The State of Security
While there are straightforward encryption solutions for data in transit and data at rest, data is usually unencrypted while it is being computed on, leaving it exposed to sophisticated attackers. In this guest blog post on Tripwire’s The State of Security blog, David Archer, research lead at Galois, explores a few methods of computing on data while it remains encrypted that are emerging from academic research and slowly becoming practical.
Permalink
Dr. Aaron Tomb, research lead in Software Correctness at Galois, delivered the invited talk last Friday, Sept 25, 2015 at SAT 2015, the International Conference on Theory and Applications of Satisfiability Testing. In the talk Dr. Tomb walked through the properties of cryptographic code that are within the reach of existing solvers, and described some of the tools in applying SAT solvers to cryptographic algorithms.
Read More
ZDNet
Galois will build a tool that allows users to store and share private information online. The user-centric personal data storage system relies on biometric-based authentication and will be built securely from the ground up. As part of the pilot, Galois will work with partners to develop just-in-time transit ticketing on smart phones and to integrate […]
Permalink
The State of Security
Defending networks is becoming increasingly harder, as adversaries are advancing far quicker than our defense techniques. In this guest blog post on Tripwire’s The State of Security blog, David Archer, research lead at Galois, talks about some of the reasons behind this asymmetry, and gives a few ideas on how network defense might catch up to the agility of attackers.
Permalink
Software Magazine
In this Software Magazine piece, Galois’ Isaac Potoczny-Jones writes about what vendors can do to build cyber security into their products from the start. “Cyber security should not be an afterthought in the software development process; it should be the first thought. As applications, systems and devices increasingly fall victim to hacks, vendors may be tempted to assume that business users and consumers have become desensitized to the problem. That adding two-factor authorization or offering three months of credit monitoring service will somehow wipe the slate clean with no damage done to brand perception, customer growth, and revenues. This is not the case. Building cyber security into the front end of the software development process is critical to ensuring software works only as intended.”
Permalink
This post originally appeared on the Adventium Labs website. Adventium was acquired by Galois in 2022. The Defense Advanced Research Projects Agency (DARPA) has selected Adventium Labs as one of the performers on its Cyber Fault-tolerant Attack Recovery (CFAR) program, worth $5.4M over 42 months if all options are awarded.
Read More
This post originally appeared on the Adventium Labs website. Adventium was acquired by Galois in 2022. Adventium has received a 2-year, $750K Phase 2 NASA SBIR to continue work on its Architecture Framework for Fault Management Assessment And Design (AFFMAD) project.
Read More
KGW
“Any system, as it gets more complex, the likelihood of a weak link in the chain grows,” said Isaac Potoczny-Jones, computer security expert with Galois. “So as cars get these integrated entertainment systems or wireless features, these open up avenues of attack.”
Permalink
Washington Post
Soon after the 2014 midterm election, Kiniry and a fellow researcher published a paper that demonstrated how to hack into the PDF-based Internet voting system used by the state of Alaska.Voters there can choose to download and fill out a PDF ballot form and e-mail it back to the election official. This method has also […]
Permalink