The team consists of investigators from the University of California at Berkeley, Carnegie Mellon University, Cornell University, Stanford University, Vanderbilt University, and San Jose State University. The research team will be advised and supported by an External Advisory Committee (EAC) with strong representation of vendors of information technology, critical infrastructure protection providers, and other relevant stakeholders. The STC team, including the researchers, education group, and the knowledge transfer group, the EAC, and participant groups will promote workforce diversity. Through the active coordination and integration of efforts, TRUST researchers will consider security in a hierarchy of approaches that ranges from secure embedded systems to complex interdependent systems, each approach informing and building upon the others. Equally important, TRUST will address economic, social, and privacy considerations as the technology is acquired and absorbed into cybersecurity products and the critical infrastructure. The integrated, multidisciplinary approach made possible by the Center mode of funding will allow solutions to synergistically emerge from a "holistic systems" view of computer security, software technology, analysis of complex interacting systems, and economic and public policy. The unifying approaches of TRUST are computer security for component technologies, composition of components into secure systems, test and evaluation strategies, social and economic factors for successful security and the integration of the Center's research with education and knowledge transfer. Leveraging the prior investments of NSF, DoD and other agencies in various application testbeds, TRUST will continuously test the technologies resulting from its research. The role of the testbeds will be to integrate and evaluate technologies in specific and realistic systems, keep the research on track to answer societal objectives, and demonstrate the technologies for stakeholders in real systems. To achieve and demonstrate the core objectives in the selected real-life testbeds, TRUST will pursue a strongly coordinated research agenda in the following areas Security Science (1) Software Security; (2) Trusted Platforms; (3) Applied Cryptographic Protocols; and (4) Network Security Systems Science: (1) Complex Interdependency Modeling and Analysis; (2) Secure Network Embedded Systems; (3) Model-based Integration of Trusted Components; and (4) Secure Information Management Software Tools. Social Science: (1) Economics, Public Policy and Societal Challenges; (2) Digital Forensics and Privacy; and (3) Human Computer Interfaces and Security. TRUST will have an education and outreach component that focuses on integrating research and inquiry-based education and on transferring new and existing knowledge to undergraduate colleges, educational institutions serving under-represented populations, and the K-12 community. In so doing, TRUST will help lay the groundwork for training the scientists and engineers who will develop the next generation of trustworthy systems, as well as to help prepare the individuals who will ultimately become the users, consumers and beneficiaries of such systems. TRUST will also take a comprehensive approach to knowledge transfer. Since TRUST addresses well-defined and long term societal needs, the results in computer security, privacy and critical infrastructure protection will be easily communicated to decision makers, policy makers, and government agencies. With respect to industry, the selected integrative testbeds will be the focal points to interact with major stakeholder industries: power, telecommunication and embedded systems. Since TRUST will comprise multiple institutions, including technology vendors, infrastructure providers and leading research universities, the result will be wide spread dissemination, adaptation and continued evolution of ubiquitous secure technology. The legacy of TRUST to the nation will be the creation of a science and technology base, policy base, educational base, and technology transfer methodology for cybersecurity. The long-term research agenda of TRUST will not only advance the frontiers of knowledge in trustworthy computing; it will influence on a national scale future academic research, industrial R&D and education as TRUST researchers identify new directions of inquiry, disseminate their findings to the broader community, and produce a diverse group of skilled graduates who will advance the field further yet.

Publications Produced as a Result of this Research

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Johnson, B., Laskowski, P. Maillart, T. Chuang, J. and Christin, N. "Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You" 14th Workshop on the Economics of Information Security, v., 2015, p..

Merrill, N. Curran, M., Yang, J. and Chuang, J. "Classifying Mental Gestures with In-Ear EEG" IEEE EMBS 13th Annual International Body Sensor Networks Conference, v., 2016, p..

