Select Completed Projects

 

Selected Past Projects and Collaborations:


                Cognitive decision applications for embedded use

               Todor Cooklev, IPFW

Raytheon


Studying SOA: Controlling Maintenance Costs for

                 Services Oriented Computing

                Norman Wilde, UWF

Arthur Baskin, Intelligent Information Technologies


                     Identifying less-stringent, appropriate confidentiality levels for information systems data

Robyn Lutz, ISU

                    Boeing Research and Technology, John Deere


                   A Light-weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds

Daji Qiao, Wensheng Zhang, ISU

                      Boeing Research and Technology, John Deere  


Scenario Based Analysis of Dynamic Specifications

Hany Ammar, Katerina Goševa-Popstojanova, WVU

Ali Mili, New Jersey Institute of Technology

NASA IV&V Facility, Motorola


Dynamic Specifications of Interactive Electronic

            Technical Manuals (IETMs)

            Hany Ammar, et al, WVU

ManTech


Towards Model-Based Analysis of Explicit

Information Flows in Access Control Systems                 

Ryan Babbitt, Samik Basu, Johnny Wong, ISU


Applications of Formal Methods to Industry          

           Jay Bagga, BSU

City Machine    


Modeling the Auditory Pathway: Preliminary Results

Alik Bakshi, Aditya Mathur, Purdue

National Science Foundation


Incorporating Qualitative User Preferences into Algorithms             

Samik Basu, Vasant Honavar, ISU


Flow Visualization Using Virtual Reality
Vic Baker, WVU

              National Energy Technology Laboratory


Usability Expert Review Model and Tool

Paul Buis, Kirsten Smith, BSU

                 Baker Hill, Ontario Systems


     An Eclipse plug-in for Caché’s Object Script Language

Ugo Buy, University of Illinois at Chicago

Ontario Systems


      Application of Data Mining Techniques

  to Air Vehicle Systems and Software      

  Jane Cleland-Huang, Bamshad Mobasher, DePaul   

Lockheed Martin


 Low Complexity Video Coding   

           Mary Comer, Ed Delp, Purdue

           Naval Surface Warfare Center


    New Digital Signal Processing Techniques

             in Multicarrier Modulation

                Todor Cooklev, IPFW                                          

Raytheon    


Incumbent Detection and Avoidance

      Edward Coyle, Purdue

Raytheon                          


      Data Quality        

             Ahmed Elmagarmid, Purdue      

      Telcordia


            LifeWerks: An Immersive Virtual Work Environment

            John Dailey, Vinayak Tanksale, Dolores Zage, Wayne Zage, BSU

Rockwell Collins


Efficient Instrumentation Strategies

        for Software Feature Location

              Dennis Edwards, Sharon Simmons, Norman Wilde, UWF

Northrop Grumman


Software Feature Analysis for Better Software Change Analysis

Dennis Edwards, Sharon Simmons, Norman Wilde, UWF

         Northrop Grumman


Cyber Security of Electric Power Grid                             

Manimaran Govindarasu, ISU


Secure Cooperative Relaying in Adversarial Wireless Networks                 

Yong Guan, Sang W. Kim, ISU   


                         Welding Process Characterization Modeling

Ron Klein, George Trapp, WVU

           Ali Mili, New Jersey Institute of Technology,

Allegheny Power, Office of Naval Research


Architecture Based Estimation of Software Reliability

      and Testing Distributed Systems
       Aditya Mathur, Purdue

Guidant                         


A Hybrid Model of the Incremental Test Process                      
Aditya Mathur, Purdue

Guidant


Software Release Control Using Defect Based

       Quality Estimation

       Aditya Mathur, Purdue

Guidant  


                        Computational Models to Study Auditory Processing and Learning Disorders in Children

