Researchers contend Russia's use of North Korean IP addresses for a 2018 cyberattack underscored the need for a new cybersecurity strategy involving selective retaliation...MIT News From ACM TechNews | December 28, 2020
A platform developed by researchers at the Massachusetts Institute of Technology can quantify security risks for companies without requiring them to disclose sensitive...MIT News From ACM TechNews | September 10, 2020
MIT researchers have developed a scalable metadata-protection scheme to shield the information of millions of users.
MIT News From ACM TechNews | February 26, 2020
A new cryptographic identity tag can be attached to virtually any product in order to verify its authenticity.
MIT News From ACM TechNews | February 21, 2020
A new model can help autonomous vehicles determine when it is safe to proceed into traffic at intersections with obstructed views.
MIT News From ACM TechNews | November 6, 2019
Massachusetts Institute of Technology engineers have created a system that perceives tiny fluctuations in ground shadows to ascertain whether an unseen object is...MIT News From ACM TechNews | October 28, 2019
A new algorithm accurately aligns partial trajectories in real time, allowing motion predictors in self-driving cars to accurately anticipate the timing of a person's...MIT News From ACM TechNews | June 17, 2019
Researchers suggest the vulnerability of compressed, or quantized, artificial intelligence models to adversarial attack could be remedied by adding a mathematical...MIT News From ACM TechNews | May 2, 2019
A new transmitter can hack-proof wireless data by frequency hopping each individual 1 or 0 bit of a data packet, every microsecond.
MIT News From ACM TechNews | June 14, 2018
The new Veil system is designed to improve private browsing by guaranteeing that any data the browser loads into memory remains encrypted until it is displayed...MIT News From ACM TechNews | February 28, 2018
A new chip performs public-key encryption while consuming only 1/400 as much power as software execution of the same protocols would.
MIT News From ACM TechNews | February 14, 2018
Splinter is a new encryption system that disguises users' database queries so they reveal no private information.
MIT News From ACM TechNews | March 29, 2017
New technology for protecting anonymity online provides stronger security guarantees but uses bandwidth much more efficiently than previous anonymity networks. MIT News From ACM TechNews | July 14, 2016
Anonymity networks protect people living under repressive regimes from surveillance of their Internet use. But the recent discovery of vulnerabilities in the most...MIT News Office From ACM News | July 12, 2016
Researchers have demonstrated that snoopers armed with little sophisticated technology can expose the home and workplace addresses of Twitter users. MIT News From ACM TechNews | May 18, 2016
Planning algorithms for teams of robots fall into two categories: centralized algorithms, in which a single computer makes decisions for the whole team, and decentralized...MIT News Office From ACM News | April 21, 2016
Researchers at the Massachusetts Institute of Technology and Texas Instruments have developed a virtually hack-proof radio-frequency identification chip.MIT News From ACM TechNews | February 5, 2016
Massachusetts Institute of Technology researchers have unveiled an untraceable text-messaging system designed to foil even the most powerful adversaries.MIT News From ACM TechNews | December 7, 2015