P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF
THE CHALLENGE
Modern targeted attacks, such as Advanced Persistent Threats (APTs), often use multiple hosts as stepping stones and move laterally across them to gain deeper access to the network to access unauthorized resources or exfiltrate sensitive data. These sophisticated cross-host attacks present significant challenges to existing security...
Published: 8/14/2025
|
Inventor(s): Osama Bajaber, Bo Ji, Peng Gao
Keywords(s):
Category(s): Technology Classifications > Security, Technology Classifications > Software
|
Continuous Monitoring with Compact System Representations to Detect Advanced Persistent Threats
THE CHALLENGE
The growing danger of Advanced Persistent Threats (APTs), stealthy, multi-stage cyberattacks, poses a major challenge to detect subtle malicious behaviors hidden within massive volumes of system audit logs without overwhelming their infrastructure. Traditional defenses rely on constructing detailed provenance graphs to trace system activity,...
Published: 8/14/2025
|
Inventor(s): Danfeng Yao, Wenjia Song
Keywords(s):
Category(s): Technology Classifications > Security
|
GazePair: Efficient Pairing of Mixed Reality Devices Using Gaze Tracking
THE CHALLENGE
Mixed reality (MR) devices, encompassing both augmented and virtual reality technologies, are rapidly gaining traction for their potential to revolutionize various sectors, including gaming, healthcare, education, logistics, and military applications. As these devices become increasingly integrated into our daily lives, the need for seamless...
Published: 6/25/2025
|
Inventor(s): Bo Ji, Matthew Corbett, Jiacheng Shang
Keywords(s):
Category(s): Technology Classifications > Computer Science, Technology Classifications > Communication, Technology Classifications > Security
|
A Low-Cost GPS Spoofing Detector and Spoofer Localizer
THE CHALLENGE
Thirty-one satellites currently in orbit contribute to the Global Positioning System. These satellites are used to calculate the longitude, latitude, and altitude of users. However, the GPS system is vulnerable to spoofing attacks that can migrate the user from the actual signal to the spoofing signal. These attacks can disrupt operations...
Published: 6/26/2025
|
Inventor(s): Yaling Yang, Shinan Liu, Gang Wang
Keywords(s):
Category(s): Technology Classifications > Communication, Technology Classifications > Software, Technology Classifications > Consumer Products, Technology Classifications > Transportation, Technology Classifications > Security
|
BystandAR: Protecting Bystander Visual Data Privacy in Augmented Reality Systems
THE CHALLENGE
Well-intentioned AR users often unknowingly violate bystander privacy by collecting and sharing sensitive data. Some apps use machine learning to make inferences without user knowledge, further compromising privacy. The current permissions within the state of the art are flawed as colluding apps deceive users to access and share data...
Published: 6/25/2025
|
Inventor(s): Matthew Corbett, Brendan David-John, Bo Ji, Jiacheng Shang, Charlie Hu
Keywords(s):
Category(s): Technology Classifications > Computer Science, Technology Classifications > Communication, Technology Classifications > Security
|