Illinois Security Lab
   HOME

TheInfoList



OR:

The Illinois Security Lab is a research laboratory at the
University of Illinois at Urbana–Champaign The University of Illinois Urbana-Champaign (U of I, Illinois, University of Illinois, or UIUC) is a public land-grant research university in Illinois in the twin cities of Champaign and Urbana. It is the flagship institution of the Universit ...
established in 2004 to support research and education in
computer A computer is a machine that can be programmed to Execution (computing), carry out sequences of arithmetic or logical operations (computation) automatically. Modern digital electronic computers can perform generic sets of operations known as C ...
and network security. The lab is part of the
Computer Science Computer science is the study of computation, automation, and information. Computer science spans theoretical disciplines (such as algorithms, theory of computation, information theory, and automation) to Applied science, practical discipli ...
Department and
Information Trust Institute The Information Trust Institute (ITI) was founded in 2004 as an interdisciplinary unit designed to approach information security research from a systems perspective. It examines information security by looking at what makes machines, applications ...
. Its current research projects concern
health information technology Health information technology (HIT) is health technology, particularly information technology, applied to health and health care. It supports health information management across computerized systems and the health information exchange, secure ex ...
and critical infrastructure protection. Past projects addressed messaging,
networking Network, networking and networked may refer to: Science and technology * Network theory, the study of graphs as a representation of relations between discrete objects * Network science, an academic field that studies complex networks Mathematics ...
, and
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
.


Active projects


Health Information Technology

The lab is performing work on the Strategic Healthcare IT Advanced Research Projects on Security (SHARPS) project. It is developing security and privacy technologies to help remove key barriers that prevent the use of health information by systems implementing
electronic health record An electronic health record (EHR) is the systematized collection of patient and population electronically stored health information in a digital format. These records can be shared across different health care settings. Records are shared throu ...
s, health information exchanges, and telemedicine.


Critical Infrastructure Protection

Networked
control systems A control system manages, commands, directs, or regulates the behavior of other devices or systems using control loops. It can range from a single home heating controller using a thermostat controlling a domestic boiler to large industrial c ...
such as the electric
power grid An electrical grid is an interconnected network for electricity delivery from producers to consumers. Electrical grids vary in size and can cover whole countries or continents. It consists of:Kaplan, S. M. (2009). Smart Grid. Electrical Power ...
use computers for tasks like protecting substations against overloads ( digital protective relays) and metering facilities ( advanced meters). The lab developed the ''attested meter'' to provide security and privacy for advanced meters, and has worked on security for building automation systems and substation automation.


Past projects


Assisted Living Security

Advances in networking, distributed computing, and medical devices are combining with changes in the way health care is financed and the growing number of elderly people to produce strong prospects for the widespread use of assisted living, a health care approach which can benefit from transferring medical information collected in homes or dedicated facilities to clinicians over data networks. The lab explored
security engineering Security engineering is the process of incorporating security controls into an information system so that the controls become an integral part of the system’s operational capabilities. It is similar to other systems engineering activities in tha ...
of such systems through prototypes, field trials, and formal methods based on an architecture that uses a partially trusted ''Assisted Living Service Provider (ALSP)'' as a third party intermediary between assisted persons and clinicians.


Adaptive Messaging Policy (AMPol)

Scalable distributed systems demand an ability to express and adapt to diverse policies of numerous distinct administrative domains. The lab introduced technologies for messaging systems with adaptive
security policies Security policy is a definition of what it means to ''be secure'' for a system, organization or other entity. For an organization, it addresses the constraints on behavior of its members as well as constraints imposed on adversaries by mechanisms ...
based on ''WSEmail'', where Internet messaging is implemented as a web service, and ''Attribute-Based Messaging (ABM)'', where addressing is based on attributes of recipients.


Contessa Network Security

Although there has been significant progress on the formal analysis of security for integrity and confidentiality, there has been relatively less progress on treating
denial-of-service attack In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connect ...
s. The lab has explored techniques for doing this based on the ''shared channel model'', which envisions bandwidth as a limiting factor in attacks and focuses on host-based counter-measures such as ''selective verification'', which exploits adversary bandwidth limitations to favor valid parties. It is also developing new formal methods for reasoning about dynamic configuration of VPNs.


Formal Privacy

Many new information technologies have a profound impact on privacy. Threats from these have provoked legislation and calls for deeper regulation. The lab has developed ways to treat privacy rules more formally, including better ways to reason using formal methods about conformance and the implications of regulations, and about how to quantify and classify privacy attitudes to control the risks of new technologies. The lab showed how to formally encode
HIPAA The Health Insurance Portability and Accountability Act of 1996 (HIPAA or the Kennedy– Kassebaum Act) is a United States Act of Congress enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, 19 ...
consent regulations using ''privacy APIs'' so they can be analyzed with
model checking In computer science, model checking or property checking is a method for checking whether a finite-state model of a system meets a given specification (also known as correctness). This is typically associated with hardware or software systems ...
.


References

{{Reflist


External links


SHARPS

TCIPG: Trustworthy Cyber Infrastructure for the Power Grid

UIUC Assisted Living Project

SELS Secure Email List Services
Computer security organizations