Detecting Attacks on Connected Vehicles

Attacks on connected vehicles require special attention and there is a need for new sophisticated security solutions that will cover the integration of different domains in connected vehicles and help proactively address potential threats to connected vehicles. The overall goal of this project is to provide various security solutions for integrity, access control, availability, and privacy of connected vehicles against security attacks. This project will help industry partner in developing and improving the security of connected vehicles.

Automatic Understanding of the Semantics of Source Code For IdentifyingSensitive Code Fragments

Source code is what programmers write as instructions to the computer to execute to complete a desired task. All operating systems and applications on a computer or a mobile device is a runnable version of a compiled source code. Experienced programmers can easily browse and understand source code in different programming languages because they have the necessary technical background that is not available for every-day users.

Safety and Security for Connected and Autonomous Vehicles

Currently, the automotive industry is going through a very significant transformation---one that is blending cars with modern IT, involving technologies such as: multiple CPUs for in-car computing, ad-hoc networking and Internet connectivity, computer vision and sensing technologies, entertainment and artificial intelligence for automated driving and real-world congestion control. Connected and intelligence vehicles are also raising cyber-security concerns.

To analyze and identify White Box techniques that can be used to protect cryptographic operations of various ciphers, starting with SM4 Symmetric Block Cipher

White-box cryptography seeks to maintain the secrecy of cryptographic keys used by software, despite an attacker having full control over the software. This project extends the work by Dr. Lin on the Chinese cipher SM4, as well as its application to a further cipher.
The goal of this project is: 1) To implement a complete white-box design of SM4 based on the concepts, and to implement tests, as identified by Dr. Lin; and then to determine the level of security that has been achieved.

Prototype Behavior Based Integrity Verification (BBIV)

Web computing, in which the world-wide web is itself employed as a distributed computing platform, is entering a stage of rapid expansion with the advent of Open Web Platform so that programs that once worked only a native environment on desktop, tablets or phones can now work from within a browser itself. There is therefore a need for a new form of protection for apps.

Prototype Behavior Based Integrity Verification (BBIV)

Web computing, in which the world-wide web is itself employed as a distributed computing platform, is entering a stage of rapid expansion with the advent of Open Web Platform so that programs that once worked only a native environment on desktop, tablets or phones can now work from within a browser itself. There is therefore a need for a new form of protection for apps.

Modeling and Analysis of access-control policies (SELinux and/or SMACK)

Access-control policy management is an increasingly hard problem from both the security point of view (is the policy “safe”?) and the functionality point of view (does the system still work as expected?). Even when a policy is considered both safe and functional, each addition, deletion or modification of the policy has the potential to break the baseline. Using existing tools and mechanisms to model and analyze policies to answer specific safety and functionality questions would be very useful to organizations using access-control policies.

Methods for detecting Hardware Blu-ray player emulation, debugging or instrumentation

Blu-Ray Disk Framework offers content protection system which is intended to protect audio/video media against piracy. The Blu-Ray Content Protection System consists of three individually working components: Advance Access Control System, ROM-Mark and BD+. Each component works collaboratively with the other in order to protect high-definition content distributed on Blu-Ray discs.

Design and secure implementation of a new white-box transform based on permutation polynomials

Irdeto has a need to create software that is protected in the white-box attack context, which means that attackers have direct access to the software, can execute it, modify it, and stop it to read the data being processed by the software. If attackers are able to modify software in ways that are useful to them, they can cause a wide range of problems including stealing data, gaining unauthorized access to systems, and stealing cryptographic keys.

HTML5 Integrity and Performance

The research involved in this internship focuses on the performance and integrity of HTML5. In terms of performance, the intern will design and implement a set of tests that will be used to analyze the performance of HTML5 applications. These tests will focus on measuring the computational performance, network performance, as well as rendering performance of such applications. The results of this research will allow Irdeto to make informed decisions about security and performance tradeoffs in their HTML5 protection activities.

Pages