Soheil Salehi began his CIFellowship in September 2020 after receiving her PhD from University of Central Florida in May 2020. Soheil is at University of California Davis working with Houman Homayoun, Associate Professor of Electrical and Computer Engineering at University of California Davis. The remainder of this post is written by Soheil Salehi Current Project My research focus is on applications of AI in secure Internet of Things (IoT) sensing and computing hardware. Currently, I am leading several projects on the topic of AI-enabled security for the IoT supply chain, which takes on a ground-up approach to ensure the reliability, security, and energy efficiency of the IoT hardware. Within this […]
Computing Community Consortium Blog
The goal of the Computing Community Consortium (CCC) is to catalyze the computing research community to debate longer range, more audacious research challenges; to build consensus around research visions; to evolve the most promising visions toward clearly defined initiatives; and to work with the funding organizations to move challenges and visions toward funding initiatives. The purpose of this blog is to provide a more immediate, online mechanism for dissemination of visioning concepts and community discussion/debate about them.
Archive for the ‘Security’ category
CIFellow Spotlight – SHIELD: Secure Hardware for IoT using Emerging-devices against side-channeL Deep-learning attacks
February 25th, 2022 / in CCC, CIFellows, CIFellows Spotlight, research horizons, Security, Uncategorized / by Maddy HunterMechanism Design for Improving Hardware Security Orientation Recap
February 3rd, 2022 / in CCC, Security / by Maddy HunterOn January 13th, the Computing Community Consortium (CCC) held an orientation webinar as an introduction for a CCC visioning workshop on Mechanism Design for Improving Hardware Security to be held in the summer of 2022 (exact date and location TBD). Hosted by workshop organizers Simha Sethumadhavan (Columbia University) and Tim Sherwood (University of California Santa Barbara), the orientation consisted of pre-recorded presentations and a Q&A with the speakers. The slide deck, pre-recorded presentation video, recording of the Q&A session and a transcript of the Q&A are linked and posted on the workshop webpage. The orientation outlined the goals of the workshop and expanded on what the organizers are looking for […]
DARPA Releases GARD Program to Help Strengthen AI Against Attacks
January 19th, 2022 / in AI, Security / by Maddy HunterThe Defense Advanced Research Projects Agency (DARPA) released a new program Guaranteeing AI Robustness against Deception (GARD) to aid Artificial Intelligence (AI) developers in testing their models’ defenses against attacks. A team of large technology players from academia and industry, including IBM, MITRE, University of Chicago and Google Research collaborated to make a set of open source testing tools. The tools, ranging from a virtual evaluation testbed, a benchmark dataset, and “test dummies” help identify vulnerabilities in AI systems and make systems more robust against an increasingly complex range of attacks. The growing field of Machine Learning (ML) enables a large range of opportunities for societal and technological growth, but […]
CCC White Paper on Research Opportunities in Evidence-Based Elections is Now Available
January 12th, 2022 / in CCC, CCC-led white papers, Security / by Maddy HunterThe Computing Community Consortium (CCC) recently released the Research Opportunities in Evidence-Based Elections white paper, written by Josh Benaloh (Microsoft Research), Philip B. Stark (University of California, Berkeley), Vanessa Teague (Australian National University), Melanie Volkamer (Karlsruhe Institute of Technology), and Dan Wallach (Rice University). This white paper highlights the need for evidence-based elections, which can convince people that the results of elections are accurate, and suggests several technologies that could play a role in this, mostly focused on risk-limiting audits and end-to-end verifiability. “A risk-limiting audit (RLA) is any procedure with a known minimum chance of correcting the reported electoral outcome if the reported electoral outcome is wrong—that is, if […]
Mechanism Design for Improving Hardware Security – Register for January 13th Webinar
January 3rd, 2022 / in Announcements, call for papers, CCC, Security / by Khari DouglasThe Computing Community Consortium (CCC) will hold a visioning workshop on Mechanism Design for Improving Hardware Security during the summer of 2022 (exact date and location TBD). We seek short white papers to help create the agenda for the workshop and select attendees. Workshop organizers Simha Sethumadhavan (Columbia University) and Tim Sherwood (University of California Santa Barbara) will host an orientation webinar from 1 – 2:30 PM ET on Thursday, January 13th, 2022 to outline the goals of the workshop and expand on what they are looking for in the white papers. Following the pre-recorded presentations there will be an opportunity for Q&A with the speakers. Register to attend the […]
Mechanism Design for Improving Hardware Security – Call for White Papers and Orientation Webinar
December 13th, 2021 / in Announcements, call for papers, CCC, Security / by Khari DouglasThe Computing Community Consortium (CCC) will hold a visioning workshop on Mechanism Design for Improving Hardware Security during the summer of 2022 (exact date and location TBD). We seek short white papers to help create the agenda for the workshop and select attendees. From election security to critical health applications, trustworthy hardware is the bedrock of a modern free and healthy society. Once niche and arcane, the field of hardware security has recently become one of the most pressing issues in cybersecurity. Microarchitectural side channel attacks like Spectre and Meltdown have shown how pervasive, dangerous, and hard-to-fix a hardware attack could be; integrity attacks such as Rowhammer and CLKSCREW show […]