Cybersecurity involves safeguarding software systems, embedded systems IoT (Internet of Things), mobile systems, and cyber-physical systems from threats such as software vulnerabilities, attacks, and other types of malicious and harmful activity. CISE researchers apply a variety of techniques from a number of fields (program analysis, machine learning, computational social science) to better understand such systems and the way in which people interact with them and misuse them. Research in CISE includes development of automated dynamic malware-analysis techniques and tools to analyze potentially malicious samples. Another line of research involves hardening the security of wireless ingestible and implantable medical devices (IMDs), such as on-demand drug delivery systems and bio-engineered wireless medical sensors, for diagnostic and therapeutic purposes.

Collaborative Research: SaTC: CORE: Medium: App-driven Web Browsing: Novel Risks, Vulnerabilities, and Defenses

The modern web ecosystem is comprised of a multitude of non-browser applications that, while having the same ability to process and render web content, are developed with different technologies and exhibit different capabilities. In this new browsing paradigm, app developers are responsible for configuring and implementing security features that are already standardized in traditional browsers. […]

Faster, Greener, Cheaper, More Secure: Yazicigil’s GRAND Project Pushes Forward with New Funding

CISE Faculty Affiliate Professor Rabia Yazicigil (ECE)  and her MIT collaborators are on a roll. The multi-institutional team behind the GRAND universal decoder algorithm and its first realization in hardware have been awarded $5M in funding by the Defense Advanced Research Program Agency (DARPA) to continue developing revolutionary improvements to wireless communications. Alongside co-PIs Professor […]

Privacy-Preserving Cloud Computing using Homomorphic Encryption

In today’s data-driven world, a large amount of data is collected by billions of devices (cell phones, autonomous cars, handheld game consoles, etc.), and this data is then processed in the cloud. A common approach to maintain data privacy in the cloud is to keep the data in encrypted form, and we decrypt the data […]

IRS Stares Technological Advancement Issues in the Face

Almost every American is used to sharing information with the Internal Revenue Service (IRS), but people were about to become eerily intimate with the agency after they announced the launch of a new website requirement:  live video identity verification. The agency partnered with the third-party company to prevent scammers from benefiting off of the […]

Arslan Riaz awarded COMSNETS 2022 Best Research Demo Award

Arslan Riaz, PhD candidate (ECE), won the “Best Research Demo” award at the 14th International Conference on COMmunication Systems & NETworkS (COMSNETS 2022) January 3-8, 2022. Riaz demonstrated the first fully-integrated universal Maximum Likelihood Decoder in 40 nm CMOS using the Guessing Random Additive Noise Decoding (GRAND) algorithm. This novel technology provides a universal system for […]

Collaborative Research: SaTC: CORE: Medium: ONSET: Optics-enabled Network Defenses for Extreme Terabit DDoS Attacks

Distributed Denial of Service (DDoS) attacks continue to present a clear and imminent danger to critical network infrastructures. DDoS attacks have increased in sophistication with advanced strategies to continuously adapt (e.g., changing threat postures dynamically) and induce collateral damage (i.e., higher latency and loss for legitimate traffic). Furthermore, advanced attacks may also employ reconnaissance (e.g., […]

Collaborative Research: SWIFT: Facilitating Spectrum Access by Noise Guessing

Wireless technologies play an essential role in enabling growth and prosperity in societies by supporting business, government, science and education, defense, and health sectors. The boom of connected Internet of Things (IoT) nodes and 5G wireless communications will lead to a many-fold increase in wireless data traffic. This data storm and connectivity-in-everything model will result […]

Automated Analytics for Improving Efficiency, Safety, and Security of HPC Systems

Performance variations are becoming more prominent with new generations of large-scale High Performance Computing (HPC) systems. Understanding these variations and developing resilience to anomalous performance behavior are critical challenges for reaching extreme-scale computing. To help address these emerging performance variation challenges, there is increasing interest in designing data analytics methods to make sense out of the […]