CSAIL report: Giving government special access to data poses major security risks Whether “backdoor” or “front-door,” government access imperils your data, report authors say. July 7, 2015 Read full story →
Chisholm, Rivest, and Thompson appointed as new Institute Professors Biologist, computer scientist, and musician awarded MIT’s highest faculty honor. June 29, 2015 Read full story →
“Fingerprinting” chips to fight counterfeiting MIT spinout uses random variations in silicon chips as authentication identifiers for consumer products. April 30, 2015 Read full story →
How three MIT students fooled the world of scientific journals A decade later, CSAIL alumni reflect on their paper generator and reveal a new fake-conference project. April 14, 2015 Read full story →
Faculty promotions announced in EECS Five faculty are promoted to full professor; three faculty promoted to associate professor. March 19, 2015 Read full story →
Political Science and EECS join forces for "Elections and Voting Technology" course Joint course helps students meet the complex challenges of modern election systems. February 3, 2015 Read full story →
Laboratory for Nuclear Security and Policy receives $3.2 million for nuclear warhead verification November 26, 2014 Read full story →
Hewlett Foundation funds new MIT initiative on cybersecurity policy Largest-ever private commitment to cybersecurity establishes major new academic centers. November 18, 2014 Read full story →
Raising cryptography’s standards Calculating encryption schemes’ theoretical security guarantees eases comparison, improvement. October 30, 2014 Read full story →
Research team that includes CSAIL's Devadas receives major NSF award Modular Approach to Cloud Security project aims to build cloud systems with multilayered security August 1, 2014 Read full story →
MIT professor ‘made much of our world possible’ Computing luminaries celebrate the work of MIT adjunct professor and Turing Award winner Butler Lampson, one of the fathers of the modern PC. February 18, 2014 Read full story →
Detecting program-tampering in the cloud A new version of ‘zero-knowledge proofs’ allows cloud customers to verify the proper execution of their software with a single packet of data. September 11, 2013 Read full story →
Encryption is less secure than we thought For 65 years, most information-theoretic analyses of cryptographic systems have made a mathematical assumption that turns out to be wrong. August 14, 2013 Read full story →