Two new security techniques block power and electromagnetic side-channel attacks targeting analog-to-digital converters in smart devices.
MIT News From ACM TechNews | June 17, 2022
A new technique to prevent memory timing side-channel attacks by malware exploits memory hardware common to multiple programs running on the same computer.
MIT News From ACM TechNews | March 1, 2022
Researchers at the Massachusetts Institute of Technology have designed an integrated circuit chip that can thwart power side-channel attacks using less energy than...MIT News From ACM TechNews | February 25, 2022
Scientists have programmed a universal algorithm to enable a silicon chip to decode any data transmitted across a network, irrespective of structure.
MIT News From ACM TechNews | September 10, 2021
Scientists suggest crowdsourced assessments from groups of normal readers can virtually match those of professional fact-checkers in vetting news stories.
MIT News From ACM TechNews | September 9, 2021
The Reconnaissance of Influence Operations program was developed to identify disinformation narratives and the individuals spreading them via social media.
MIT News From ACM TechNews | June 10, 2021
Researchers contend Russia's use of North Korean IP addresses for a 2018 cyberattack underscored the need for a new cybersecurity strategy involving selective retaliation...MIT News From ACM TechNews | December 28, 2020
A platform developed by researchers at the Massachusetts Institute of Technology can quantify security risks for companies without requiring them to disclose sensitive...MIT News From ACM TechNews | September 10, 2020
MIT researchers have developed a scalable metadata-protection scheme to shield the information of millions of users.
MIT News From ACM TechNews | February 26, 2020
A new cryptographic identity tag can be attached to virtually any product in order to verify its authenticity.
MIT News From ACM TechNews | February 21, 2020
A new model can help autonomous vehicles determine when it is safe to proceed into traffic at intersections with obstructed views.
MIT News From ACM TechNews | November 6, 2019
Massachusetts Institute of Technology engineers have created a system that perceives tiny fluctuations in ground shadows to ascertain whether an unseen object is...MIT News From ACM TechNews | October 28, 2019
A new algorithm accurately aligns partial trajectories in real time, allowing motion predictors in self-driving cars to accurately anticipate the timing of a person's...MIT News From ACM TechNews | June 17, 2019
Researchers suggest the vulnerability of compressed, or quantized, artificial intelligence models to adversarial attack could be remedied by adding a mathematical...MIT News From ACM TechNews | May 2, 2019
A new transmitter can hack-proof wireless data by frequency hopping each individual 1 or 0 bit of a data packet, every microsecond.
MIT News From ACM TechNews | June 14, 2018
The new Veil system is designed to improve private browsing by guaranteeing that any data the browser loads into memory remains encrypted until it is displayed...MIT News From ACM TechNews | February 28, 2018
A new chip performs public-key encryption while consuming only 1/400 as much power as software execution of the same protocols would.
MIT News From ACM TechNews | February 14, 2018