Stadlmair, S., Peer, C. D., Engel, D. and Wicker, S. "Decentralized Public Key Infrastructure for the Smart Grid" IEEE Security and Privacy, v., 2017, p..

Saurabh Shintre, Virgil D. Gligor, João Barros "Anonymity Leakage in Private VoIP Networks" IEEE Transactions on Dependable and Secure Computing, v.15, 2018, p.14.

G. Kurillo, A. Chen, R. Bajcsy, J.J. Han "Evaluation of upper extremity reachable workspace using Kinect camera" Technology and Health Care, v.2, 2013, p.641.

Guha, S. and Wicker, S.B. "Spatial subterfuge: an experience sampling study to predict deceptive location disclosures" Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, v., 2015, p..

Mehr, N., Sadigh, D., Horowitz, R. Sastry, S.S., Seshia, S.A "Stochastic Predictive Freeway Ramp Metering from Signal Temporal Logic Specifications" American Control Conference (ACC), v., 2017, p..

A. Arefin, Z. Huang, R. Rivas, S. Shi, W. Wu, P. Xia, K. Nahrstedt, G. Kurillo, R. Bajcsy "Classification and Analysis of 3D Tele-immersive Activities" IEEE Multimedia, v.20, 2013, p.38.

Stephen B. Wicker, Kolbeinn Karlsson "Internet advertising: technology, ethics, and a serious difference of opinion" Communications of the ACM, v.60, 2017, p.70.

Kajitani, S., Nogami, Y., Miyoshi, S. and Austin, T.H. "Volunteer Computing for Solving an Elliptic Curve Discrete Logarithm Problem" CANDAR: International Symposium on Computing and Networking, v., 2015, p..

Rezvani, T., Driggs-Campbell, K., Sadigh, D., Sastry, S.S., Seshia, S. A., Bajcsy, R. "Towards Trustworthy Automation: User Interfaces that Convey Internal and External Awareness" IEEE Intelligent Transportation Systems Conference (ITSC), v., 2016, p..

Still, J. D., Cain, A., & Schuster, D. "Human-centered Authentication Guidelines" Information and Computer Security, v., 2017, p..

Achiam, J., Held, D., Tamar, A., Abbeel, P. "Constrained Policy Optimization" 2017 International Conference on Machine Learning, v., 2017, p..

Y. Chen, N. Lorenzi, S. Nyemba, J. Schildcrout, and B. Malin "We work with them? Healthcare worker?s interpretation of organization relations mined from electronic health records" International Journal of Medical Informatics, v., 2014, p.. doi:10.1016/j.ijmedinf.2014.04.006 

Kamil Nar and S. Shankar Sastry "Step Size Matters in Deep Learning" Proceedings of the 32nd Conference on Advances in Neural Information Processing Systems (NIPS) 2018, v., 2018, p..

H. Zhang, S. Mehotra, D. Liebovitz, C. Gunter, and B. Malin "Mining deviations from patient care pathways via electronic medical record system audits" ACM Transactions on Management Information Systems, v.4, 2013, p.17.

Kamil Narr, Shankar Sastry "Residual Networks: Lyapunov Stability and Convex Decomposition" Proceedings of the 35th International Conference on Machine Learning (ICML) 2018, v., 2018, p..

F. Ofli, R. Chaudhry, G. Kurillo, R. Vidal, R. Bajcsy "Sequence of the Most Informative Joints (SMIJ): A New Representation for Human Skeletal Action Recognition" Journal of Visual Communication and Image Representation, v., 2014, p..

Stephen B. Wicker "Smartphones, Contents of the Mind, and the Fifth Amendment" Communications of the ACM, v.61, 2018, p.28.

Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev "Message-Locked Encryption for Lock-Dependent Messages" IACR Cryptology, v.2015, 2015, p.. doi:10.1007/978-3-642-40041-4_21 

Hoofnagle, C.J., Altaweel, I., Cabrera, J., Choi, H.S., Ho, K., and Good, N "Online Pharmacies and Technology Crime" The Handbook of Technology, Crime and Justice, v., 2016, p..

