Skip to content

Commit 155a914

Browse files
authored
Merge pull request #1 from dgopstein/projectpgedits
beginings
2 parents f4be71c + 81c4f26 commit 155a914

File tree

4 files changed

+98
-3
lines changed

4 files changed

+98
-3
lines changed

_data/people.yml

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
link: https://www.python.org/dev/peps/pep-0458/
1212
- name: PEP 480
1313
link: http://catalog.unm.edu/catalogs/2013-2014/courses/PEP/480-582.html
14-
deployments: TUF (used in Flynn, LEAP, and Docker software repositories; on-going integrations at repositories for Ruby, CoreOS, Haskell, OCaml, and Python’s PyPI).
14+
deployments: TUF (used in Flynn, LEAP, and Docker software repositories; on-going integrations at repositories for Ruby, CoreOS, Haskell, OCaml, and Python’s PyPI).
1515

1616
- name: Lukas Pühringer
1717
role: Developer
@@ -24,6 +24,15 @@
2424
link: https://isis.poly.edu/~jcappos/papers/rafetseder_sensorium_netsys_13.pdf
2525
- name: TryRepy Wiki
2626
link: https://seattle.poly.edu/wiki/TryRepy
27-
deployments: <a href="https://isis.poly.edu/~jcappos/papers/rafetseder_sensorium_netsys_13.pdf">Sensorium Framework</a> (used on dozens of smartphones to capture data for Open3GMap), Sensibility Testbed.
28-
27+
deployments: <a href="https://isis.poly.edu/~jcappos/papers/rafetseder_sensorium_netsys_13.pdf">Sensorium Framework</a> (used on smartphones to capture data for Open3GMap), Sensibility Testbed.
2928

29+
- name: Dan Gopstein
30+
role: Ph.D. Student (co-advised with Andy Nealen)
31+
since: 2015
32+
photo: img/smiley.jpg
33+
interests: Programming languages and software systems
34+
projects: <a href="https://atomsofconfusion.com/">Atoms of Confusion</a>
35+
publications:
36+
- name: SIGGRAPH Asia 2015
37+
link: http://game.engineering.nyu.edu/projects/animesh/
38+
deployments: <a href="https://rubygems.org/gems/deep_enumerable">DeepEnumerable</a> Ruby package for the declarative manipulation of deeply nested data structures; <a href="https://dgopstein.github.io/clust.bin.pair/">clust.bin.pair</a> R package containing statistical tests for clustered binary matched pair data.

collaborate.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
title: Collaborate
3+
layout: default
4+
---
5+
6+
*Students and Academics*
7+
8+
Professor Cappos is currently recruiting talented PhD students, developers, research professors, and postdoctoral researchers who are interested in building and deploying real world software.
9+
10+
To apply to work with us, please email jcappos@nyu.edu with “Lab application” in the subject. Please include a code sample and/or github ID along with your resume.
11+
12+
*Practitioners and Community*
13+
14+
Our lab initiatives are performed as open source projects that are free for everyone to use. Code and relevant documents are posted on GitHub to be accessed and worked with by other developers. If you’ve

