SAGE Journals
Our DARPA Brandeis program work focused on technologies for assuring privacy of individuals while enabling organizations to make critical decisions using their sensitive data. This paper describes the collaborative effort between nine institutions and the Naval Information Warfare Center to deploy this kind of capability using a shipboard Internet of Things during a Navy exercise.
PERMALINK
The New Yorker
“In July, 2019, the Galois team, with Dodds as its lead programmer, successfully rendered Benaloh’s math as a software package that other developers could use to integrate end-to-end verification into actual voting systems. To facilitate its adoption by venders, ElectionGuard was uploaded to GitHub, a Microsoft-owned online repository for open-source software. Open source allows anyone […]
PERMALINK
WIRED
The Oregon-based verifiable systems firm Galois is designing the voting system. And Darpa wants you to know: Its endgame goes way beyond securing the vote. The agency hopes to use voting machines as a model system for developing a secure hardware platform—meaning that the group is designing all the chips that go into a computer […]
PERMALINK
Dark Reading
“We are providing the source code specifications, tests, and actually even providing participants at DEF CON with an easy way of actually putting their own malicious software into [the devices],” explains Daniel Zimmerman, principal researcher with Galois, a DARPA contractor working on the project. “We’re not daring them but actually helping them break this.”
PERMALINK
NPR
In an effort to improve confidence in elections, Microsoft announced Monday that it is releasing an open-source software development kit called ElectionGuard that will use encryption techniques to let voters know when their vote is counted. It will also allow election officials and third parties to verify election results to make sure there was no […]
PERMALINK
National Defense Magazine
From the article: The CAVES program employs automated reasoning to identify central problems in cryptographic designs early in the design phase, he said. “If you’re exploring a wide variety of possible algorithms … you will quickly rule out the ones that might have security issues,” he added. “You get the benefits of higher security and […]
PERMALINK
Embedded.com
“As embedded software developers, the tools we rely on must provide us with low-level control of the functionality and performance of the systems we build. There must be an ability to manipulate hardware registers to write device drivers, and we must be certain that no runtime system will interrupt our tasks and lead to missed […]
PERMALINK
Government Computer News
Kiniry is leading a team that has just been awarded a $4.5 million contract from the Defense Advanced Research Projects Agency to develop tools and methodologies for designing secure CPUs. The project — Balancing Evaluation of System Security Properties with Industrial Needs (BESSPIN) — will develop security metrics and a framework for making decisions about […]
PERMALINK
Government Computer News
Once the suite of tools has been developed and tested, Galois aims to help integrate the workbench into government security frameworks. The company also plans to provide the workbench to industry partners that develop their own encryption software.
PERMALINK
Security Boulevard
By David Archer: “An organization evaluating blockchain technology for an application should look deeply at what it needs from such a technology. What do you need a blockchain to do? Are there other, simpler ways to accomplish those ends? When it comes to technology, simpler (and less costly) is almost always better if it meets […]
PERMALINK