Computing Community Consortium Blog

The goal of the Computing Community Consortium (CCC) is to catalyze the computing research community to debate longer range, more audacious research challenges; to build consensus around research visions; to evolve the most promising visions toward clearly defined initiatives; and to work with the funding organizations to move challenges and visions toward funding initiatives. The purpose of this blog is to provide a more immediate, online mechanism for dissemination of visioning concepts and community discussion/debate about them.


Posts Tagged ‘security

 

CCC Responds to RFI on the 2023 Federal Cybersecurity Research and Development Strategic Plan

March 13th, 2023 / in CCC, NITRD, NSF, Privacy, resources / by Haley Griffin

CCC submitted a response to a Request for Information (RFI) released by Networking and Information Technology Research and Development (NITRD), National Coordination Office (NCO), and National Science Foundation (NSF) on the 2023 Federal Cybersecurity Research and Development Strategic Plan. CCC previously released a blog about the importance of the RFI, and encouraged the computing community to respond. CCC’s response was written by: Nadya Bliss (Arizona State University)  Elizabeth Bradley (University of Colorado-Boulder)  Randal Burns (Johns Hopkins University)  Thomas M. Conte (Georgia Institute of Technology)  David Danks (University of California San Diego)  Nathan Evans (Arizona State University)  Kevin Fu (Northeastern University)  Haley Griffin (Computing Community Consortium)  William D. Gropp (University of […]

CIFellow Spotlight – SHIELD: Secure Hardware for IoT using Emerging-devices against side-channeL Deep-learning attacks

February 25th, 2022 / in CCC, CIFellows, CIFellows Spotlight, research horizons, Security, Uncategorized / by Maddy Hunter

Soheil Salehi began his CIFellowship in September 2020 after receiving her PhD from University of Central Florida in May 2020. Soheil is at University of California Davis working with Houman Homayoun, Associate Professor of Electrical and Computer Engineering at University of California Davis.  The remainder of this post is written by Soheil Salehi Current Project My research focus is on applications of AI in secure Internet of Things (IoT) sensing and computing hardware. Currently, I am leading several projects on the topic of AI-enabled security for the IoT supply chain, which takes on a ground-up approach to ensure the reliability, security, and energy efficiency of the IoT hardware. Within this […]

Mechanism Design for Improving Hardware Security Orientation Recap

February 3rd, 2022 / in CCC, Security / by Maddy Hunter

On January 13th, the Computing Community Consortium (CCC) held an orientation webinar as an introduction for a CCC visioning workshop on Mechanism Design for Improving Hardware Security to be held in the summer of 2022 (exact date and location TBD). Hosted by workshop organizers Simha Sethumadhavan (Columbia University) and Tim Sherwood (University of California Santa Barbara), the orientation consisted of pre-recorded presentations and a Q&A with the speakers. The slide deck, pre-recorded presentation video, recording of the Q&A session and a transcript of the Q&A are linked and posted on the workshop webpage. The orientation outlined the goals of the workshop and expanded on what the organizers are looking for […]

CCC White Paper on Research Opportunities in Evidence-Based Elections is Now Available

January 12th, 2022 / in CCC, CCC-led white papers, Security / by Maddy Hunter

The Computing Community Consortium (CCC) recently released the Research Opportunities in Evidence-Based Elections white paper, written by Josh Benaloh (Microsoft Research), Philip B. Stark (University of California, Berkeley), Vanessa Teague (Australian National University), Melanie Volkamer (Karlsruhe Institute of Technology), and Dan Wallach (Rice University).  This white paper highlights the need for evidence-based elections, which can convince people that the results of elections are accurate, and suggests several technologies that could play a role in this, mostly focused on risk-limiting audits and end-to-end verifiability.  “A risk-limiting audit (RLA) is any procedure with a known minimum chance of correcting the reported electoral outcome if the reported electoral outcome is wrong—that is, if […]

Mechanism Design for Improving Hardware Security – Register for January 13th Webinar

January 3rd, 2022 / in Announcements, call for papers, CCC, Security / by Khari Douglas

The Computing Community Consortium (CCC) will hold a visioning workshop on Mechanism Design for Improving Hardware Security during the summer of 2022 (exact date and location TBD). We seek short white papers to help create the agenda for the workshop and select attendees. Workshop organizers Simha Sethumadhavan (Columbia University) and Tim Sherwood (University of California Santa Barbara) will host an orientation webinar from 1 – 2:30 PM ET on Thursday, January 13th, 2022 to outline the goals of the workshop and expand on what they are looking for in the white papers. Following the pre-recorded presentations there will be an opportunity for Q&A with the speakers. Register to attend the […]

Mechanism Design for Improving Hardware Security – Call for White Papers and Orientation Webinar

December 13th, 2021 / in Announcements, call for papers, CCC, Security / by Khari Douglas

The Computing Community Consortium (CCC) will hold a visioning workshop on Mechanism Design for Improving Hardware Security during the summer of 2022 (exact date and location TBD). We seek short white papers to help create the agenda for the workshop and select attendees. From election security to critical health applications, trustworthy hardware is the bedrock of a modern free and healthy society. Once niche and arcane, the field of hardware security has recently become one of the most pressing issues in cybersecurity. Microarchitectural side channel attacks like Spectre and Meltdown have shown how pervasive, dangerous, and hard-to-fix a hardware attack could be; integrity attacks such as Rowhammer and CLKSCREW show […]