Computing Community Consortium Blog

The goal of the Computing Community Consortium (CCC) is to catalyze the computing research community to debate longer range, more audacious research challenges; to build consensus around research visions; to evolve the most promising visions toward clearly defined initiatives; and to work with the funding organizations to move challenges and visions toward funding initiatives. The purpose of this blog is to provide a more immediate, online mechanism for dissemination of visioning concepts and community discussion/debate about them.


NSF WATCH TALK- Secure Hardware and Cryptography: Contrasts, Synergies and Challenges

May 16th, 2017 / in Announcements, NSF / by Helen Wright

The next WATCH talk, called Secure Hardware and Cryptography: Contrasts, Synergies and Challenges is Thursday, May 18th, from 12 PM-1 PM ET.

The presenter is Srini Devadas, the Webster Professor of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology (MIT). Devadas’s research interests span Computer-Aided Design (CAD), computer security, and computer architecture. He has received the 2014 IEEE Computer Society Technical Achievement award, the 2015 ACM/IEEE Richard Newton technical impact award, and the 2017 IEEE Wallace McDowell award for his research. Devadas is a MacVicar Faculty Fellow and an Everett Moore Baker teaching award recipient, considered MIT’s two highest undergraduate teaching honors.

Abstract
Numerous cryptographic protocols and mechanisms have been developed to solve computer security challenges, and these techniques vary considerably with respect to security assumptions, performance tradeoffs, and applicability to problems. Secure hardware primarily uses the mechanism of isolation to solve a broad class of computer security problems, ranging from private information retrieval to verifiable computation. In this talk, I will contrast the two approaches by focusing on the application of remote outsourced computation. I will describe a spectrum of approaches that vary in their use of cryptography and isolation to achieve secure remote computation. I will end with describing challenges that remain in the deployment of secure hardware.

The talk will be held in Room 110 at the National Science Foundation in Arlington, VA. No RSVP is necessary, and no visitor badges are required. It will also be webcast; you can register here

NSF WATCH TALK- Secure Hardware and Cryptography: Contrasts, Synergies and Challenges