Cyber Security Development
Cyber Security Development

The research challenge we address is that of securing computing infrastructure against a broad class of cyberattacks. Our objective is to develop new techniques that can remove many of the vulnerabilities that attackers exploit and that can predict and intercept new (zero-day) attacks that exploit previously unknown vulnerabilities. These objectives are realized through a number of sub-projects described in the proposal that fall into three categories: Systems that are much more difficult to penetrate; Systems that can work through penetrations; and Systems that can recover quickly.
 
This project was launched a year ago, getting started in full around the beginning of October 2013.  We have been ramping up the activities since then and are now fully engaged.  Although spending is now on track with the original plan, the ramp-up period has led to some under-spending for the year as a whole.

Principal Investigators
Srini Devadas, CSAIL
Adam Chlipala, CSAIL
Frans Kaashoek, CSAIL
Shafi Goldwasser, CSAIL
Howard Shrobe, CSAIL
Martin Rinard, CSAIL
Armando Solar Lezama, CSAIL
Vinod Vaikuntanathan, CSAIL
Nickolai Zeldovich, CSAIL
Dimitrios Serpanos, QCRI

Publications
X. Yu, C. Fletcher, L. Ren, M. Van Dijk, and S. Devadas, "Generalized External Interaction with Tamper-Resistant Hardware with Bounded Information Leakage", Proceedings of the Cloud Computing Security Workshop (CCSW), November 2013.

"Multi-Input Functional Encryption" Shafi Goldwasser, S.DovGordon,  Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi and Hong-Sheng Zhou, Appeared in Proceedings of 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2014), Copenhagen, Denmark, May 11-15, 2014

"Suppressing the Oblivious RAM Timing Channel While Making Information Leakage and Program Efficiency Trade-offs, C. Fletcher, L. Ren, X. Yu, O. Khan, M. Van Dijk, and S. Devadas,  Proceedings of the 20th Int'l Symposium on High Performance Computer Architecture, February 2014.

"Tiny Path ORAM: A Low-Latency, Low-Area Hardware ORAM Controller with Integrity Verification,"Christopher W. Fletcher and Ling Ren and Albert Kwon and Marten Van Dijk and Emil Stefanov and Srinivas Devadas.

“On the Behavioral Formalization of the Cognitive Middleware AWDRAT” by : Muhammad Taimoor Khan, Dimitrios Serpanos and Howard Shrobe, NWPT 2014 Workshop. 

"Freecursive ORAM: [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious RAM"Christopher W. Fletcher, Ling Ren, Albert Kwon, Marten Van Dijk, Srinivas Devadas, ASPLOS 2015 (MARCH 2015).

"Trapdoor Computational Fuzzy Extractors"Charles Herder, Ling Ren, Marten van Dijk, Meng-Day (Mandel) Yu , Srinivas Devadas, submitted to IEEE Security and Privacy, May 2015

Benjamin Delaware, Clément Pit--Claudel, Jason Gross, Adam Chlipala. Fiat: Deductive Synthesis of Abstract Data Types in a Proof Assistant. Proceedings of the 42nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'15). January 2015.

Clément Pit--Claudel, Peng Wang, Jason Gross, Benjamin Delaware, Adam Chlipala. "Correct-by- Construction Program Derivation from Specifications to Assembly Language."

M.T. Khan, D. Serpanos and H. Shrobe, “On the Behavioral Formalization of the Cognitive Middleware AWDRAT”, NWPT’2014 Workshop

M.T. Khan, D. Serpanos and H. Shrobe, “On the Formal Semantics of the Cognitive Middleware AWDRAT”, MIT Report

"Leveled Fully Homomorphic Signatures from Standard Lattices", Sergey Gorbunov, Vinod Vaikuntanathan and Daniel Wichs STOC 2015.

"Indistinguishability Obfuscation of Iterated Circuits and RAM Programs Ran Canetti, Justin Holmgren", Abhishek Jain and Vinod Vaikuntanathan STOC 2015.

 "Constrained Key-Homomorphic PRFs from LWE (or) How to Secretly Embed a Circuit in Your PRF", Zvika Brakerski and Vinod Vaikuntanathan, TCC 2015.

“A Low-Latency, Low-Area Hardware Oblivious RAM Controller”, FCCM 2015.

“PrORAM: Dynamic Prefetcher for Oblivious RAM”, ISCA 2015.

“Riffle: An Efficient Anonymous Communication System with Strong Anonymity”. S.M. Thesis.

"Predicate Encryption for Circuits from LWE" Sergey Gorbunov, Vinod Vaikuntanathan and Hoeteck Wee, CRYPTO 2015.

"The Trojan Method in Functional Encryption: From Selective to Adaptive Security, Generically," Prabhanjan Ananth, Zvika Brakerski, Gil Segev and Vinod Vaikuntanathan, CRYPTO 2015.

"Indistinguishability Obfuscation from Functional Encryption'" Nir Bitansky and Vinod Vaikuntanathan, IEEE Foundations of Computer Science (FOCS) 2015.