Mathematical Limits of Lattices in Cryptography

Nearly all of public-key cryptography relies on the assumed difficulty of solving various number-theoretic problems. Recent spectacular developments in cryptography such as fully homomorphic encryption, candidate multilinear maps, and efficient post-quantum lattice-based cryptography have produced a multitude of new algebraic and number-theoretic cryptographic hardness assumptions. Many of these problems are Read more…

Developing Real-Time Virtualization

Recent years have witnessed two major trends in the development of complex real-time systems. First, they are moving from physically isolated hosts towards common computing platforms shared by multiple systems. Using common platforms can bring significant benefits, including reduced cost and weight, as well as increased flexibility via dynamic resource Read more…

Smart Alarms for Medical Device Systems

The Intensive Care Unit of most major hospitals is a noisy environment. In order to monitor patients, healthcare practitioners set threshold alarms on each of many individual vital sign monitors. While nurses themselves rarely consider one vital sign in isolation, the current alarm algorithms elicit numerous false positive alarms by Read more…

Network Provenance

Operators of distributed systems often find themselves needing to answer a diagnostic or forensic question. Some part of the system is found to be in an unexpected state; for example, a suspicious routing table entry is discovered, or a proxy cache is found to contain an unusually large number of Read more…

Theory and Practice of Differential Privacy

Large, diverse datasets hold tremendous promise, if only we can derive statistical insights from them. But often, these datasets are siloed and withheld, because of privacy concerns. Differential privacy can mitigate these concerns — it provides a strong, attractive privacy guarantee that protects data owners from risks associated disclosure of Read more…