Karlsson, K. and Wicker, S. B. "The Free Rider Security Problem in The Internet Of Things" IEEE Security and Privacy, v., 2017, p..

Y. Mo and B. Sinopoli "Robust Estimation in the Presence of Integrity Attacks" IEEE Transactions on Automatic Control, v., 2014, p..

R. Jia, R. Dong, S. S. Sastry, C. Spanos "Optimal Sensor-Controller Codesign for Privacy in Dynamical Systems" IEEE 56th Conference on Decision and Control (CDC), v., 2017, p..

Kim, M., Park, Y., Kotalwar, R. "Robust and Agile System against Fault and Anomaly Traffic in Software Defined Networks" Journal of Applied Sciences, v., 2017, p..

Desai, S., Park, Y., Gao, J., Chang, S-Y., Song, C. "Improving Encryption Performance using MapReduce" IEEE International Symposium on Big Data Security on Cloud (BigDataSecurity), v., 2015, p..

Y. Mo and B. Sinopoli "On the Performance Degradation of Cyber-Physical Systems under Stealthy Integrity Attacks" IEEE Transactions on Automatic Control, v., 2014, p..

Cain, A. A., and Schuster, D. "Applying measurement to complementary situation awareness" Proceedings of the IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), v., 2016, p.121.

R. Jia, R. Dong, P. Ganesh, S. S. Sastry, C. Spanos "Towards a Theory of Free-Lunch Privacy in Cyber-Physical Systems" 55th Annual Allerton Conference on Communication, Control, and Computing, v., 2017, p..

Daniel B. Giffin, Amit Levy, Deian Stefan, David Terei, David Mazières, John C. Mitchell, Alejandro Russo "Hails: Protecting data privacy in untrusted web applications" Journal of Computer Security, v.25, 2017, p.427.

Qin Jia, Zhiming Shen, Weijia Song, Robbert van Renesse, and Hakim Weatherspoon "Supercloud: Opportunities and Challenges" M Operating Systems Review -- Special Issue on invited papers for LADIS, v.49, 2015, p..

G. Kurillo, R. Bajcsy "3D Teleimmersion for Collaboration and Interaction of Geographically Distributed Users" Virtual Reality, v.17, 2013, p.29.

Kamil Nar, S. Shankar Sastry "An Analytical Framework to Address the Data Exfiltration of Advanced Persistent Threats" Proceedings of the 57th IEEE Conference on Decision and Control (CDC) 2018, v., 2018, p..

Karlsson, K. and Wicker, S.B. "The Effect of Location Granularity on Semantic Location Inferences" Proceedings of the 49th Hawaiian Conference on System Science, v., 2016, p..

Wicker, S. B. "Smartphones, Contents of the Mind, and the 5th Amendment" Communications of the ACM, v., 2017, p..

Brown, P., Christensen, K., Nguyen, R., Wong, N., and Schuster, D. "An Investigation of Trust in Cyber Security Tools" Western Psychological Association, v., 2016, p..

Aron Laszka, Benjamin Johnson, Pascal Schottle, Jens Grossklags, and Rainer Bohme "Secure Team Composition to Thwart Insider Threats and Cyberespionage" ACM Transactions on Internet Technology, v., 2014, p..

Alessandro Acquisti, Laura Brandimarte, George Loewenstein "Privacy and human behavior in the age of information" Science, v.347, 2015, p.509. doi:10.1126/science.aaa1465 

D. Votipka, T. Vidas, and N. Christin "Passe-Partout: A General Collection Methodology for Android Devices" IEEE Transactions on Information Forensics and Security, v.8, 2013, p.1937.

Kouki, P., Fakhraei, S., Foulds, J., Eirinaki, M., Getoor, L. "HyPER: A Flexible and Extensible Probabilistic Framework for Hybrid Recommender Systems" Proceedings of ACM RecSys, v., 2015, p..

