Science of Security

Opportunistic Privilege Separation (OPS)

OPS is the exploration of privileges within large scale code bases. The core idea is to synthesize decompositions directly from program behavior and measure the opportunity for least-privilege separation. We are currently applying it to Linux and JavaScript. We rely on the tool Memorizer to trace fine-grained intra-kernel operations.

View Report View Slides

Reasoning about Digital Evidence

The analysis phase of the digital forensic process is the most complex. This phase grows more complicated as the size and ubiquity of digital devices increase. Graph theory is used to study the pairwise relations between objects. We explore how graph theory can be used as a basis for further analysis.

View Paper View Slides

Analysis of Industrial Control Systems

We investigate the needs, gaps and scientific challenges of industrial control systems. We apply research to prove theory and validate efforts of those working field deployment, and to ensure the realism of fundamental research.

Applied Hacking

Virtual Machine Introspection

Virualized based security is driven by the threat of malware at the kernel level. We enhance the security outside the machine through the use of introspection of guest machines.

View Slides View Code

Legacy Security Implementation with SDN

The software-defined networking (SDN) field needs simple, general, and reusable abstractions for changing the configuration of the network in order to implement legacy security application such as firewalls. We begin to explore semantics of: per-packet and per-flow consistency to accomplish this task.

View Slides View Code

Mobile Malware Identification

We review many security topics and possible solutions on mobile devices. We perform a basic study to determine certain things about Android mobile security.

View Paper

Security Education

Digital Forensics

The Program in Digital Forensics team is developing a new undergraduate educational curriculum in digital forensics in order to address a national shortage of trained cyber-security professionals.

View Website

Cybersecurity Ethics

This coordinated, multidisciplinary effort, we will draw on the strengths and expertise of the College of Engineering, College of Education, School of Information Sciences, and the Information Trust Institute at the University of Illinois at Urbana-Champaign to expand upon strong existing technology focused educational programs in cybersecurity at the University of Illinois to establish a curriculum addressing the ethical dimensions of cybersecurity.

View Website

Cloud Computing Applications

This course is designed to give a comprehensive view of the cloud computing landscape.

View Website