security

daily.dev blog
Cryptology ePrint Archive

End-to-end encrypted applications protect user data by ensuring that user secrets are only available on client devices. However, if a user loses all of their devices, they need a way to recover their data using only a short password. To realize a password-based secret recovery system resilient to brute-force attacks, prior works relied on secure hardware or a few non-colluding servers. In this w…

computer-sciencecryptographysecurity
Cryptology ePrint Archive

Block ciphers are versatile cryptographic ingredients that are used in a wide range of applications ranging from secure Internet communications to disk encryption. While post-quantum security of public-key cryptography has received significant attention, the case of symmetric-key cryptography (and block ciphers in particular) remains a largely unexplored topic. In this work, we set the foundation…

cryptographyquantum-computingsecurity
Atlantic Council

A drop in attacks in the Gulf of Guinea does not necessarily mean piracy has been resolved. Pirates have adapted their tactics, and the potential for resurgence remains high; this issue remains a critical security and development concern. It is not just a regional priority—it is an international imperative. The post Atlantic piracy, current threats, and maritime governance in the Gulf of Guinea a…

political-sciencesecuritysocial-science
UbuntuPIT

In computer science, the kernel is the soul of an operating system. Linux kernel is designed with very sound architectural knowledge of an Operating system. Linux has mostly three types of the kernel. They are the Monolithic kernel, Microkernel, and the hybrid kernel. Linux has the Monolithic kernel. A monolithic kernel is built for high […] The post How To Properly Secure sysctl in Linux: Securi…

computer-sciencesecurity
Syntec Optics

New research proposes a novel data privacy preservation protocol for smart cities that leverages the security benefits of biometrics while maintaining energy efficiency. Biometric data, such as fingerprints or facial recognition, provides a unique identifier for user authentication. The protocol incorporates fuzzy commitment schemes, a cryptographic primitive well-suited for optics and photonics …

aimachine-learningsecurity
SIGARCH

Security remains a popular research area in our conferences – MICRO-53 featured two sessions and eight papers dedicated to security. To contribute new ideas in this area, it is important for computer architects to keep up with recent developments in both architecture and security conferences. Our earlier blog post highlighted contributions from security conferences from […]

computer-sciencesecurity
SIGARCH

In an earlier blog post, we argued that computer architects working on security problems should follow security conferences. In this post, we highlight some of the recent results from this year’s events that may be of interest to our community. While security conferences encompass many topics and typically accept more papers than architecture conferences, several […]

computer-sciencesecurity
SIGARCH

Security has recently emerged as a first-class design consideration and an active research area in computer architecture community, with most top-tier conferences dedicating one or more sessions to security topics. Best Paper Awards at two most recent MICRO conferences went to security papers. The purpose of this blog post is to help researchers who are […]

computer-architecturecomputer-sciencesecurity
Formal Methods
jennsbl
9/10/2015

Jan Hoffmann Jan jennsbl Thu, 09/10/2015 - 18:57 Hoffmann Associate Professor 9105 Gates and Hillman Centers janh@andrew.cmu.edu (412) 268-6309 Computer Science Department Michael Stanley Programming Languages Formal Methods Security and Privacy Faculty Ethan Chu Nathan Glover My research mission is to discover beautiful mathematica…

computer-scienceformal-methodsprogramming-languagessecurity
Formal Methods
jennsbl
8/24/2015

Matt Fredrikson Matt jennsbl Sun, 08/23/2015 - 22:42 Fredrikson Associate Professor 2126 Mehrabian Collaborative Innovation Center mfredrik@andrew.cmu.edu Computer Science Department Programming Languages Formal Methods Security and Privacy Faculty Saranya Vijayakumar Andy Zou My research is directed at understanding fundamental security and privacy issue…

computer-scienceformal-methodsprogramming-languagessecurity
Formal Methods
csdadmin
10/14/2014

David Brumley David csdadmin Tue, 10/14/2014 - 09:01 Brumley Professor of ECE, Affiliated Faculty 2202 Mehrabian Collaborative Innovation Center dbrumley@andrew.cmu.edu (412) 268-3851 CIT - Electrical and Computer Engineering Computer Science Department: Affiliated Formal Methods Security Cryptography Security and Priv…

computer-sciencecryptographyformal-methodssecurity
Formal Methods
csdadmin
10/14/2014

David Garlan David csdadmin Tue, 10/14/2014 - 09:01 Garlan Professor 420 TCS Hall dg4d@andrew.cmu.edu (412) 268-5056 Software And Societal Systems Department Computer Science Department http://www.cs.cmu.edu/~garlan Programming Languages Security Formal Methods Mobile and Pervasive Computing Securi…

computer-scienceformal-methodsprogramming-languagessecurity
Bristol Cryptography Blog
Unknown (noreply@blogger.com)
5/29/2012

Correction: the notion of tainted refers to sessions and not to adversaries. There was a small typo . (Thanks to Bogdan) The reading group of today has been driven by Bogdan and Marcel. In the first part of the presentation, Bogdan talked about security definitions on distance bounding protocols. These definition best fit to RFID authentication, and they are designed as countermeasures against ma…

computer-sciencesecurity