Sadigh, D., Sastry, S.S., Seshia, S.A., Dragan, A. "Information Gathering Actions over Human Internal State" IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), v., 2016, p..

Wicker, S. B. and Karlsson, K. "Internet Advertising: Technology, Ethics, and a Serious Difference of Opinion" Communications of the ACM, v., 2017, p..

K. A. Bamberger and D. K. Mulligan "Privacy in Europe: Governance Choices and Corporate Behavior" George Washington University Law Review, v.81, 2013, p.1529.

D. K. Mulligan & J. King "Bridging the Gap between Privacy and Design" University of Pennsylvania Journal of Constitutional Law, v.14, 2014, p..

Sadigh, D., Sastry, S.S., Seshia, S.A., Dragan, A. "Planning for Autonomous Cars that Leverages Effects on Human Actions" Robotics: Science and Systems (RSS), v., 2016, p..

Kubesch, A.S.; Wicker, S. B. "Digital rights management: The cost to consumers" Proceedings of the IEEE, v.103, 2015, p.726.

Lee, L. and Still, J. D. "Re-designing Permission Requirements to Encourage BYOD Policy Adherence" Proceedings of the 3rd Human Aspects of Information Security, Privacy, and Trust held at the 17th International Conference on Human-Computer Interaction, v., 2015, p..

San Nicolas-Rocca, T., Spears, J. "Information Security Capacity Building in Community-Based Organizations: Examining the Effects of Knowledge Transfer" 49th Annual Hawaii International Conference on System Sciences, v., 2016, p..

N. P. Doty and D. K. Mulligan "Internet Multistakeholder Processes and Techno-policy Standards: Initial Reflections on Privacy at W3C" Journal on Telecommunications and High Technology Law, v.11, 2013, p.135.

Lee, L. and Still, J. D. "Re-designing Permission Requirements to Encourage BYOD Policy Adherence" Proceedings of the 3rd Human Aspects of Information Security, Privacy, and Trust held at the 17th International Conference on Human-Computer Interaction, v., 2015, p..

Schmitz, T., Rhodes, D., Austin, T.H., Knowles, K. and Flanagan, C. "Faceted information flow in Haskell via control and data monad" POST: International Conference on Principles of Security and Trust, v., 2016, p..

Li, S., Gao, J., and Park, Y "A Sticky Policy Framework for Big Data Security" Proceedings of IEEE International Conference on Big Data Computing Service and Application, v., 2015, p..

Schmitz, T., Rhodes, D., Austin, T.H., Knowles, K. and Flanagan, C. "Faceted information flow in Haskell via control and data monads" POST: International Conference on Principles of Security and Trust, v., 2016, p..

Li, S., Gao, J., and Park, Y. "A Sticky Policy Framework for Big Data Security" Proceedings of IEEE International Conference on Big Data Computing Service and Applications, v., 2015, p..

Song, C., Goswami, K., Park, Y., Chang, S-Y. "Graphic Model Analysis of Frauds in Online Consumer Reviews" Second International Conference on Internet of Things Data, and Cloud Computing (ICC), v., 2017, p..

Robbert van Renesse, Nicolas Schiper, and Fred B. Schneider "Vive la Difference: Paxos vs. Viewstamped Replication vs. Zab" IEEE Transactions on Dependable and Secure Computing, v., 2014, p..

Roy Dong, Alvaro A. Cardenas, Lillian J. Ratliff, Henrik Ohlsson, and Shankar Sastry "Quantifying the Utility-Privacy Tradeoff in the Smart Grid" ACM Transactions on Cyber-Physical Systems, v., 2018, p..

K.G. Vamvoudakis, J.P. Hespanha, B. Sinopoli, Y. Mo "Detection in Adversarial Environments" IEEE Transactions on Automatic Control, v., 2014, p..

