Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Science and Engineering 1 Information Assurance Research Department of Computer Science and Engineering University of South Carolina, Columbia.

Similar presentations


Presentation on theme: "Computer Science and Engineering 1 Information Assurance Research Department of Computer Science and Engineering University of South Carolina, Columbia."— Presentation transcript:

1 Computer Science and Engineering 1 Information Assurance Research Department of Computer Science and Engineering University of South Carolina, Columbia

2 Faculty in Information Assurance 3 faculty members with primary interest in IA –Csilla Farkas: Information assurance, web data security and privacy, damage and social vulnerability analysis of cyber attacks –Chin-Tser Huang: Intrusion detection, wireless security, network protocols –Wenyuan Xu: Wireless networking and security, sensor networks, jamming detection and avoidance 6 faculty members with IA-related research –Duncan Buell, Caroline Eastman, Stephen Fenner, Michael Huhns, Manton Matthews, and John Rose

3 Computer Science and Engineering 3 Csilla Farkas Associate Professor (2000 – present)

4 Computer Science and Engineering 4 Semantic Web security –Data and meta-data security –Secure information sharing –Web application security Critical Infrastructure Protection –Economic and social aspects of cyber attacks –SCADA systems security Research Directions Organizational Data Confidential Ontology Secure Data Integration and Inferences Public User Web Data Public Access Control Models Offense Defense Other Research – Policy Compliance – Online Privacy – Open source intelligence – Secure VANET communication

5 Computer Science and Engineering 5 Secure Semantic Web Web Data and Metadata Security –Semantic-Aware XML access control –RDF security policy –Stream data security Web Services (WS) Security –Service-level security across heterogeneous domains –Identity and trust management –Execution correctness, WS transactions

6 Computer Science and Engineering 6 Damage Assessment and Social Vulnerability Damage Estimation and Social Vulnerability –Damage of the target may not reflect the real amount of damage –Services may rely on the attacked service, causing a cascading and escalating damage –Identify characteristics to evaluate vulnerability of different social strata for cyber attack consequences Support decision makers to –Evaluate risk and consequences of cyber attacks –Support methods to prevent, deter, and mitigate consequences of attacks

7 Computer Science and Engineering 7 Chin-Tser Huang Assistant Professor (2003 – present)

8 Computer Science and Engineering 8 Wenyuan Xu Associate Professor (2007 – present)

9 Wireless networking and security Wireless networking and security Interested in non-traditional security and privacy issues for emerging wireless systems Vehicular networks, Sensor networks….. Like to deal with real systems, play with cool gadgets. Like to break thing first, then build a solution Computer Science and Engineering 9

10 10 Computer Science and Engineering Radio Interference/Jamming Attacks in Wireless Networks  Wireless networks  Communicate via shared media  Channel access protocol: carrier sense based  Threats  Unintentional radio interference: 802.11b/g, cordless phone, Bluetooth, Microwave oven share the same frequency band  Intentional jamming: A transmitter overrides any signal with enough power  Research  Jamming detection– distinguish between radio interference scenario from normal network dynamics, including congestion, hardware failure, mobility  Jamming defenses – resume network connectivity in the presence of jamming  Channel Surfing  Timing channel BobAlic e Hello … Hi … @#$%$# @& … Mr. X

11 Security Analysis of TPMS TPMS - Tire Pressure Monitoring Systems –Monitoring the air pressure inside tires in automobiles. –All cars made after 2008 are mandated to install TPMS Any secure or any privacy issues? –Can we eavesdrop? –Can we inject fake packets? Not much TPMS information available in public domains. => Reverse engineered communication protocols Computer Science and Engineering 11

12 Computer Science and Engineering 12 Privacy Issues in Wireless Networks Content-Oriented Security and Privacy: –Issues that arise because an adversary can observe and manipulate the exact content in a sensor message. –Best addressed through cryptography and network security. Context-Oriented Privacy (what we are interested): –Issues that arise because an adversary observes the context surrounding creation and transmission of a sensor message. –Example: sink location privacy in sensor networks. 12 ATM

13 Computer Science and Engineering 13 Contact Information Center for Information Assurance Engineering http://www.cse.sc.edu/research/isl


Download ppt "Computer Science and Engineering 1 Information Assurance Research Department of Computer Science and Engineering University of South Carolina, Columbia."

Similar presentations


Ads by Google