• Explore
    • Contact Us
  • Faculty
  • Research
    • Research Areas
    • Research Centers
  • Graduate Degrees
    • Computer Science Programs
    • Current Graduate Students
  • Undergraduate Degrees
  • News & Events
    • News
    • Seminar Series
    • Distinguished Lecture Series
    • Research Showcase
  • Apply Now
    • Undergraduate Admissions
    • Graduate Admissions
    • Faculty Candidates

Circuit Cellar: “The Future of IoT Security” by Ian Harris

March 29, 2016

With the onset of Internet of Things (IoT) technology, an enormous number of devices are now accessible via the Internet and are therefore vulnerable to cyberattack. Society is still adjusting to the fact that devices that people used to trust can now betray them in unexpected ways. Your television may expose your conversations, your printer may divulge your documents, and your fitness monitor may reveal your health information. All of these attacks become possible in the presence of IoT devices which are not designed with security in mind. System designers are trained to evaluate system design options in terms of their impact on system characteristics such as power, performance, and time-to-market, but security is a property which is less well understood. Designers of IoT devices need to have the ability to consider, both qualitatively and quantitatively, how design alternatives affect the security of the system. To do that, designers must understand the essential aspects of common cyberattacks.

Read the full story at Circuit Cellar.

UCI News: “Private practices” (Mehrotra quoted)

January 14, 2016

“We’re trying to study where there’s a trade-off between what you’re willing to share and what you get as a utility,” says computer science professor Sharad Mehrotra. “We want to know if there’s a way to build privacy protections on a layer in between the sensors and the end user.”

Read the full story at UCI News.

Nature: “Artificial intelligence called in to tackle LHC data deluge” (Baldi mentioned)

December 1, 2015

Although they emphasized that they would not be comfortable handing over this level of control to an algorithm, several speakers at the CERN workshop discussed how deep learning could be applied to physics. Pierre Baldi, an AI researcher at the University of California, Irvine who has applied machine learning to various branches of science, described how he and his collaborators have done research suggesting that a deep-learning technique known as dark knowledge might aid — fittingly — in the search for dark matter.

View the full story on the Nature website.

NBC Los Angeles: “Social Media Quizzes Could Give Hackers Access” (Tsudik quoted)

October 29, 2015

“Just like hostages wind up often getting passed around and sold like goods,” said Gene Tsudik, who heads the computer science department at UC Irvine. “This is really a complete takeover of one’s identity,” he said. … “Don’t over share,” Tsudik warned.

View the full story on the NBC Los Angeles website.

AARP: “Digital Entrepreneurs Over 50 In the App World” (Jain quoted)

September 1, 2015

Ramesh Jain got the start-up bug a couple of decades ago. While spending a year at Stanford University as a visiting professor of computer science, he was stunned by the whirlwind of entrepreneurial activity among his fellow professors. “You’re developing something people really can use,” he says. “And it makes you a better researcher.”

Now, Jain, 66, who is a professor at the Bren School of Information and Computer Sciences at the University of California in Irvine, is launching his seventh enterprise, one that, he says, “brings together many concepts and ideas I’ve been researching for the past 20 years.”

Read the full story on the AARP website.

Info Security Magazine: “NSA: Business as Usual” (Tsudik quoted)

August 3, 2015

The USA Freedom Act also curtails some mechanisms already ruled illegal by appellate court, including the direct collection of bulk call metadata directly by the NSA. However, it still leaves the data in the hands of the phone companies, and allows it to be queried by the NSA using targeted selectors.

This worries Gene Tsudik, a professor in the computer science department at the University of California, Irvine. “This stuff represents a treasure trove of information, and an attractive target for attacks,” he says. “I believe that if metadata has to be kept for some time, it is best to split it in a way that neither NSA nor the phone company can make sense of it, without cooperation.”

Read the full story on the Info Security website.

  • « Previous Page
  • 1
  • …
  • 7
  • 8
  • 9

Latest news

  • UCI News: “UCI advances to national cyber defense competition following “historic” regionals win” April 6, 2021
  • Alumni Spotlight: Archana Senthilkumar’s Real-World Education Helps Bring Fictional Worlds to Life April 2, 2021
  • New WICS Mentorship Program Helps High School Girls Explore Computer Science March 31, 2021
  • UCI Health: “A digital prosthetic eye for the 21st century” (Ian Harris mentioned) March 23, 2021
  • UCI’s Computer Science Program Ranked 4th by Best Value Schools March 16, 2021
  • © 2021 UC Regents
  • Feedback
  • Privacy Policy