Ganesh, N., Di Troia, F. Corrado, V.A., Austin, T.H., and Stamp, M. "Static analysis of Malicious Java Applets" IWSPA: International Workshop on Security and Privacy Analytics, v., 2016, p..

Eftychios Theodorakis, John C. Mitchell "Semantic Security Invariance under Variant Computational Assumptions" International Association for Cryptologic Research (IACR) Cryptology, v.2018, 2018, p..

Damodaran, A., Di Troia, F., Corrado, V.A., Austin, T.H., and Stamp, M. "A Comparison of Static, Dynamic, and Hybrid Analysis for Malware Detection" Journal of Computer Virology and Hacking Techniques, v., 2016, p..

Anh Pham, Italo Dacosta, Bastien Jacot-Guillarmod, Kévin Huguenin, Taha Hajar, Florian Tramèr, Virgil D. Gligor, Jean-Pierre Hubaux "PrivateRide: A Privacy-Enhanced Ride-Hailing Service" Proceedings on Privacy Enhancing Technologies, v.2017, 2017, p.38.

Martins, G., Bhatia, S., Koutsoukos, X., Stouffer, K., Yee Tang, C., and Candell, R "Towards a Systematic Threat Modeling Approach for Cyber-Physical Systems" 3rd International Symposium on Resilient Cyber Systems, v., 2015, p..

Altaweel, I., Good, N., Hoofnagle, C. J. "Web Privacy Census" Technology Science, v., 2015, p..

R. Chabukswar, Y. Mo, and B. Sinopoli "Detecting Integrity Attacks on SCADA Systems" IEEE Transactions on Control Systems Technology: a Publication of the IEEE Control Systems Society, v.PP, 2013, p.12.

Y. Mo, S. Weerakkody, and B. Sinopoli "Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs" IEEE Control Systems Magazine, v., 2014, p..

Sadigh, D., Dragan, A., Sastry, S.S., Seshia, S.A "Active Preference-Based Learning of Reward Functions" Robotics: Science and Systems (RSS), v., 2017, p..

Martins, G., Moondra, A., Dubey, A., Bhattacharjee, B., and Koutsoukos, X. "Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems" Sensors, Special Issue on Real-Time and Cyber-Physical Systems, v., 2016, p..

Wicker, S. B. "Shannon Theory, Forced Decryption and the Fifth Amendment" Communications of the ACM, v., 2016, p..

Mayer, J., Mutchler, P., and Mitchell, J. C., "Evaluating the privacy properties of telephone metadata" Proceedings of the National Academy of Sciences, v.113, 2016, p..

Merrill, N., Maillart, T., Johnson, B., and Chuang, J. "Improving Physiological Signal Classification Using Logarithmic Quantization and a Progressive Calibration Technique" 2nd International Conference on Physiological Computing Systems, v., 2015, p..

Wong, N., and Schuster, D. "The use of virtual machines in learning about human behavior in cyber security" Spartan Psychological Association Research Conference, v., 2016, p..

Nar, K., Ratliff, L. J., Sastry, S. "Learning Prospect Theory Value Function and Reference Point Of A Sequential Decision Maker" 56th IEEE Conference on Decision and Control, v., 2017, p..

Mulligan, D. K, and Bamberger, K. A "Apple v. FBI: Just One Battle in the 'Design Wars" The Recorder and law.com, v., 2015, p..

Yang, J., Hance, T., Austin, T.H., Solar-Lezama, A., Flanagan, C., Chong, S "Precise, dynamic information flow for database-backed applications." PLDI: Conference on Programming Language Design and Implementation, v., 2016, p..

Itkin, M., Kim, M., Park, Y. "Development of Cloud-based UAV Monitoring and Management System" Journal of Sensors, v., 2016, p..

Chang, S-Y, Park, Y., Muralidharan, A. "Fast Address Hopping at the Switches: Securing Access for Packet Forwarding in SDN" IEEE Network Operations and Management Symposium (NOMS), v., 2016, p..

