Cybersecurity

SHARE:
  • EECS graduate students Alessandro Chiesa and Madars Virza have teamed to develop a new system which can detect tampering in the cloud. The team presented their system, which is described as a practical, succinct zero-knowledge proof for arbitrary programs, at the International Cryptology Conference in August. Read more
  • Researchers from CSAIL and Center for Wireless Networks and Mobile Computing have developed a TCP congestion-control system called Remy, which they will present at the annual conference of the Association for Computing Machinery’s Special Interest Group on Data Communications. Hari Balakrishnan, the Fujitsu Professor of Electrical Engineering and Computer Science and EECS graduate student Keith Winstein are the authors of the work titled "TCP ex Machina: Computer-Generated Congestion Control".
  • EECS Professors Regina Barzilay and Martin Rinard (and their respective graduate students Nate Kushman and Tao Lei) have demonstrated that ordinary language can be used (in specific cases) to aid in generating code for computer programs. Read more
  • Faculty members in the Electrical Engineering and Computer Science Department at MIT are converging on a wide range of research issues through game theory, which used to be a staple of economics research in the 1950s. EECS faculty members Asuman Ozdaglar, Costis Daskalakis, Munther Dahleh, and Silvio Micali discuss their approaches in this Technology Review feature. Read more.
  • Srini Devadas, the Edwin Sibley Webster Professor of Electrical Engineering and Computer Science, and members of the Computational Structures Group in the Computer Science and Artificial Intelligence Lab (CSAIL) have developed a new system that not only disguises a server's memory-access patterns, but also prevents attacks that rely on how long computations take.
  • EECS faculty member Dina Katabi, principal investigator in the Computer Science and Artificial Intelligence Laboratory (CSAIL) and her graduate student Fadel Adib have developed a system (dubbed Wi-Vi) which uses low-cost wireless technology to track moving humans behind walls.
  • EECS faculty members Shafi Goldwasser, and Nickolai Zeldovich, both members of the Computer Science and Artificial Intelligence Laboratory (CSAIL) at MIT, and EECS graduate student Raluca Ada Popa have teamed with colleagues at University of Toronto and Microsoft Research to report a development in the area of homomorphic encryption that offers a functional encryption scheme to maintain security of encrypted data in the cloud.
  • Professor Rob Miller is one of four MIT faculty selected as 2013 MacVicar Faculty Fellow for outstanding undergraduate teaching, mentoring and educational innovation. One recommender wrote: “I think Rob embodies the ideal of an MIT teacher — caring, engaging, tirelessly working on behalf of the students, eliciting respect, admiration, and joy from the students.”
  • MIT professors Shafi Goldwasser and Silvio Micali have won the Association for Computing Machinery’s (ACM) A.M. Turing Award for their pioneering work in the fields of cryptography and complexity theory. Essentially laying the foundation for modern cryptography by formalizing the concept that cryptographic security had to be computational rather than absolute, the two have turned cryptography from an art into science -- and, in the process provided the basis for securing today's communications protocols, Internet transactions and cloud computing. They also made fundamental advances in the theory of computational complexity, an area that focuses on classifying computational problems according to their inherent difficulty.
  • In a paper titled "Ampli fication of Chosen-Ciphertext Security," two CSAIL postdoctoral associates Huijia (Rachel) Lin and Stefano Tessaro, who work with EECS Professor Shafi Goldwasser, have proposed a new technique aimed at protecting against the worst possible scenario in current enryption scheme vulnerabilities. This work will be presented in May this spring at the International Conference on the Theory and Applications of Cryptographic Techniques.

Pages

Subscribe to Cybersecurity