Selected Projects.
 |
|
StorageFabric
High Performance Software-Defined Storage Unification and Protection Fabric
|
|
 |
|
ENFORCER SRX1
World's first general-purpose FIPS 140-2 Level 4 Secure Server
Sponsors: NSF, Air Force, IARPA, DHS, Navy/ONR, others
|
|
|
|
DECAF
Automatic, Adaptive De-bloating and Hardening of COTS Firmware
Sponsors: ONR
Research:
2020usenixsec.2
|
|
|
|
REARM
Protecting ARM Binaries via Load-time Reduction and Run-time Read-Protection
Sponsors: ONR
Research:
2020usenixsec
|
|
 |
|
CipherLocker
Zero Trust Drag and Drop File Sharing Platform
Sponsors: NSF, others
|
|
|
|
Plausible Deniability
Practical Plausibly Deniable Encryption through Low-Level Storage Device Behavior.
Sponsors: NSF CNS SatC 1526707
Research:
2015tifs,
2016oram-ccs,
2016datalair-ccs,
2017apsys,
2017pets,
2019pets,
2019ndss.2,
2020pets,
2020pets.2,
2021usenixsec
|
|
|
|
Sensorprint
Hardware-Enforced Information Authentication for Mobile Systems.
Sponsors: NSF CNS CSR 1526102
|
|
|
|
Smart Grid Android Manager.
Android-Based Smartgrid Management.
Sponsors: DOE
|
|
 |
|
National Security Institute
The National Security Institute (NSI) vision and core mission is to secure our homeland by researching and developing technologies and insights for secure, trustworthy, and available communications and computing platforms.
We're hiring!
|
|
|
|
uID: A Strongly-Secure Usable Identity Ecosystem with Privacy.
A secure, usable, privacy-enabling digital identity ecosystem able to integrate, and synergize
with existing governmental, commercial and open-source identity and authentication solutions.
Research:
2012.uid.vision,
2012.uid.proposal
|
|
 |
|
Cloudtracker.
Transparent, Secure Provenance Tracking and Security Policy Enforcement in Clouds.
Sponsors: NSF CNS 1161541
Research:
2014cloudflow,
2014sok
|
|
|
|
Green Hadoop.
Cost and Energy-Aware Cloud and HPC Computing.
Sponsors: NSF CNS 1318572
Research:
2013lips-hipc,
2014socc,
2015ccgrid,
2017tcc-affordhadoop
|
|
 |
|
NFS4Sec.
An Extensible Security Layer for Network Storage
Sponsors: NSF CNS 1223239
|
|
|
|
Security and Privacy in Geo-Social Networks.
Sponsors: US ARMY
Research:
2011gis,
2012geosocial
|
|
 |
|
Secure Provenance in High-End Computing Systems.
Designing secure provenance mechanisms for high Performance Computing.
Sponsors: NSF CCF 0937833
Research:
2007storagess-provenance,
2009sprov-fast,
2009remembrance-cidr,
2009sprov-usenix-login,
2009sprov-tos,
2010tapp,
2011worm-tifs,
2011socc-ccost
|
|
|
|
Optimal cloud-scale resource co-scheduling of data and computation.
Sponsors: TBA
Research:
2011hpdc-xen
|
|
 |
|
CAREER: Practical Privacy for Outsourcing Systems.
Mechanisms for secure data outsourcing, private information retrieval and oblivious transaction processing.
Sponsors: NSF CAREER CNS 0845192
Research:
2006pir-panel,
2007pir,
2007sdo-chapter,
2007ns2demo,
2007sdo-tutorial,
2008pir-ndss,
2008pir-ccs,
sion2009otp-ndss,
sion2009ccsw,
sion2009mitTR3,
sion2009mitTR2,
sion2009mitTR,
2010worm-oram,
2010private-join,
2010fc,
2010fc-workshops,
2010wpes-pcost,
sion2010mitTR4,
2010cloud-cpu,
2010cloud-rds,
2010cloud-storage,
2010cloud-http,
2011cloud-cpu2,
2011pir-tissec,
2011cloud-net1,
2011fc-oram,
2011cloud-net2,
2011cloud-elb,
2011private-join,
2011cloud-sqs,
2011socc-ccost,
2012sroram,
2012privatefs-ccs,
2012pir-ccs,
2013deb-pcost,
2013oram-tissec,
sion2015atc-concurdb
|
|
 |
|
cDB: Strong Regulatory Compliant Databases.
