Award Abstract # 2055123
SaTC: CORE: Medium: Countering Surveillanceware Using Deception-Based Generative Models and Systems Mechanisms

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: UNIVERSITY OF FLORIDA
Initial Amendment Date: August 2, 2021
Latest Amendment Date: August 2, 2021
Award Number: 2055123
Award Instrument: Standard Grant
Program Manager: Anna Squicciarini
asquicci@nsf.gov
 (703)292-5177
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: January 1, 2021
End Date: December 31, 2025 (Estimated)
Total Intended Award Amount: $1,199,997.00
Total Awarded Amount to Date: $1,199,997.00
Funds Obligated to Date: FY 2021 = $1,199,997.00
History of Investigator:
  • Vincent Bindschaedler (Principal Investigator)
    vbindschadler@ufl.edu
  • Kevin Butler (Co-Principal Investigator)
Recipient Sponsored Research Office: University of Florida
1523 UNION RD RM 207
GAINESVILLE
FL  US  32611-1941
(352)392-3516
Sponsor Congressional District: 03
Primary Place of Performance: University of Florida
1 UNIVERSITY OF FLORIDA
GAINESVILLE
FL  US  32611-2002
Primary Place of Performance
Congressional District:
03
Unique Entity Identifier (UEI): NNFQH1JAPEP3
Parent UEI:
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01002122DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 025Z, 7924
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Surveillanceware (i.e., stalkerware, creepware, spyware, etc.) is a serious and increasingly common cybersecurity threat. In a typical scenario, a malicious individual installs software on a victim's mobile device that tracks the device's location, enabling remote monitoring of its activity. This is not a hypothetical threat: there are reports of intimate partner abusers installing spyware on their victims' smartphones and of journalists, political dissidents, and human rights activists being similarly targeted by repressive regimes. Traditional defenses such as antivirus software are unable to fully counter this threat. While antivirus software may be able to flag and remove surveillanceware, some victims are unable to uninstall surveillanceware because of coercion such as threats of physical violence. This project seeks to systematically study surveillanceware and develop new artificial intelligence (AI)-based defenses for it. In doing so, the project helps broaden cybersecurity research to include the concerns of vulnerable individuals and groups (e.g., survivors of intimate partner violence) whose cybersecurity needs have often historically been neglected. To pursue the project, the investigators plan to assemble a diverse team and collaborate with local organizations (e.g., domestic abuse shelters) and international partners (e.g., the Coalition Against Stalkerware).

The focus of this research effort is the design of methods and tools to mitigate the threat of surveillanceware, and in particular, developing a deception-based system that uses machine learning techniques and system security mechanisms to produce fake but plausible ("synthetic") data to be fed to the monitoring apparatus of surveillanceware instead of the real data. The research is naturally organized into three thrusts, starting with a comprehensive analysis of surveillanceware and its capabilities for the purpose of adversarial modeling. The second thrust builds on this analysis to develop techniques to create fake but plausible data that can be used as decoy. This requires the use of machine learning techniques, specifically deep generative models. The final thrust involves designing system mechanisms that can be combined with the machinery developed in the previous thrust to ensure the integrity of the defense. In so doing, the project will move forward an understanding of formal adversarial models for surveillanceware, techniques for synthesizing plausible data and deniable data embedding, and system-level mechanisms that integrate with machine learning techniques to thwart surveillance.

This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Bao, W and Pittaluga, F and Kumar_B_G, V and Bindschaedler, V "DP-Mix: Mixup-based Data Augmentation for Differentially Private Learning" , 2024 Citation Details
Childs, Kevin and Gibson, Cassidy and Crowder, Anna and Warren, Kevin and Stillman, Carson and Redmiles, Elissa M and Jain, Eakta and Traynor, Patrick and Butler, Kevin_R B ""I Had Sort of a Sense that I Was Always Being Watched...Since I Was": Examining Interpersonal Discomfort From Continuous Location-Sharing Applications" , 2024 https://doi.org/10.1145/3658644.3690342 Citation Details
Gibson, Cassidy and Frost, Vanessa and Platt, Katie and Garcia, Washington and Vargas, Luis and Rampazzi, Sara and Bindschaedler, Vincent and Traynor, Patrick and Butler, Kevin "Analyzing the Monetization Ecosystem of Stalkerware" Proceedings on Privacy Enhancing Technologies , v.2022 , 2022 https://doi.org/10.56553/popets-2022-0101 Citation Details

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page