Aditya Mathur, Purdue

National Science Foundation               


Extending Developer Tools for Security-typed Languages   

Patrick McDaniel, Penn State           

Motorola           


Verifiable Information Flow Security for AJAX Applications                 

Patrick McDaniel, Penn State,   

          Boniface Hicks, St. Vincent College        

Army Research Lab            


      Software Development in High Performance Scientific Computing

                  Don McLaughlin, WVU

                EPSCoR              


Customized Network Security Protocols

Cristina Nita-Rotaru, Purdue                                    

Double-Take Software        


               Reducing the Time to Product Stability through Global Testing

Ita Richardson, University of Limerick, Ireland

Science Foundation Ireland

Dolores Zage, Wayne Zage, BSU

National Science Foundation


National Model ID Theft Prevention/Protection                              

     Steffen Schmidt, ISU               


                   Modeling Component Quality of Service –       

     A Uniframe-Based Approach          

        Rajeev Raje, IUPUI    

                   DoD, ONR  


Mapping Cache Artifacts to Design Metrics Primitives      

Vinayak Tanksale, BSU       

Ontario Systems       


Dynamic Certification of Execution Environment                    

Akhilesh Tyagi, ISU     


RECON: Software Reconnaissance Tool for "C" Programmershttp://www.cs.uwf.edu/%7Erecon/recon3
http://www.cs.uwf.edu/%7Erecon/recon3Norman Wilde, UWF         

Telcordia                              


  Spotlighting the Code             
   Norman Wilde, UWF

    Telcordia  


Combining Tools for Feature Location and Understanding

Norman Wilde, UWF

Motorola


Understanding Software Features by Integrating    

Dynamic and Static Analysis        

Norman Wilde, UWF         

Motorola           


Intrusion Detection System Visualization of Network Alerts          

Dolores Zage, Wayne Zage, BSU     

        Army Research Laboratory


Before and After: Exploring the Link Between

             UML Design Metrics and Detailed Design Metrics

         Dolores Zage, Wayne Zage, BSU                         

Raytheon     


                                     Design Metrics

                                                    Dolores Zage, Wayne Zage, BSU      

                                    Motorola, Northrop Grumman,                

        Raytheon,

                                Telcordia  


A Stress Point Resolution System Based on Module Signatures

Dolores Zage, Wayne Zage, BSU     

Motorola       


SMART: Security Measurements and Assuring

Reliability through metrics Technology

Dolores Zage, Wayne Zage, BSU

Army Research Lab


The Eclipse Platform for Tool Integration and Development
Dolores Zage, Wayne Zage, BSU

Motorola                    


Metrics Directed Process Guidance for

SDL Model Development    
Dolores Zage, Wayne Zage, BSU      

Motorola                 


               Metrics Directed Verification of UML Designs
                Dolores Zage, Wayne Zage, BSU

Raytheon                      


Measuring The Effect of Software Design on Software Security          

             Dolores Zage, Wayne Zage, BSU

                                   Arxan Technologies


The Security and Software Engineering Research Center

2012-2013 Research Projects

___________________________________________________________________________________________________

Funded Through Ball State University

 

  1. "Software Analytics.”  Zage, Zage, Remeika, Ball State. Fundamental Research Grant from NSF. 
  2. “Combining Rigorous Specification and Testing Methodologies to Achieve High Quality Assurance.” Lin, Ball State. Principal collaborators at Lockheed Martin and Northrop Grumman Aerospace Systems.
  3. "Army Research Laboratory Visual Intrusion Detection Systems.”  Zage, Zage, Gaw, Mast, Ball State. Principal collaborators at ARL.
  4. "Evaluating CoNNeCTions.” Zage, Zage, Ball State. Principal collaborators at NASA. 
  5. “UML Metrics.” Zage, Zage, Meek, Ball State. “Principal collaborators at Rockwell Collins.
  6. “Cognitive decision applications for embedded use.” Cooklev, IPFW. Principal collaborators at Raytheon.
  7. "Evaluating Visualization Techniques for Command and Control Applications using Stereoscopic Vision in a 3D Virtual Environment.” Kim, Sedlmeyer, Wolfe, IPFW. Principal collaborators at Raytheon. 
  8. “A Software Platform for Development and Evaluation of Visualization Techniques for Command and Control Applications.” Kim, Sedlmeyer, Wolfe, IPFW. Principal collaborators at Raytheon.
  9. "Modeling, Specifying, Discovering and Integrating Trust into Distributed Real-time Embedded Systems.” Gallege, Gamage, Hill, Raje, IUPUI. Principal collaborators at Air Force Research Laboratory. 
  10. “Testing-as-a-Service: Static Code Analysis (SCA) Tool Study.” Hill, Raje, IUPUI. Principal collaborators at Lockheed Martin and Northrop Grumman Aerospace Systems.
  11. "Private Circuits: Analysis and CAD Support for Sidechannel Secure Embedded Systems.” Tyagi, Iowa State. Principal collaborator at Department of Homeland Security. 
  12. “Efficient Instrumentation Strategies for Time Sensitive Software.” Simmons, James Madison University. Principal collaborators at Northrop Grumman.
  13. "Closing the Loop on Security Testing and Security Requirements." McDaniel, Penn State.
  14. “Joint Signal Processing and Machine Learning Techniques for Data Classification and Recognition.” Monga, Penn State. Principal collaborators at MacAulay-Brown.
  15. “Understanding and Exploiting Feature Dependencies in Robust Image Classification,” Monga, Penn State. Principal collaborators at MacAulay-Brown.
  16. “Migrating Avionics Software to Multicore Hardware; Issues and Possible Solutions.” Green, Buy, University of Illinois at Chicago. Principal collaborators at Rockwell Collins.
  17. “A Knowledge Engineering, Team-Based Approach to Introducing Security Assurance Cases.” Wilde, Coffey, White, Snider, Reichherzer, El-Shiekh, Gonen, University of West Florida. Principal collaborators at Northrop Grumman Aerospace Systems.
  18. "Knowledge Modeling for Supporting Program Comprehension." Coffey, El-Sheikh, Reichherzer, Wilde, White, University of West Florida. Principal collaborators at Blue Cross Blue Shield Association. 