Regulatory compliance for relational databases
Sponsors: NSF IIS 0803197,
CRI CNS 0708025
Research:
2007sdm-health,
2007storagess-provenance,
2009sprov-fast,
2009remembrance-cidr,
2009sprov-usenix-login,
2009sprov-tos,
2009compliance-chapter,
2011sigmod-trusteddb,
2011worm-tifs,
2011worm-oram,
2011private-join,
2011vldb-trusteddb-demo,
2013tkde-trusteddb,
2013vldb-correctdb,
2013ficklebase-icde,
2013hifs-ccs
|
|
 |
|
The Stony Brook Trusted Hardware Lab.
The THL (established in the Fall of 2007 as part of the NSAC Lab)
constitutes a central academic expertise and research knowledge repository
on secure hardware, a nation-wide first of its kind. It will support
community-wide educational and research activities, and provide direct hands-on
or networked access to remote or visiting research community members. Plan to
visit ? Do not hesitate to contact us.
Sponsors: NSF CRI
CNS 0708025, IBM Cryptography Software Group
Research:
2008hardware-tutorial-usenix,
2008hardware-tutorial-ccs,
2009hardware-tutorial-oakland,
2010pufs
|
|
|
|
Secure Sensing.
|
|
 |
|
NS3: Networked Secure Searchable Storage with Privacy and Correctness.
Robust, efficient, and scalable content-search mechanisms for networked data
storage with confidentiality, search pattern privacy, and data retrieval
correctness.
Sponsors: NSF CNS 0627554,
CRI CNS 0708025
Research:
2006pir-panel,
2007pir,
2007sdo-chapter,
2007ns2demo,
2007sdo-tutorial,
2008pir-ndss,
2008pir-ccs,
2009otp-ndss
|
|
 |
|
Miscelaneous Applied Crypto/Security.
Having fun with Dick and Jane.
Sponsors: NSF
Research:
2006rep-fc,
2009wpes-xpay,
2010cec,
2012tifs-xpay
|
|
 |
|
Secure Document Management.
Infrastructure for document management with secure provenance assurances.
Sponsors:
Xerox
Research:
2007storagess-provenance,
2009sprov-fast,
2009remembrance,
2009sprov-usenix-login
|
|
 |
|
SecureWORM: Strong Regulatory Compliant Storage.
A regulatory compliant store with guaranteed data
retention and deletion, quick lookup, and compliant migration.
Sponsors: NSF CNS 0716608,
CRI CNS 0708025
Research:
2010worm-oram,
2008worm-icdcs,
2007worm-chapter,
2007worm-tutorial,
2007sdm-health,
2007storagess-provenance,
2007eds-WORM
|
|
 |
|
Personal DRM in cellular contexts.
User-level DRM controls for content access, data integrity and rights management in cellular contexts, enabling
enforcement of ORCON-type policies.
Sponsors: Motorola Labs
Research:
2007drmdemo,
2009drm
|
|
 |
|
Secure Location Certification for Sensor Networks.
Achieving Assurances for Location Claims for Sensor Network
Data Flows in Hostile Environments.
Collaborators: Jie Gao, Sol Lederer
Sponsors: CEWIT
Research:
2009sensors,
2008sensors,
2007sensors
|
|
 |
|
SQi: The Secure Query Interface.
A secure extension to a legacy query interface to allow for proofs of query execution,
correctness and completeness. It is extensible in that it allows for arbitrary plugins
to be written for additional expression ability (e.g. a constraint plugin that could
be used to handle privacy constraints and enforce inference controls). It allows for
access to any arbitrary (set of) remote data sources.
Research:
2005sdo-vldb
|
|
 |
|
IBM Almaden (2004)
In the On Demand and Grid Computing Group,
at the IBM Almaden Research Lab I
was responsible for designing and implementing a data-aware grid scheduling infrastructure.
Research:
2004xg-icdm,
2005xg-jsspp,
2005xg-dexa,
sion2006xg-edbt
|
|
 |
|
Rights Assessment for Discrete Digital Data.
