Portland, OR – December 07, 2015 – Galois today announced that its Jana project has been selected for the Defense Advanced Research Projects Agency (DARPA) Brandeis program – an ambitious effort to unlock the full potential of big data while protecting the privacy of data as it is shared and analyzed across the government, enterprise and […]
Amid growing concerns that IoT devices are inherently vulnerable to attacks that could compromise users’ information privacy and security, Galois today announced that it has been awarded a $1.86 million NIST National Strategy for Trusted Identities in Cyberspace (NSTIC) grant to build a secure data storage system that enables next-generation IoT capabilities without sacrificing privacy. Galois’ authentication and mobile security subsidiary, Tozny, will serve as the technical lead for the NSTIC pilot program.
The newest version of Android (Android 6.0 Marshmallow) introduces a significant change in the way mobile apps handle permissions – a change that can cause applications to crash if developers do not test to see if the apps handle permissions properly. To address this app crash risk, Galois today announced the release of Fuse Analyzer: Permissions – a new tool capability that will, among other things, enable Android developers to pinpoint the changes they need to make, for their apps to work on Android 6 properly. Fuse Analyzer is part of Galois’ DARPA-funded tool developed for security analysts to evaluate Android app security.
Dr Joseph Kiniry, Galois’s election systems expert, will be speaking before the Elections Commission of San Francisco today on open source software and the benefits it will bring to elections technology. Dr. Kiniry will also touch on the barriers that have kept open software from manifesting in the elections world until now. The Elections Commission […]
Dr. Aaron Tomb, research lead in Software Correctness at Galois, delivered the invited talk last Friday, Sept 25, 2015 at SAT 2015, the International Conference on Theory and Applications of Satisfiability Testing. In the talk Dr. Tomb walked through the properties of cryptographic code that are within the reach of existing solvers, and described some of the tools in applying SAT solvers to cryptographic algorithms.