BITS Networked Systems Laboratory The BITS laboratory does a variety of research in Networked Systems. Our work revolves around real-world applications, such as open wireless Internet access, transit navigation, and traffic management.
Featured Research Projects
Cloudsweeper
Cloudsweeper allows users to audit, encrypt, and redact sensitive information within cloud storage accounts. This project helps us better understand the role of cleartext password emailing, the underground value of stolen accounts, and new ways to improve the security of sensitive, globally acceissible information.
Recent Publications
-
[MerrifieldEtal15]
-
Timothy Merrifield, Joseph Devietti, and Jakob Eriksson.
High-performance determinism with total store order consistency.
In Proceedings of the Tenth European Conference on Computer
Systems, pages 31:1--31:13. ACM, 2015.
-
[MusaEtal15]
-
A. Musa, J. Biagioni, and J. Eriksson.
Trading off accuracy, timeliness, and uplink usage in online gps
tracking.
Mobile Computing, IEEE Transactions on, PP(99):1--1, 2015.
-
[KhanKanich15]
-
Mohammad Taha Khan and Chris Kanich.
High fidelity, high risk, high reward: Using high-fidelity networking
data in ethically sound research.
In Proceedings of the ACM SIGCOMM Workshop on Ethics in
Networked Systems, aug 2015.
-
[SnyderKanich15]
-
Peter Snyder and Chris Kanich.
No please, after you: Detecting fraud in affiliate marketing
networks.
In Workshop on the Economics of Information Security, jun 2015.
-
[KhanEtal15]
-
Mohammad Taha Khan, Xiang Huo, Zhou Li, and Chris Kanich.
Every second counts: Quantifying the negative externalities of
cybercrime via typosquatting.
In Proceedings of the 36th IEEE Symposium on Security and
Privacy, may 2015.
-
[ClarkEtal15]
-
Jason W. Clark, Peter Snyder, Damon McCoy, and Chris Kanich.
I saw images i didn't even know i had: Understanding user perceptions
of cloud storage privacy.
In Proceedings of the 33rd Annual ACM Conference on Human
Factors in Computing Systems. ACM, apr 2015.
-
[SnyderKanich15a]
-
Peter Snyder and Chris Kanich.
One thing leads to another: Credential based privilege escalation.
In Proceedings of the 5th ACM Conference on Data and Application
Security and Privacy (Poster Session), mar 2015.
-
[SnyderKanich14]
-
Peter Snyder and Chris Kanich.
Cloudsweeper and data-centric security.
ACM SIGCAS Computers and Society, 44(2):8--10, jul 2014.
-
[BhagavatulaEtal14]
-
Sruti Bhagavatula, Christopher Dunn, Chris Kanich, Minaxi Gupta, and Brian
Ziebart.
Leveraging machine learning to improve unwanted resource filtering.
In Proceedings of the 7th ACM Workshop on Artificial
Intelligence and Security, oct 2014.
-
[SzurdiEtal14]
-
Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, and
Chris Kanich.
The long “taile” of typosquatting domain names.
In Proceedings of the USENIX Security Symposium, aug 2014.
Financial Support
BITS lab has received or is currently receiving support from NSF Awards CNS-1351058, CNS-1017877, CNS-1149989, CNS-1320235, IDOT ICT awards R27-131, R27-091, TRB TRANSIT IDEA Project 65, Amazon Web Services, and Nokia Corporation.