A foundational framework for Digital Rights Protection through
Information Hiding, an important part of my doctoral dissertation.
Research: 2002:NLW,
2002nrwm,
2002wmpower,
talks,
ONR Proposal,
CERIAS Proposal,
Proposal NSF,
CERIAS TR 2002-30,
CERIAS TR 2001-54,
2002wmdb-sigmod,
2002wmbounds,
2002wmss,
2003categorical,
2003wmdb-icde-demo,
2003wmsensor-VLDB,
2004thesis,
sion2006wmdb-tutorial
|
|
 |
|
NEC Internship (Summer 2003)
My work at NEC Research in Cupertino. I work on
security and monitoring for Web Service Business Workflows.
Research: 2005wsmon-icws
|
|
 |
|
WMDB: Relational Database Watermarking.
A new theory and proof-of-concept software implementation
for watermarking and information hiding in a relational data
framework. It includes a user-friendly GUI and enables remote
access to any arbitrary SQL database.
Research: 2002nrwm,
2002wmpower,
CERIAS TR 2002-28,
2002wmdb-sigmod,
sion2003categorical,
sion2003wmdb-icde-demo,
2005wmdb-chapter,
2007wmdb-chapter
|
|
 |
|
MATRIX. Peer to Peer CPU Sharing.
Matrix aims at using Peer to Peer computing in sharing CPU cycles.
|
|
 |
|
NEC Internship (Summer 2001, Spring 2002)
My work at NEC Research in San Jose. I worked on building
a cache for dynamic database web driven sites as well as
in the area of content based delivery networks.
Research: 2002vldb,
TR at NEC Research 2001,
TR at NEC Research 2002
|
|
 |
|
XPRO: IP Router
A quite nice project, resulting in the writing from scratch of a TCP/IP Router,
including NAT, firewalling, network snooping, remote logging etc. I worked in a
team of 4 on this and wrote most of the routing structures, RIP, firewalling, control
interface, others. I invented a new routing structure, the TRIX. Was lots of fun.
Under the supervision of Doug Comer,
the ultimate authority on this matter.
Research: report
|
|
 |
|
QUASAR: Quality of Service Aware Repository
During my PhD, I briefly worked on QoS for high performance databases.
Research: TR at Computer Sciences,
2003quasaq-edbt
|
|
 |
|
IBM Internship (Summer 2000)
My work at IBM Transarc. This was my first internship
in the US. I worked in an R&D environment where
i developed an "object browser" for WebSphere tm.
as well as some other applications including
a stock quote retrieval application using EJBs,
hot technology at the time.
|
|
 |
|
The MicroServer
During my brief involvement with the Bond Agent System,
together with L. Boloni, I came up with an
idea of enabling access to methods and object through a HTTP interface (long before SOAP came about !!!).
This resulted in the MicroServer concept and implementation. It did not get finalized due to
largely political reasons. We nevertheless got a paper out of it.
Research: micros2000
|
|
 |
|
The Bond Agent System
In the first days of my PhD, I was co-opted to work in the
Bond Agent System
Research lab (moved to Florida now). I changed my research topic after my first year but
nevertheless wrote some agents code and parts of a Bond beginners manual. This resulted also in
a peer-reviewed paper and several tech-reports.
Research: 2000asama,
TR-CS-BOND-2000,
TR-CS-ACL-2000
|
|
 |
|
Talking Objects.
A distributed servicing system on top of JVM done during
my undergraduate college years (1996-98). The main idea was to use
natural language in inter-entity communication and service
advertisments. Maybe I will
continue this sometime in the future.
Research:
TR-CS-PUB-talking-nl-1999,
TR-CS-PUB-talking-id-1999,
TR-CS-PUB-talking-1999
|
|
 |
|
JVM: The Jet (Java) Virtual Medium
This is my main undergraduate thesis.
JVM is designed to use some of the advanced (in late 1995:))
features of java in order to create a friendly interface to a virtual
networked community. It is basically a distributed system enabling
a set of clients to transparently communicate by exchanging arbitrary
objects through itself.
Research:
TR-CS-PUB-distrib-1999
|
|