Mulligan, D. K., and Bamberger, K. A "Public Values, Private Infrastructure and the Internet of Things: the Case of Automobiles" Journal of Law & Economic Regulation, v.9, 2016, p..

Yavuz, F., Zhao, J., Yagan, O. and Gligor, V "k-Connectivity in random k-out graphs, intersecting Erd?s-Rényi Graphs" IEEE Transactions on Information Theory, v.63, 2017, p..

Mutchler, P., Safaei, Y., Doupe A., and Mitchell, J "Target Fragmentation in Android Apps" Mobile Security Technologies (MoST), v., 2016, p..

Zhao, J., Yagan, O., and Gligor, V. "On connectivity and robustness in random intersection graphs" IEEE Transactions on Automatic Control, v., 2016, p..

Narra, U., Di Troia, F., Corrado. V.A., Austin, T.H, and Stamp, M. "Clustering versus SVM for malware detection" Journal of Computer Virology and Hacking Techniques, v., 2015, p..

Zhao, J., Yagan, O., and Gligor, V. "On connectivity and robustness in random intersection graphs." IEEE Transactions on Automatic Control, v.62, 2017, p..

Y. Mo, J. Hespanha, and B. Sinopoli "Resilient Detection in the Presence of Integrity Attacks" IEEE Transactions on Signal Processing, v.62, 2013, p.31.

Y. Mo, J. Hespanha, and B. Sinopoli "Resilient Detection in the Presence of Integrity Attacks" IEEE Transactions on Signal Processing, v.62, 2014, p.31. doi:10.1109/TSP.2013.2284145 

Eirinaki, M., Patel, S. "QueRIE Reloaded: Using Matrix Factorization to Improve Database Query Recommendations" Proceedings of 2015 IEEE Intl. Conference on Big Data (IEEE BigData 2015), v., 2015, p..

M. Curran, J. Yang, N. Merrill, J. Chuang "Passthoughts Authentication with Low Cost EarEEG" Annual International Conference of the IEEE Engineering in Medicine and Biology Society, v., 2016, p..

Narra, U., Di Troia, F., Corrado. V.A., Austin, T.H, and Stamp, M. "Clustering versus SVM for malware detection." Journal of Computer Virology and Hacking Techniques, v., 2015, p..

Nogami, Y. and Austin, T.H. "Associative rational points for improving random walks with collision-based attacks on elliptic curve discrete logarithm problem" IJCIT: the International Journal of Computer and Information Technology, v., 2015, p..

Nogami, Y. and Austin, T.H. "Associative rational points for improving random walks with collision-based attacks on elliptic curve discrete logarithm problem" IJCIT: the International Journal of Computer and Information Technology, v., 2015, p..

P. Chia, J. Chuang, Y. Chen "Whack-a-mole: Asymmetric Conflict and Guerrilla Warfare in Web Security" 15th Workshop on the Economics of Information Security, v., 2016, p..

Padekar H., Park, Y., Hu, H., Chang. S-Y "Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks" ACM Symposium on Access Control Models and Technologies (SACMAT), v., 2016, p..

Padekar H., Park, Y., Hu, H., Chang. S-Y "Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks" ACM Symposium on Access Control Models and Technologies (SACMAT), v., 2016, p..

Park, Y., Chang, S-Y., Krishnamurthy, L.M "Watermarking for Detection Freeloader Misbehavior in Software-Defined Networks" IEEE International Conference on Computing, Networking and Communications, v., 2016, p..

Park, Y., Chang, S-Y., Krishnamurthy, L.M "Watermarking for Detection Freeloader Misbehavior in Software-Defined Networks" IEEE International Conference on Computing, Networking and Communications, v., 2016, p..

Potteiger, B., Martins, G., and Koutsoukos, X. "Software and Attack-Centric Integrated Threat Modeling for Quantitative Risk Assessment" Symposium and Bootcamp on the Science of Security, v., 2016, p..

