Network Security Research Home Page

This is the main web page of Network System Security Research Lab headed by Dr. Edward Chow. Currently we have the following projects at different stages (some of these project-person mappings are tentative; you may move around or propose new one; follow your bliss; hope not changing too often:-)):

Right Place Right Route Data Delivery(R2D2) project
  1. Design and develop system for specifying/verifying R2D2 requirements.
  2. Develop web app with web crypto and google map APIs for encrypting data and specifying R2D2 restrictions.
  3. Develop Value-Added Software Defined Network for location path verification.
  4. Develop privacy preserving/enforcement tools for R2D2
  • Proximity Based Encryption (PBE) sponsored by Northrop Grumman.
    1. Proximity Specification and Verification.
    2. Tools for PBE based on Web Cryptography draft standard
    3. Create new network verification services for supporting PBE.
  • Software Defined Network Based TOR Network (SOR). Abdelhamid Elgzil.
    1. Design and develop bootstrap networks for TOR networks.
    2. Design and develop anonymous secure payment systems for SOR services.
    3. Design and develop efficent SDN based TOR networks.
  • Unified homeland security strategies through game theory. Rick White and Aaron Burkhart
    1. Rick White just finished his phd defense 11/5/2013. His dissertation attracts attention from DHS ST resulting the following grant.
    2. RAMCAP standard review and enhancement. Funded by ORNL and DHS ST.
    3. Develop a risk analysis tool for critical infrastructure. LIRA.
  • Cyber Resilience.
    1. Network Resilience in Cloud across Cloud Providers
    2. Defend with Diviersity: Explore the use of diverse OS/Library/Programming Languages.
    3. Migration of web service S2M, M2M, S2S, and M2S.
  • SCOLD: DDoS attacks and defenses.
    1. Intrusion Tolerance and the Cloud: Explore the use of virtual machines in cloud providers to establish alternate routes using multiple indirect routing/secure DNS.
    2. Utilize IPv6 address hoping to avoid and slowdown DDoS attacks.
    3. Large Scale Modeling and Simulation study of Botnet DDoS attacks and defense techniques.
    4. Fast intrusion traceback/pushback/tolerance techniques with Software Defined Networks. Josh Alcorn. Modeling using Estinet.
    5. Cloud/Computer/Mobile Forensics. Haitham Ennajah, Adil Ahmad
  • SCORES (Smart Cloud Optimal Resource Selection):
    1. N-Cloud Storage. Secure efficient striping techniques and tools for utilizing low cost cloud storage. Fahad Alsolami (he will move to Dr. Boult's group after finish the first phase this project with me.)
    2. Algorithms and network services for selecting data center locations given a set of producers, consumers, and metrics.
  • Tools and Techniques for Regulation Conformance (Initial work done by Sarah Pramanik, first graduate of phd security program). Sarah Pramanik, Ammar Almutawa
    1. Apply to DoD systems.
    2. Apply to Healthcare systems.
  • Cyber Physical System Security. Jarret Rush.
  • Return-Oriented Programming (ROP) Defense. Rodney Lykins.
  • Trusted system and their application to security and Privacy in Cloud and Social Networks.
  • Mobile Platform Vulnerability Analysis. Ehab Ashary, Abdulaziz Alzubaidi
  • IDE for Secure Programming (possibly a new secure programming language?). Abdullah Sheneamer.
  • Threats Theory and Their Applications. Sarah Pramanik, Abdelahmid Elgzil
  • Privacy issues in distributed sign translation systems. Michael Mennozzi.
  • Privacy by Design for Mobile Healthcare Applications. Arij Alfadi
  • Rules To Follow:


    Some advices given to beginning students: