Browse

Biometric Information Lifecycle Framework

Principal Investigator(s): Stephen Elliott; Shimon Modi; Keith Watson

The deployment and usage of biometric systems is increasing at a rapid rate as the technology becomes more mature and gains user acceptance. Large-scale civilian applications like Registered Traveler program and US-VISIT program rely heavily on biometric systems as part of its authentication process. Biometric systems are also deployed in commercial applications like Automated Teller Machines (ATM) to replace or complement ATM cards. Securing the user’s biometric information is just as important as securing the biometric system. Improving security of biometric systems does have a positive impact on securing biometric information, but securing the system does not imply that the information is also secure. The technology ecosystem needs to be analyzed taking into account its principle constituents: the biometric system, the biometric process and the biometric information lifecycle. The concept of information lifecycle management has been under development for some time now, but it has not been applied to biometric information. Biometric Information Lifecycle Management refers to a sustainable strategy of maintaining confidentiality, integrity and availability of biometric information and developing policies or its use. The Biometric Information Lifecycle comprises of the following phases: creation, transformation, storage, usage, and disposition. This research is a work in progress which will define the biometric information lifecycle phases, create a taxonomy of attacks on biometric information lifecycle phases, and improve the security and management of biometric information.

Botnet Analysis

Principal Investigator(s): James Goldman

As part of current research into malware behavior, the Botnet Analysis Team is developing standardized architectures and processes with which to detect, isolate, observe, analyze and potentially defend against or destroy botnets. Botnets are typically used for illegal activities, and are often made up of thousands of compromised computers. Botnet simulation will use a cluster of PCs configured with typical operating system and software configurations used by homes and businesses today.

C4ISR Testbed Support for Muscatatuck Urban Warfare

Principal Investigator(s): Ed Coyle, David Ebert, Ahmed Elmagarmid, Jim Goldman, et. al.

Casual Analysis of Collaborative Attacks and Experiments

Principal Investigator(s): Bharat Bhargava

Categorization of Various Types of Online Pornography Users & Personality Assessments

Principal Investigator(s): Marc Rogers

Do individuals view, download, and share various types of Internet pornography and are different personality characteristics related to a person’s pornography preference? This research project gathered data from online respondents regarding their use of adult, animal, and child pornography as well as various personality characteristics. Data has been collected and is currently being analyzed.

Certified Garbage Collection for Highly Responsive Systems

Principal Investigator(s): Jan Vitek; Tony Hosking

Classifying Child Porn Images in Law Enforcement Cases (COPINE)

Principal Investigator(s): Marc Rogers

Using the COPINE (Combating Paedophile Information Networks in Europe) classification model, which categorizes the severity of victimization in child pornography, United States law enforcement officers will be asked to classify Internet child pornography images they have seized as evidence for a 6 month period, using an anonymous online questionnaire. This project is currently in the data collection phase.

Classifying Java Class Transformations for Pervasive Virtualized Access

Principal Investigator(s): Antony L. Hosking

The indirection of object accesses is a common theme for target domains as diverse as transparent distribution, persistence, and program instrumentation. Virtualizing accesses to fields and methods (by redirecting calls through accessor and indirection methods) allows interposition of arbitrary code, extending the functionality of an application beyond that intended by the original developer.

We present class modifications performed by our RuggedJ transparent distribution platform for standard Java virtual machines. RuggedJ abstracts over the location of objects by implementing a single object model for local and remote objects. However the implementation of this model is complicated by the presence of native and system code; classes loaded by Java’s bootstrap class loader can be rewritten only in a limited manner, and so cannot be modified to conform to RugedJ’s complex object model. We observe that system code comprises the majority of a given java application: an average of 76% in the applications we study. We consider the constraints imposed upon pervasive class transformation within Java, and present a framework for systematically rewriting arbitrary applications. Our system accommodates all system classes, allowing both user and system classes alike to be referenced using a single object model.

Collaborative Attacks in WiMAX

Principal Investigator(s): Bharat Bhargava

In this paper, we discuss security problems, with a focus on collaborative attacks, in the Worldwide Interoperability for Microwave Access (WiMAX) scenario. The WiMAX protocol suite, which includes but is not limited to DOCSIS, DES, and AES, consists of a large number of protocols. We present briefly the WiMAX standard and its vulnerabilities. We pinpoint the problems with individual protocols in the WiMAX protocol suite, and discuss collaborative attacks on WiMAX systems. We present several typical WiMAX attack scenarios, including: bringing a large number of attackers to increase their computation power and break WiMAX protocols; assembling a sufficient number of attackers to influence the decision-making of core machines, which includes routing attacks and Sybil attacks; and exploiting implementations that do not conform to the WiMAX specification completely, causing interoperability problems among various protocols, including the ones in typical WiMAX/WiFi/LAN deployment scenarios. We present theoretical models and practical solutions to profile, model, and analyze collaborative attacks in WiMAX. We employ attack graphs to do vulnerability analysis. Experimental results verify our models and validate our analysis.

Collaborative Attacks In Wireless Networks

Principal Investigator(s): Bharat Bhargava