Hitachi’s PBI: Public Biometric Infrastructure is the world’s first biometric authentication system that does not store any biometric data such as facial and finger-vein features anywhere, minimizing the risk of data leakage and abuse. It processes empty-handed payments and bank transactions without a card or smartphone while strongly protecting security and privacy. It runs on…
R&D 100 winner of the day: Defensive Wire Routing for Untrusted Integrated Circuit Fabrication
With increased performance from smaller transistors, U.S. Government access to trusted high-performance foundries is decreasing, thereby disadvantaging U.S. military systems which require high degrees of trust. One concern with untrusted fabrication is the issue of malicious modification or tamper, where a trusted design is modified by a fabricator to insert a “hardware Trojan” or “backdoor”…
SignalFire Wireless Telemetry and Machfu introduce an integrated 900MHz sensor network-to-cloud solution
SignalFire Wireless Telemetry, a manufacturer of industrial wireless telemetry products, and Machfu, a provider of industrial IoT solutions, announce the integration of SignalFire’s wireless sensor network with Machfu’s Industrial IoT Gateway. The Machfu IIoT Gateway incorporates edge intelligence, multi-protocol translation capabilities and multi-dimensional security features, resulting in a versatile and secure sensor-to-cloud solution. Operating the…
R&D 100 winner of the day: Matter-wave modulating secure quantum communicator (MMQ-Com)
The Information Age we live in demands data security, but the safety of our data is in peril given the rise of quantum computers that can decode classical encryption schemes. Currently, the only safe alternatives are quantum cryptography approaches that rely on photons. With Berkeley Lab’s Matter-wave modulating secure quantum communicator (MMQ-Com) innovation, the world…
Addressing the fast-changing challenges of cybersecurity
What scientists and engineers need to know to help keep software, hardware and connected systems secure By Patricia Panchak, Contributing Writer In the cat-and-mouse struggle against bad actors in our inter-networked world, scientists and engineers are on the front lines. As developers of technology that can mean the difference between an adversarial breach and a…
Keeping an eye on China is more important than ever
By about 2025, China will likely surpass the U.S. for the first time ever in the amount of dollars spent on R&D. Earlier this year, I had the opportunity to sit down with Rep. Chrissy Houlahan, a first-term congresswoman from southeastern Pennsylvania (and an industrial engineer), who sits on the House Committee on Foreign Affairs’…
Mixed-signal hardware security thwarts powerful electromagnetic attacks
Purdue innovators are at Silicon Valley’s premier chip-design conference to unveil technology that is 100 times more resilient to electromagnetic attacks to secure Internet of Things devices. Security of embedded devices is essential in today’s internet-connected world. Security is typically guaranteed mathematically using a small secret key to encrypt the private messages. When these computationally…
Intrusion alert: System uses machine-learning, curiosity-driven ‘honeypots’ to stop cyber attackers
In recent months, the FBI issued a high-impact cybersecurity warning in response to increasing attacks on government targets. Government officials have warned major cities that such hacks are a disturbing trend that is likely to continue. A new tool from Purdue University researchers may help stop some of those threats. The Purdue team created a…
Illinois Researchers Sweeten ‘Honeypot’ to Catch, Blacklist Hackers
First Reputation-based Blockchain Guarantees Security Against 51 Percent Attacks
Could Blockchain Ensure Integrity of Clinical Trial Data?
UIC to Lead $3M Initiative to Develop System to Identify, Patch Software Security Holes
The University of Illinois at Chicago will lead a $3 million project funded by the Defense Advanced Research Projects Agency to design, develop and evaluate a system that will identify security vulnerabilities in web software. UIC will receive $1.4 million of the funding, and the rest will support co-investigators at the University of Texas at…
Will Biotech and Pharma Be Prepared for This Year’s Cyber Threats?
Speed of Light: Toward a Future Quantum Internet
Engineering researchers have demonstrated proof-of-principle for a device that could serve as the backbone of a future quantum internet. University of Toronto Engineering professor Hoi-Kwong Lo and his collaborators have developed a prototype for a key element for all-photonic quantum repeaters, a critical step in long-distance quantum communication. A quantum internet is the “Holy Grail” of…
Cybersecurity Expert Elected Fellow of 2 Technology Organizations
Dr. Bhavani Thuraisingham, a professor of computer science at The University of Texas at Dallas and one of the world’s leading experts in data security and data mining, has been elected a fellow of two highly prestigious international technology organizations. Thuraisingham, the Louis A. Beecherl Jr. Distinguished Professor and executive director of the Cyber Security Research and…
Blockchain in Drug Discovery: Tech Could Further Collaboration, Data Sharing
Slicing Optical Beams: Cryptographic Algorithms for Quantum Networks
Army Scientists Revolutionize Cybersecurity Through Quantum Research
Scientists at the RDECOM Research Laboratory, the Army’s corporate research laboratory (ARL) have found a novel way to safeguard quantum information during transmission, opening the door for more secure and reliable communication for warfighters on the battlefield. Recent advancements of cutting-edge technologies in lasers and nanophysics, quantum optics and photonics have given researchers the necessary…
NSF Announces $78.2 Million to Support Frontiers of Cybersecurity, Privacy Research
Discovery Casts Dark Shadow on Computer Security
Researchers Close Security Vulnerability in Popular Encryption Program
World-First Program to Stop Hacking by Supercomputers
The Lattice-Based One Time Ring Signature (L2RS) enhanced security and privacy-preserving features enable large transactions and transfer of data without risk of being hacked by quantum computers and privacy revoked by unauthorised users. Monash IT experts consider L2RS as a significant leap forward in maintaining data security, user privacy and integrity for blockchain technology as…
An Ionic Black Box
While we embrace the way the Internet of Things already is making our lives more streamlined and convenient, the cybersecurity risk posed by millions of wirelessly connected gadgets, devices and appliances remains a huge concern. Even single, targeted attacks can result in major damage; when cybercriminals control and manipulate several nodes in a network, the…
Predict Responsibly: Fairness Needed in Algorithmic Decision-making
University of Toronto PhD student David Madras says many of today’s algorithms are good at making accurate predictions, but don’t know how to handle uncertainty well. If a badly calibrated algorithm makes the wrong decision, it’s usually very wrong. “A human user might understand a situation better than a computer, whether it’s information not available because it’s…
‘Design for Security’ Program Launched by Purdue, Intel
A new electronic security badge, offered through a new collaboration between Intel Corp. and Purdue University, will emphasize using secure design principles throughout the product development life cycle. The “Design for Security” badge will be based on a series of courses offered on Purdue’s campus and also online beginning in the fall of 2018. The…