Quick links

Computer Security Lab
UC Davis
One Shields Avenue
Davis, CA 95616-8562
Phone: 530.752.1287
Fax: 530.752.4767
Email: seclab-staff

CS Logo

Current Projects

Vulnerabilities Analysis
Davis Social Links
Secure Programming Clinic
E-Voting Research
Distribution Grid Security Leveraging µPMU Measurements and SCADA Commands
NetSage - Network Performance Analysis

Previous Projects

Application of Cyber Security Techniques in the Protection of Efficient Cyber-Physical Energy Generation Systems
Forensic Logging and Auditing
Balancing Privacy and Analysis in Data Sanitization
Biology-Inspired Security Techniques
ICMP Traceback for DDoS
Policy Analysis and Generation for IPSec/VPN
Mobile Code Security
E-Commerce Cryptographic Protocols
Using Untrusted Domains for Computations
Managing Computer Networks to Respond Rapidly to Threats
Automated Analysis of Vulnerabilities
Trust Models in Collaborative Systems
Anomaly Detection in Database Systems (NSA)
The Ariel Project (DARPA)
ITR: A Semantic-Based Approach for Automated Response to Attacks (NSF/ITR)
ITR: Automatic Consistency Checking for IPSec/VPN Security Policy (NSF/ITR)
Intrusion Detection Analysis Project (Promia, Inc.)
Mathematical Modeling of Deception (Sandia)
Model Based Scenario Intrusion Correlation (NSA)
MURI Protocol Research (UCSB)
Property-Based Testing to Verify an Environment (NASA/JPL)
Intrusion Detection for Mobile Ad Hoc Networks (Telcordia)
Environment-Aware Security System (NetSquared)
Verification of Security Run-Time Verification System (NSF/NASA)
Testing & Benchmarking Methodologies for Future Network Security Mechanisms (NSF/NRT)
Balancing Privacy and Analysis in Data Sanitization (NSF/TC)
Security Analysis and Re-engineering of Databases (NSF)
Sandbox System Call API for Linux
AWB: Audit Workbench (NSA)
Authentications in a Distributed Intrusion Detection System (Trident)
Audit Reduction and Compression (NSA)
Boeing Response Project (Boeing, DARPA)
CMAD IV:  Computer Misuse & Anomaly Detection
Proceedings of the UC Davis conference held in Monterey, California from November 12-14, 1996
Common Intrusion Detection Framework (CIDF)
UC Davis participates extensively in this effort to define a common standard so that Intrusion Detection Systems can work together by sharing data.
A Compositional Optimum Network Sensor Utilization System (CONSensUS) (DARPA) 
Denial of Service (Microsoft)
Denial of Service in the Infrastructure (NASA Ames)
From Generic Policies to Enforcement Rules (NSA)
Global Guard Project: A Protection Architecture for Survivability of Large-Scale, High-Confidence Information Networks (DARPA)
Hierarchical Adaptive for Qos Intrusion Tolerance (HACQIT) (Teknowledge Corporation)
History of Computer Security (University of Maryland)
Inference Detection in Database Systems (NSA)
Intel Project (Intel)
Intrusion Detection and Isolation Protocol / IDIP (DARPA)
Intrusion Detection for Large Networks (DARPA)
We are studying intrusion detection techniques that scale to very large networks. Our main effort has been a prototype called the Graph-based Intrusion Detection System (GrIDS).
Misuse Detection (ORD)
Models for Testing Intrusion Detection Systems (NSA)
Network Router Auditing (NSA)
Policy Research Group
System Health & Intrusion Monitoring (SHIM): A New Approach to Triggering Intrusion Tolerant Mechanisms (Network Associates, Inc.)
Virus (LLNL)
Distributed Intrusion Detection System (USAF/LLNL)
Vulnerabilities (HP, Intel, Net Squared)
Workshop for Intrusion Detection and Response Data Sharing (SANS Institute)

Associated Labs

Database and Information Systems Group
Parallel and Distributed Computing
Politically Correct Virus: Doesn't refer to itself as a virus—instead, refers to itself as an "electronic microorganism."— Mark Kaye

Questions or comments: seclab-staff@cs.ucdavis.edu

Last updated: October 12, 2009