Proios, D., Eirinaki, M., Varlamis, I. "TipMe: Personalized advertising and aspect-based opinion mining for users and businesses" Proceedings of Someris: Social Media and Risk, ASONAM/SOMERIS, v., 2015, p..

Proios, D., Eirinaki, M., Varlamis, I. "TipMe: Personalized advertising and aspect-based opinion mining for users and businesses" Proceedings of Someris: Social Media and Risk, ASONAM/SOMERIS, v., 2016, p..

Reece, T., and Robinson, W. H "Detection of hardware trojans in third-party intellectual property using untrusted modules" IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, v.35, 2016, p.357.

San Nicolas-Rocca, T., Spears, J. "Information Security Capacity Building in Community-Based Organizations: Examining the Effects of Knowledge Transfer" Proceedings of the 49th Annual Hawaii International Conference on System Sciences, v., 2016, p..

San Nicolas-Rocca, T., Spears, J. "Information Security Capacity Building in Community-Based Organizations: Examining the Effects of Knowledge Transfer" Proceedings of the 49th Annual Hawaii International Conference on System Sciences, v., 2016, p..

Schuster, D., Still, M. L., Still, J. D., Lim, J. J., Feria, C. S., and Rohrer, C. "Opinions or algorithms: an investigation of trust in people versus automation in app store security" Lecture Notes in Computer Science, v., 2015, p..

Schuster, D., Still, M. L., Still, J. D., Lim, J. J., Feria, C. S., and Rohrer, C. "Opinions or algorithms: an investigation of trust in people versus automation in app store security" Lecture Notes in Computer Science, v., 2015, p..

Sedenberg, E. M., and Mulligan, D. K "Public Cybersecurity and Rationalizing Information Sharing" Berkeley Technology Law Journal, v., 2016, p..

Singh, T., Di Troia, F., Corrado, V.A., Austin, T.H., and Stamp, M. "Support vector machines and malware detection" Journal of Computer Virology and Hacking Techniques, v., 2015, p..

Singh, T., Di Troia, F., Corrado, V.A., Austin, T.H., and Stamp, M. "Support vector machines and malware detection" Journal of Computer Virology and Hacking Techniques, v., 2015, p..

Song, C., Park, Y., Gao, J. a Nanduri, S.K. "Favored Encryption Techniques and Evaluation for Big Data in a Cloud" Proceedings of IEEE International Conference on Big Data Computing Service and Applications, v., 2015, p..

Song, C., Park, Y., Gao, J. a Nanduri, S.K. "Favored Encryption Techniques and Evaluation for Big Data in a Cloud" Proceedings of IEEE International Conference on Big Data Computing Service and Applications, v., 2015, p..

Spears, J.L. and San Nicolas-Rocca, T. "Knowledge Transfer in Information Security Capacity Building for Community-Based Organizations" International Journal of Knowledge Management, v., 2015, p..

Spears, J.L. and San Nicolas-Rocca, T. "Knowledge Transfer in Information Security Capacity Building for Community-Based Organizations." International Journal of Knowledge Management, v.11, 2015, p..

Swathi P., Fabio Di Troia, Corrado, V.A., Austin, T.H., and Stamp, M "Clustering for malware classification" Journal of Computer Virology and Hacking Techniques, v., 2016, p..

Vemparala, S., Di Troia, F., Corrado, V.A., Austin, T.H. and Stamp, M. "Malware detection using dynamic birthmarks" IWSPA: International Workshop on Security and Privacy Analytics, v., 2016, p..

Xie W., Chen Y., Kantarcioglu M., Edwards T.L., Malin B. "Inferring private traits from summary statistics: questioning the limited privacy protection of distributed frameworks" Workshop on Privacy-aware Computational Genomics, v., 2015, p..

