Security Research Projects

 

Fuzz Testing

Abhik ROYCHOUDHURY

  • TRL 4
  • Software Security & Analysis

BCube and Flint: Overcoming the 50% Barrier in Blockchains

YU Haifeng

Computational Hardness Assumptions and the Foundations of Cryptography

Prashant Nalini VASUDEVAN

This program seeks to broaden and diversify the foundations of cryptography by identifying new plausible computational hardness assumptions that can be used to construct cryptosystems. Our current approach is to study and construct "fine-grained" cryptographic primitives based on the conjectured hardness of various well-studied algorithmic problems.

  • Cryptography

SQLancer: Automatic Testing of Database Management Systems

Manuel RIGGER

SQLancer automatically finds logic bugs in Database Management Systems (DBMSs). We have used SQLancer to find and report over 500 unique, previously unknown bugs in widely-used DBMSs. In addition, SQLancer has been widely adopted in the industry.

  • TRL 9
  • Software Testing

From iteration on multiple collections in synchrony to fast general interval joins

WONG Lim Soon

Synchrony iterator captures a programming pattern for synchronized iterations. It is a conservative extension that enhances the repertoire of algorithms expressible in comprehension syntax. In particular, efficient general synchronized iterations, e.g. linear-time algorithms for low-selectivity database non-equijoins, become expressible naturally in comprehensinon syntax.

  • TRL 4

Foundational Research Capabilities (FRC) Study on Foundations of Security and Data Privacy

Abhik ROYCHOUDHURY

This study was undertaken on behalf of National Research Foundation (NRF) Singapore, to study long-term plans in Security and Privacy foundations, and for further growing foundational research capabilities in Singapore. The study team was led by Abhik Roychoudhury from NUS, and had team members from NUS, NTU, SMU, CSA, A*STAR. The team submitted its report and recommendations at the end of 2022.

National Cybersecurity R&D Laboratory

CHANG Ee Chien

  • Infrastructure Security & Experimentation

Automated Program Repair

Abhik ROYCHOUDHURY

  • TRL 4
  • Software Security & Analysis

Active Defense Mechanism against Adversarial Attacks

CHANG Ee Chien

  • Machine Learning & AI Security

Intelligent Modelling for Decision-Making in Critical Urban Systems - DesCartes

Abhik ROYCHOUDHURY

Trustworthy de-centralized (federated) learning

Reza SHOKRI

Robustness and security in machine learning

Reza SHOKRI

Auditing data privacy (in machine learning)

Reza SHOKRI