Using machine learning to hunt down cybercriminals
Model from the Computer Science and Artificial Intelligence Laboratory identifies “serial hijackers” of internet IP addresses.
Model from the Computer Science and Artificial Intelligence Laboratory identifies “serial hijackers” of internet IP addresses.
Study offers models for preserving the privacy of citizens while using their data to improve government services.
Professor Adam Chlipala builds tools to help programmers more quickly generate optimized, secure code.
Longtime MIT professor developed early “time-sharing” operating systems and is widely credited as the creator of the world’s first computer password.
System automatically writes optimized algorithms to encrypt data in Google Chrome browsers and web applications.
Lincoln Laboratory's technique to protect commodity software from cyberattacks has transitioned to industry and will soon be available as part of a security suite.
Researchers use a new, holistic methodology to address cyber vulnerabilities in today’s energy systems.
Researchers design a negotiation strategy to help cities and organizations minimize losses when their data are held hostage.
Efficient chip enables low-power devices to run today’s toughest quantum encryption schemes.
Lincoln Laboratory researchers have developed a technique to compress hours of internet traffic into a bundle that can be analyzed for suspicious behavior.
New platform forces data center servers to only use data in ways that users explicitly approve.
Design reduces by 99 percent the data users need to join the network and verify transactions.
Vinod Vaikuntanathan aims to improve encryption in a world with growing applications and evolving adversaries.
New system breaks up cache memory more efficiently to better protect computer systems against timing attacks.
A new MIT Sloan Executive Education program presents a holistic approach to cybersecurity.