“As embedded software developers, the tools we rely on must provide us with low-level control of the functionality and performance of the systems we build. There must be an ability to manipulate hardware registers to write device drivers, and we must be certain that no runtime system will interrupt our tasks and lead to missed […]
Kiniry is leading a team that has just been awarded a $4.5 million contract from the Defense Advanced Research Projects Agency to develop tools and methodologies for designing secure CPUs. The project — Balancing Evaluation of System Security Properties with Industrial Needs (BESSPIN) — will develop security metrics and a framework for making decisions about […]
Project award by DARPA Microsystems Technology Office (MTO) re-imagines approach to security for design and development of CPUs, smartphone chips, other hardware Galois today announced that it has been awarded a multi-year contract by the Defense Advanced Research Projects Agency (DARPA) Microsystems Technology Office (MTO) to develop tools and methodologies that enable provable security for […]
Once the suite of tools has been developed and tested, Galois aims to help integrate the workbench into government security frameworks. The company also plans to provide the workbench to industry partners that develop their own encryption software.
Open source cryptographic workbench aims to enable cryptographers to more easily meet evolving security needs PORTLAND, Ore., Jan 17, 2018 – Galois today announced that it has been awarded a $2 million contract by the Office of Naval Research (ONR) to build a workbench that aims to ease the design process for cryptographic algorithms. For the […]
We’re thrilled to share that William Harris is joining Galois as Principal Investigator. Dr. Harris was previously an Assistant Professor of Computer Science at Georgia Tech. His work has focused on program verification and synthesis, and software security. For a complete list of his research and activities, see his personal page at gatech.edu. At Georgia […]
By David Archer: “An organization evaluating blockchain technology for an application should look deeply at what it needs from such a technology. What do you need a blockchain to do? Are there other, simpler ways to accomplish those ends? When it comes to technology, simpler (and less costly) is almost always better if it meets […]
Isaac Potoczny-Jones, founder and CEO, Tozny said: “This is an excellent example of how developers make mistakes in implementing cryptography, which undermines the power of those toolkits. Crypto is extremely hard to get right.
“This legislation marks a sea change in the continuing conflict between personal privacy and public good,” said David Archer, principal research scientist at Galois, a computer science firm. “The technology mandated here assures two things: that public policies affecting real people can be decided based on factual data about them, and that the privacy of […]
As secure HTTPS becomes more pervasive, it is worth asking: why should you end-to-end encrypt data when HTTPS is pretty secure? The answer is that HTTPS is an important but small piece of the crypto puzzle. Organizations determining what additional security requirements are needed should start the process by answering a few key questions