Carnegie Mellon University CyLab researchers are focusing on the security of systems—any systems ranging from the components that make up an autonomous vehicle to the various sectors that make up the energy grid—which requires placing security protocols on different, non-homogeneous parts that must still be able to communicate and work together efficiently and effectively.
We have researchers working in the following subtopics of applications of security and privacy. Check out each of their research:
- access control and authorization
- automotive and transportation security and privacy
- cloud security
- cyber physical systems security and privacy
- elections security
- embedded systems security
- energy and critical infrastructure security
- intrusion and anomaly detection and prevention
- IoT security and privacy
- manufacturing security
- mobile and app security and privacy
- systems security
- web security
Researchers develop adversarial training methods to improve machine learning-based malware detection software
Professor Lujo Bauer and a team of researchers investigate the effectiveness of using adversarial training methods to create malware detection models that are more robust to some of the state-of-the-art attacks.
Provably-secure code incorporated into Linux kernel
This month, code from the provably correct and secure “EverCrypt” cryptographic library, which CyLab’s Bryan Parno and his team helped develop and release last year, was officially incorporated into the Linux kernel — the core of the Linux operating system.
First round of Secure and Private IoT Initiative funded projects announced
CyLab’s Secure and Private IoT Initiative (IoT@CyLab) has broken ground as the first round of funded proposals have been announced. Twelve selected projects will be funded for one year, and results will be presented at the IoT@CyLab annual summit next year.
Achieving provably-secure encryption
Earlier this week, a team consisting of researchers from CyLab released the world's first verifiably secure industrial-strength cryptographic library—a set of code that can be used to protect data and is guaranteed to protect against the most popular classes of cyberattacks.
CyLab’s Gligor and Woo receive Distinguished Paper Award for breakthrough result on establishing “root of trust”
In a breakthrough study, “Establishing Root of Trust Unconditionally,” CyLab researchers Virgil Gligor and Maverick Woo present a test that can be run on any computing device to show whether the device has been infected with malware or not.