Location

CS 346

Mission

Study of Applied Cryptography

Details

In the NSAC Lab we are applying cryptography to solve fun problems in all kinds of interesting areas such as:

  • Secure Data Outsourcing
  • Security in Wireless and Sensor Networks
  • Queries/Searches over Encrypted Data
  • Secure Networked Storage with Privacy
  • Security Policies in Computation/Data Grids
  • Digital Rights Management
  • Secure Reputation Systems

Coordinator

Location

CS 2213

Mission

Perform research in computer systems areas, including: Networking, Media Processing, Distributed Systems, Operating Systems, Computer and Network Architectures, and Database.

Details

Among the projects are: 

  • Rether, a real-time protocol, ethereal, a real-time Ethernet switch, and
  • the Stony Brook Video Server (SBVS), an Ethernet based distributed video server which can function over a LAN.

Coordinator

Location

NCS-332/334

Details

OSCAR Lab was founded in spring 2011 in Computer Science department, Stony Brook University. The Lab is focusing on research related issues in the areas of Operating Systems, Virtualization, System Security, Concurrency and Computer Architecture.

Coordinator

Location

CS 2214

Mission

Create a network RAM server which will function in a similar manner as a network fileserver does for user files. Develop a system that provides huge quantities of memory for user applications over fast, low latency network ( 1 Gb/sec).

Details

The target platform for the prototype NMS consists of a cluster of 64-bit Alpha 21164-based PC-class machines, each equipped with at least 1GB of RAM and approximately 10GB of disk backing store, and connected by a high-speed (1.2Gb/sec) Myrinet interconnect which will be dedicated to the network paging function. Each machine will also be equipped with standard 100Mb/sec Fast Ethernet interface for general-purpose communication using IP.

Coordinator

Location

CS 2231

Mission

Research techniques for making network and software systems highly secure and reliable.

Details

Current work includes: 

  • network or software based attacks,
  • detection and confinement, and
  • Software Analysis and Debugging Tools to detect defects in complex systems.

Coordinator

Location

CS 1208

Mission

To perform research on Authentication, Digital Rights Management, Secure Mobile Commerce, Secure Software Developement Environments, Security Management Tools. We mix algorithm design with practical tool developement.

Details

Current work includes: 

  • Content-Based Access Control: CBAC enables bloggers and social networkers to specify simple access-control policies that can be applied automatically to future posts, photographs.
  • Static Analysis for Security: Develop tools to help programmers write better software.
  • Secure Mobile Commerce: Cell-phones will soon replace credit cards in point-of-sale transactions. We propose an architecture for enabling secure commerce on an otherwise untrusted platform.
  • Usable Password Management: We are developing a usable web password manager based on the principle that "a secure user interface should not only make doing the right thing easy, it should make doing the wrong thing hard."

Coordinator

Location

CS 2225

Mission

Provide a workspace and the tools necessary for the assembly of processors and graphics emulators designed by the Center for Visual Computing to further the Center's research. Examples of such emulators are the ones used in the Cube Project and the vg500 rendering engine.

Details

N/A

Coordinator

Location

NCS-336

Mission

Perform research in operating systems including: file systems and storage, security, and networking. An emphasis is placed on balancing system security, performance, and usability; improving portability of operating system code; and improving programmer and system administrator productivity.

Details

Among the projects are: 

  • FiST: A language for stackable file systems ported to Linux, Solaris, and FreeBSD. FiST allows incremental file system development, without requiring an in-depth knowledge of kernel internals. A Windows NT port is under way.
  • CoSy: Compound System Calls, a method of aggregating multiple system calls into a single system call. This reduces data copies and context switches. Initial results show promising performance improvements.
  • NCryptfs: A next-generation cryptographic file system, which balances security, convenience, and performance.
  • Elastic Quotas: A novel disk-space management method, which allows users to temporarily exceed their storage quota.
  • Versionfs: A stackable versioning file system, with support for powerful version storage and retention policies. Versionfs provides online backup and restore capabilities, with low overhead.

Coordinator

Location

CS 1307

Mission

To perform research on modeling and optimization techniques for efficient design, analysis, deployment, and operation of embedded systems. The challenge is to establish the techniques in the presence of non-parametric behavior, performance, and properties of complex applications and intricate implementation technologies.

Details

Current projects include: 

  • Mobility Modeling: We work on the development of a data-driven mobility model, using statistical likelihoods for path selection and speed of movement. Our focus is on the development of a framework to support any mobility traces and for ease of evaulation of various communication protocols, deployments, etc under such models.
  • Energy Efficient Wireless Protocols: We work on the development of wireless protocols which consider energy metrics for lifetime extension in sensor netowrks.
  • Mobile Computing & Applications: We work on the development of socially influenced mobile phone applications for developing countries. Challenges include working with limited and out-dated hardware, limited infrastructure and cost models in deployed areas, and facilitating current computation models to the platform. Another focus is on the development of peer-to-peer mobile and social information networks.
  • Architectures for Emerging Interconnect Technologies: With the emergance of new on-chip interconnect technologies, CAD is facing a drastic shift in optimization priorities, such as power, area, and bandwidth. We are developing new architectures and optimization techniques for emerging technologies, such as RF, optical, and/or plasmonics.

Coordinator