ARMOR Project
The primary problem in the ARMOR project is that the data owner wants to outsource their dataset to an untrusted server but still wants to ensure that the data and queries remain private and secure. However, the overhead, including storage and response time, should be reasonable. The dataset is structured as a dense scientific multidimensional array. One of the main methods for providing query privacy while allowing for performance overhead trade-offs is searchable symmetric encryption (SSE). There are different types of queries, including keyword searches, aggregation queries, and range queries.
Blockchain Project
This research focuses on creating specialized blockchain systems designed to meet specific needs, such as enhancing security, improving access control, and optimizing provenance tracking. I identify areas where regular blockchains might have limitations and develop smart algorithms to make the system work better. These algorithms, shaped by careful considerations of security risks, access control methods, and the complexities of provenance tracking. After establishing the theoretical foundation, I move into the practical phase, implementing the developed algorithms into the blockchain framework to ensure they seamlessly fit and work well with identified use cases.
The research concludes with a thorough evaluation, involving comprehensive assessments and comparisons to measure how well the blockchain performs in terms of effectiveness, reliability, and adaptability. The main goal is to validate the effectiveness of the tailored blockchain solutions in addressing specific security issues, improving access control, and enhancing the trustworthiness of provenance tracking. This approach ensures not only meeting the initial requirements but also providing innovative and practical solutions relevant to the identified application areas.
Web Security
This research project focuses on mitigating the attack surface of web applications through the implementation of runtime protection techniques. Web applications commonly utilize interpreted languages such as PHP, which, due to their widespread use, are often prone to security vulnerabilities. Specifically, these languages often operate with elevated privileges, making them susceptible to various types of attacks. In our project, we aim to decrease the attack surface of web applications by limiting the potential actions of attackers. This involves restricting the available commands and actions, granting only essential permissions, and thereby minimizing the potential damage that can be caused.
Fake News Detection
The FAKE News project is a research initiative in cryptographic technology, concentrating on the challenges posed by the dissemination of misinformation within end-to-end encrypted environments. This research is pivotal in understanding and mitigating the effects of false information while maintaining the essential privacy features of encrypted communication systems.
Core components of the project include:
Thresholded Report Schemes: This component involves the development of collective reporting mechanisms. The aim is to establish thresholds for user-generated reports that initiate a verification process, all within the constraints of preserving anonymity and the encryption paradigm.
Franking Techniques: The project explores the application of cryptographic franking to authenticate message origins. This segment focuses on designing systems that allow traceability and authenticity checks, balancing the need for source verification with the preservation of privacy and encryption principles.
Blocklisting Strategies: This area examines the implementation of dynamic blocklisting to counteract known misinformation sources. The challenge here lies in creating adaptable blocklists that are effective yet resistant to manipulation and evasion tactics.
Detection Algorithms for Fake News: A significant part of the project is dedicated to creating algorithms capable of identifying false information within encrypted messages. The challenge is to perform this analysis based on message patterns and metadata, without decrypting the content, thereby upholding end-to-end encryption integrity.
The FAKE News project addresses a critical intersection of misinformation spread and cryptographic technology, striving to develop solutions that balance information authenticity with the fundamental principles of privacy and data security in encrypted communication.
Edge IDS project
The Edge IDS project is an effort to identify and survey the current state-of-the-art IDS implementations and compare their performance in a resource-constrained edge network. The goal is to highlight the shortcomings of current IDS implementations in the edge computing space and offer solutions to the mentioned shortcomings through the implementation of a proof-of-concept.