Author: Ariel Plotkin

Shoring up Tor

With 2.5 million daily users, the Tor network is the world’s most popular system for protecting Internet users’ anonymity. For more than a decade, people living under repressive regimes have used Tor to conceal their Web-browsing habits from electronic surveillance, and websites hosting content that’s been deemed subversive have used it to hide the locations […]

Nickolai Zeldovich: How to Compute With Data You Can’t See

Despite massive efforts to guard sensitive data, hackers often manage to steal it anyway. It’s a problem that’s becoming especially acute, now that huge amounts of information are being concentrated on the servers of various cloud service providers. Most times we don’t even know where these machines are located; how can we possibly feel that […]

Multi-party computation helps address Boston’s male-female pay gap

Led by Mayor Martin J. Walsh, Boston is preparing to analyze the wages of male and female employees at more than 60 local companies — a step officials say is the first attempt in the country by a major city to tackle the gender wage gap by examining and releasing actual salary information. “We’re not trying […]

Safeguarding the Internet and Defending Civil Rights

We don’t often think about what happens when we hit “Send,” but the internet’s architecture determines whether our emails end up where we want them to go. And it’s easier than you might think to mess with that architecture. The internet is made up of tens of thousands of independently operated networks (a large employer […]

Cloud Security Reaches Silicon

In the last 10 years, computer security researchers have shown that malicious hackers don’t need to see your data in order to steal your data. From the pattern in which your computer accesses its memory banks, adversaries can infer a shocking amount about what’s stored there. The risk of such attacks is particularly acute in […]

Research Team that Includes CSAIL’s Devadas Receives Major NSF Award

A research group that includes Srini Devadas of MIT’s Computer Science and Artificial Intelligence Lab (CSAIL) has received a National Science Foundation (NSF) Frontier Award, as part of nearly $75 million that the NSF’s Secure and Trustworthy Cyberspace program will spend on cybersecurity projects across the country, the foundation announced yesterday. Read More…

Securing the Cloud

The Massachusetts Open Cloud (MOC), a one-of-a-kind marketplace model for customizable public cloud offerings now being built a team of researchers from BU and several other universities, may soon claim another first: a modular cybersecurity system built from smaller, separate functional components, each asserting its own security individually. As a result, the security of the […]

NSF announces two Frontier-scale projects

Today, the National Science Foundation’s (NSF) Secure and Trustworthy Cyberspace (SaTC) program announced two new center-scale “Frontier” awards to support large, multi-institution projects that address grand challenges in cybersecurity science and engineering with the potential for broad economic and scientific impact. One Frontier grant was awarded to the Modular Approach to Cloud Security (MACS) project, which […]