 

Funded Through Iowa State University

 

  1. "Online Detection of Anomalies over Distributed Streams." Singh, Kalpin, Tirthapura, Iowa State. Principal collaborators at John Deere and Northrop Grumman. 
  2. "A semi-automated framework for mission assurance modeling and performance impact analysis."  Sukhinin, Davidson, Guan, Kim, Wong, Iowa State. Principal collaborators at Boeing Research Laboratories. 
  3. "Training Modules for writing secure software.” Koster, Jacobson, Iowa State. Principal collaborators at WebFilings. 

 

Funded Through Virginia Tech

 

  1. "Cybersecurity Vulnerabilities and Possible Cures for Smartgrid Transmission Subsystems." Deng, Lin, Shukla, Thorp, Virginia Tech. Principal collaborators at General Electric. 
  2. “Detection of Data Exfiltration in Enterprise Environments.” Yao, Virginia Tech. Principal collaborators at Ontario Systems.
  3. “Ensuring Security and Trust in System Hardware.” Hsiao, Shrestha, Virginia Tech. Principal collaborators at General Dynamics.
  4. "A Framework for Implementing Trustworthy Self-Protecting Data.” Zhang, Lou, Virginia Tech. Principal collaborators at the SI Organization. 
  5. "Information Assurance of LTE-Advanced Self-Organizing Networks." Sohul, Reed, Virginia Tech. Principal collaborators at L-3 STRATIS. 
  6. "Large Displays for Cyber Analytics." Esakia, Endert, North, Virginia Tech. Principal collaborators at L-3 STRATIS. 
  7. “Moving Target Defense for IPv6.” Groat, Moore, Marchany, Virginia Tech. Principal collaborators at SAIC.
  8. "Securing SCADA Systems with Intelligent Event Correlation.” Deng, Shukla, Virginia Tech. Principal collaborators at L-3 Communications. 
  9. "Security and Robustness of TD-LTE for Public Safety Communications." Shahriar, Clancy, Virginia Tech. Principal collaborators at Northrop Grumman. 
  10. "URL Blacklisting using High Speed Packet Filtering Technology." Groat, Marchany, Tront, Virginia Tech. Principal collaborators at Centripetal Networks. 
  11. "User-Centric Dependency Analysis in Programs for Identifying Malware" (renewal). Elish, Ryder, Yao, Virginia Tech. Principal collaborators at General Dynamics. 
  12. "Using a Dynamic Defense to Mitigate DoS and DDoS Attacks." Groat, Marchany, Tront, Virginia Tech.  Principal collaborators at Lockheed Martin.

 

The Security and Software Engineering Research Center

2013-2014 Research Projects

___________________________________________________________________________________________________

Funded at Georgetown University
  1. Cyber Threat Intelligence Information Exchange Ecosystem
  2. Incident Reporting Ecosystem
  3. Secrecy Preserving Signatures

 

Proposed at Georgetown University

 

  1. Directories for Inter-Enterprise Collaboration
  2. Censorship-Resistant Architectures
  3. Network Provenance through High Performance, Log-based Databases
  4. Dynamic Network Emulation
  5. Trust Framework for the Intercloud
  6. Deletable Encrypted Remote Backups

 

See http://s2erc.georgetown.edu/projects/proposals/ for an up-to-date listing of funded and proposed projects.