projects.md

Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
---
2+
title: Projects
3+
layout: default
4+
---
5+
6+
Though all of SSL’s research initiatives—past and present— revolve around ensuring secure operation of computer systems, the specific areas addressed by the team vary greatly. Current initiatives can be grouped into five general categories.
7+
8+
## Current & Ongoing Projects
9+
10+
##### *Remote Utilization and Testing of Wireless Devices*
11+
12+
- **Seattle**: The oldest of the lab’s projects, and the foundation technology behind several emerging initiatives, one of which is described below. Seattle is a platform for networking and distributed systems research that runs on resources—such as laptops, servers, and phones— donated by users and institutions. It currently serves updates to over 40K geographically distributed devices around the world. https://seattle.poly.edu/html/.
13+
- Products: Educational modules for classroom use designed to teach basic concepts in networking and system security; A clearinghouse of available resources to be accessed by users.
14+
15+
Lessons Learned:
16+
17+
Sensibility Testbed: Based on the design scheme of Seattle, Sensibility is a distributed platform that allows researchers to directly run experiments on end-user devices. By giving the user control over what amount and type of data can gathered, Sensibility ensures the security of user information and the safety of the device, while giving researchers access to information that would otherwise be difficult to collect. https://sensibilitytestbed.com/projects/project.
18+
Products: NOTE: Do we want to mention the Hackathon Yanyan conducted last Spring, or any of the adaptations mentioned in the Tsumiki paper?
19+
20+
21+
Password Protection and Improved Network Security
22+
(Note: I’m not sure these two belong together. Would welcome input)
23+
24+
PolyPasswordHasher (PPH) is a secure password storage system that's highly
25+
resilient to offline password cracking. It achieves this resilience by
26+
introducing asymmetry in the effort that servers require to verify
27+
passwords, and crackers require to crack them.
28+
https://polypasswordhasher.github.io/PolyPasswordHasher/
29+
Products: Basic reference implementations of PPH have been written for Python, C, and Ruby. A Django implementation that can be easily deployed is also in development. Research initiatives on PPH this summer have focused on providing easy to integrate libraries for different applications, including the Pluggable Authentication Module (PAM) and a Passport module. PAM is an authentication scheme used in a number of operating systems, including Linux and OS X, while the Passport module is authentication middleware that allows web users to store and authenticate their account with PPH by choosing “login with PPH”. Both modules can enable more applications to use PPH and increase the security of their password database exponentially in exchange for only modest adaptations to the OS or user behavior.
30+
31+
CacheCash: CacheCash presents a new design model for automated content delivery networks in which cryptocurrency payments are utilized to motivate participants to work honestly. Building on top of such a cryptocurrency, CacheCash creates an opportunity to construct a distributed, secure, and efficient incentivized content delivery system that does not depend upon a single entity to handle payments.
32+
33+
34+
Secure Software Updates
35+
The Update Framework (TUF): TUF provides a comprehensive, flexible security framework that developers can integrate with any software update system, or native programming language due to its concise, self-contained architecture and specification. It offers developers and users protection from a host of potential attacks through the use of images and signing strategies. https://theupdateframework.github.io/
36+
TUF technology can be applied in many settings. Currently in development, the UPTANE project is adapting TUF to ensure secure updates of software on the electronic control units of vehicles. UPTANE can counter a comprehensive array of security attacks, and is resilient to partial compromises, while addressing automotive specific vulnerabilities and limitations. This latter initiative is a collaboration between the New York University Tandon School of Engineering (NYU), the University of Michigan's Transport Research Institute (UMTRI), and the Southwest Research Institute (SWRI). (Note: Should UPTANE be listed as a product under TUF?)
37+
38+
Current deployments: Flynn, LEAP, and Docker software repositories
39+
40+
On-going integrations: Repositories for Ruby, CoreOS, Haskell, OCaml, and Python’s PyPi
41+
42+
Secure Software Development
43+
Toto: A program that holistically enforces the integrity of a software supply chain by gathering and signing information about the chain itself. Through the use of “link metadata,” Toto provides documentation that ensures clear accountability as to how software is written, packaged and distributed...and by who.
44+
45+
Lind: a virtual machine design that prevents the triggering of kernel bugs by locking all system calls into popular access paths. The design is based on the idea that popular paths—ones used every day to access basic system requests—are much less likely to contain vulnerabilities. This limited kernel access reduces the possibility of interaction with flawed code.
46+
47+
CrashSimulator: a tool that simulates “real-world” testing for new and upgraded software without the complications of “real-world” deployment. The program enables software developers to identify vulnerabilities in product designs long before they are packaged and released.
48+
49+
Understanding Code at the most Basic Level
50+
Atoms of Confusion: Within every confusing piece of software codes are small patterns that can lead developers to outputs that radically differ from what was intended. In studying these “atoms of confusion” we look to build a firm empirical foundation for reducing code confusion in software development and, thus, also reduce the frequency of buggy and malfunctioning programs. This project is a collaboration with researchers at Pennsylvania State University and the University of Colorado, Colorado Springs, and is conducted with the support of the National Science Foundation.
51+
Products: A web site, containing all study materials, is currently in development. A number of follow-up stories have also been planned.
52+
53+
54+
API Blindspots: This project, a collaboration with researchers at the University of Florida, the University of Massachusetts-Amherst, and the University of Colorado, Colorado Springs, seeks to identify security-related blind spots in Application Programming Interfaces (APIs).
55+
Products:
56+
57+
58+
Foundational Projects
59+
These earlier lab projects are now completed and no new work on them is currently being done. However, these research initiatives remain important for a number of reasons. First, they set some parameters for the practical, problem-solving type of research the lab would do. And, in some cases, they pioneered approaches to particular security areas that continue to evolve into today’s products.
60+
61+
NetCheck/CheckAPI: NetCheck is a tool that can determine the cause of a failure in a networked application, without any application or network-specific knowledge, and without any modification to the application or its infrastructure. By treating an application as a blackbox, a diagnosis can be made using just a set of system call (syscall) invocation traces from the relevant end-hosts. By simulating the syscalls against a network model, syscalls that deviate from expected network semantics can be identified. In return, these deviations can be mapped to a diagnosis by using a set of heuristics.
62+
Products: The source code for the NetCheck tool and all relevant documentation remain available at https://netcheck.poly.edu/projects/project/wiki.
63+
64+
65+
upPIR: upPIR is a secure protocol by which a client can privately retrieve information from a set of mirrors. By packaging the required information with other data that potentially could be requested, the user's preference can be masked. In doing so, the privacy of the client is protected as the nature of the requested information can not be used to give away his sexual orientation, religious beliefs, political beliefs, or other sensitive data about the client and/or her company.
66+
Products:

publications.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
---
2+
title: Publications
3+
layout: default
4+
---
5+
6+
*Coming soon!*

0 commit comments

Comments
 (0)