Helping companies prioritize their cybersecurity investments

By securely aggregating sensitive data from cyber-attacks, the SCRAM platform from MIT CSAIL can quantify an organization’s level of security and suggest what to prioritize.

Adam Conner-Simons | MIT CSAIL • mit
Sept. 3, 2020 ~7 min

Tags: industry policy research cyber-security privacy school-of-engineering computer-science-and-technology sloan-school-of-management technology-and-society computer-science-and-artificial-intelligence-laboratory-csail security-studies-and-military electrical-engineering-and-computer-science-eecs mit-schwarzman-college-of-computing

Algorithm quickly simulates a roll of loaded dice

Approach for generating numbers at random may help analyses of complex systems, from Earth’s climate to financial markets.

Steve Nadis | MIT News correspondent • mit
May 28, 2020 ~8 min

Tags: mathematics data research cyber-security school-of-engineering school-of-science electrical-engineering-computer-science-eecs algorithms brain-and-cognitive-sciences mit-schwarzman-college-of-computing computer-science-and-artificial-intelligence-laboratory


Protecting sensitive metadata so it can’t be used for surveillance

System ensures hackers eavesdropping on large networks can’t find out who’s communicating and when they’re doing so.

Rob Matheson | MIT News Office • mit
Feb. 26, 2020 ~8 min

Tags: data research cyber-security school-of-engineering electrical-engineering-computer-science-eecs computer-science-and-technology technology-and-society algorithms computer-science-and-artificial-intelligence-laboratory-csail

Cryptographic “tag of everything” could protect the supply chain

Tiny, battery-free ID chip can authenticate nearly any product to help combat losses to counterfeiting.

Rob Matheson | MIT News Office • mit
Feb. 20, 2020 ~8 min

Tags: internet-of-things electronics industry research cyber-security school-of-engineering electrical-engineering-computer-science-eecs computer-science-and-technology algorithms microsystems-technology-laboratory


Using machine learning to hunt down cybercriminals

Model from the Computer Science and Artificial Intelligence Laboratory identifies “serial hijackers” of internet IP addresses.

Adam Conner-Simons | MIT CSAIL • mit
Oct. 8, 2019 ~7 min

Tags: machine-learning artificial-intelligence internet data research cyber-security school-of-engineering electrical-engineering-computer-science-eecs computer-science-and-technology national-science-foundation-nsf


Automated cryptocode generator is helping secure the web

System automatically writes optimized algorithms to encrypt data in Google Chrome browsers and web applications.

Rob Matheson | MIT News Office • mit
June 17, 2019 ~8 min

Tags: research cyber-security school-of-engineering electrical-engineering-computer-science-eecs computer-science-and-technology algorithms computer-science-and-artificial-intelligence-laboratory-csail

Protecting our energy infrastructure from cyberattack

Researchers use a new, holistic methodology to address cyber vulnerabilities in today’s energy systems.

Nancy W. Stauffer | MIT Energy Initiative • mit
June 4, 2019 ~17 min

Tags: research cyber-security school-of-engineering sloan-school-of-management mit-energy-initiative system-design-and-management

Page 1 of 5