Key research themes
1. How can content authentication systems balance robustness against benign modifications while reliably detecting malicious manipulations in digital images and videos?
This research area focuses on developing authentication mechanisms that can distinguish intended, acceptable content modifications (such as compression, noise reduction) from unauthorized tampering that changes the actual content. It matters because digital multimedia undergoes various transformations during processing and transmission, and authentication systems need to be resilient to these benign changes while still ensuring integrity and authenticity of content.
2. What architectural and cryptographic methods can secure content distribution in information-centric networking (ICN) architectures while preserving the benefits of ubiquitous caching?
Information-centric networking (ICN) shifts focus from host-based to content-based communications with widespread in-network caching. However, securing content against unauthorized access via encryption complicates caching benefits, since encrypted cached content is only accessible to authorized users with the decrypting keys. Research investigates schemes that enable secure content dissemination, consumer authentication, and original content verification in ICN without negating the benefits of caching.
3. How effective are web authentication and security policies like Content Security Policy (CSP) in real-world environments at preventing content-based attacks?
Content Security Policy (CSP) is a web-standard defense to mitigate risks from content injection attacks by limiting sources from which content and scripts can be loaded and executed. Investigations focus on adoption rates, browser compliance, correctness of configurations, and maintenance of CSP policies by websites. Understanding real-world deployment challenges informs improvements to defensive measures against web-based content exploits.
4. What emerging decentralized identity and authentication technologies improve the security, usability, and privacy of digital content and user verification?
Digital content authentication and user identity verification traditionally rely on centralized systems that pose privacy risks and single points of failure. Self-sovereign identity (SSI) and blockchain-based decentralized authentication mechanisms promise enhanced user control, interoperability, and resistance to forgery or data compromise. Research focuses on frameworks and practical implementations integrating these technologies for digital document and user authentication.