Xie W., Kantarcioglu M., Denny J.C., Edwards T.L., Cox N.J., Malin B. "Privacy leaks in quality control for meta-analysis and effective countermeasures" 65th Annual Meeting of the American Society of Human Genetics, v., 2015, p..

Yavuz, F., Zhao, J. Yagan, O. and Gligor, V. "Towards K-connectivity of the random graph induced by a pairwise key predistribution scheme with unreliable links" IEEE Transactions on Information Theory, v.61, 2015, p..


Project Outcomes Report

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

The Team for Research in Ubiquitous Security Technology (TRUST) was created in response to a growing sense of urgency in dealing with all aspects of cyber security as it affects society. As the role and penetration of computing systems and networks in our societal infrastructure has gown, their importance to societal safety and security has never been greater. Beyond mere connection to the Internet and access to global resources, information systems form the backbone of our nation's financial services and electronic commerce, are used for controlling critical infrastructures such as power, water, and telecommunications, and enable the rapid evolution in healthcare toward enhanced services increasingly supported by the digital storage of and instant access to patient health and medical data.

Through a long-term investment by the National Science Foundation, the TRUST Center brought together several universities that joined forces to organize a multifaceted response to these issues. TRUST represented the strongest and most diverse engagement in the area of trusted systems ever assembled and combined fundamental science with a broad multidisciplinary focus on economic, social, and legal considerations as well as a substantial education component. TRUST facilitated dialog with stakeholders whose needs could not be approached in a narrower and purely technical manner or by any single research group. As such, TRUST acted as an intermediary between policy makers and society at large on the one hand, and researchers, academics, and industrial providers of services and technologies on the other. TRUST achieved its mission through research as well as a global policy for engaging in education of society as a whole. 

In research, TRUST achieved success along several fronts and addressed fundamental scientific and technological problems and advancing the state-of-the-art in a number of areas: security and privacy issues associated with the rapidly increasing use of electronic media for the archival and access of patient medical records; web authentication, end-user privacy, next-generation browser security, malware detection, and improved system forensic techniques to combat online attacks; application defenses for network-level intrusions and attacks including compromised and malfunctioning legacy applications, viruses, worms, and spyware; incentives for research, investment, policies, and procedures for technology that enhance system security, privacy, and trustworthiness; secure embedded sensor networks for large-scale applications critical to the nation's economy, energy, security, and health; and techniques that ensure trustworthy computing by securing hardware, improving software robustness, and increasing the survivability of critical systems.

In education, TRUST leveraged an existing learning technology infrastructure to quickly enable TRUST-developed courseware and material to be assembled, deposited in a repository, and adapted for wide web-based content dissemination. In addition to creating special courses for undergraduate and graduate curricula, and regular seminars and webcasts, the Center organized a series of workshops and conferences. It also developed online courses and support for defining an improved security curriculum for the nation's higher education system that leverages the rapid technological developments in the security area.

In diversity, TRUST had an ambitious goal of reaching a diversity goal across the Center of 30% women and 10% from underrepresented minorities. The Center was very proactive in this regard and expanded several programs for enhancing diversity and broadening the participation of women and underrepresented minorities.

In knowledge transfer, TRUST implemented a robust program of technology transition with industry (from reporting security vulnerabilities to software vendors to various consulting activities) and active engagement with governmental agencies such as the Department of Homeland Security (DHS), the Department of Defense (DoD), the Department of Energy (DoE), and the Intelligence Community (IC) which are all concerned with issues of cyber security and trustworthiness. TRUST also worked with an active set of industrial partners to engage in research and development collaborations of mutual interest, resulting in a number of Center-developed technologies being adopted by companies, the creation of startups in the security and privacy field, and the placement of many TRUST-supported undergraduate and graduate students.


Last Modified: 01/30/2019
Modified by: S. Shankar Sastry

For specific questions or comments about this information including the NSF Project Outcomes Report, contact us.