Learn more about UC TechAlerts – Subscribe to categories and get notified of new UC technologies

Browse Category: Security and Defense > Cyber security

Categories

[Search within category]

Multi-Wavelength, Nanophotonic, Neural Computing System

Researchers at the University of California, Davis have developed a multi-wavelength, Spiking, Nanophotonic, Neural Reservoir Computing (SNNRC) system with high-dimensional (HD) computing capability.

Lambda-Reservoir Computing

UCLA researchers in the Department of Electrical and Computer Engineering have developed a Spectral Reservoir Computer that processes data using nonlinear optical interactions.

System For Eliminating Clickbaiters On Visual-Centric Social Media

Researchers from the Department of Communication at UCLA have developed a system for identifying and eliminating clickbait from social media.

Privacy Preserving Stream Analytics

UCLA researchers in the Department of Computer Science have developed a new privacy preserving mechanism for stream analytics.

Polarization mode dispersion-based physical layer key generation for optical fiber link security

Researchers at UCI have developed a novel method for encrypting optical communications, which is simpler, less expensive, and less computationally-demanding than standard solutions.

Security Key Generation Technique for Inter-Vehicular Visible Light Communication

The invention is a technique that provides a novel, reliable and secure cryptography solution for inter-vehicular visible light communication. Through combining unique data as the road roughness and the driving behavior, a symmetric security key is generated for both communicating vehicles. As the data used is unique to the communicating vehicles only, the generated keys are thus unique, securing a reliable communication channel between both vehicles.

DeepSign: Digital Rights Management in Deep Learning Models

As society becomes more and more complicated, we have also developed ways to analyze and solve some of these complexities via the convergence of the fields of artificial intelligence, cognitive science and neuroscience. What has emerged is the development of machine learning, which allows computers to improve automatically through experience. Thus, developers working on artificial intelligence (AI) systems have come forth to align AI with machine-learning algorithms to cover a wide variety of machine-learning problems. The most advanced of these are called supervised learning methods which form their predictions via learned mapping, which can include decision trees, logistic regression, support vector machines, neural networks and Bayesian classifiers. More recently, deep networks have emerged as multilayer networks involved in a number of applications, such as computer vision and speech recognition. A practical concern in the rush to adopt AI as a service is the capability to perform model protection: AI models are usually trained by allocating significant computational resources to process massive amounts of training data. The built models are therefore considered as the owner’s intellectual property (IP) and need to be protected to preserve the competitive advantage.

Multifaceted III-Nitride Surface-Emitting Laser

Improved laser capability using III-Nitride VCSELs as the illumination source for sensing applications of a fluorescent sample.

Librando: Transparent Code Randomization For Just-In-Time Compilers

Just-in-time compilation is a method of executing computer code which, while boasting superior execution times, is prone to security exploits. UCI researchers have developed librando, a software framework for increasing security for just-in-time compilers, ensuring that generated program code is not predictable to an attacker.

Value-Based Information Flow Tracking in Software Packages

A collaboration between UCLA and Rutgers have developed a novel information flow tracking technique to detect potential data leaks in mobile devices.

A Technique For Securing Key-Value Stores Against Malicious Servers

The advent of the Internet of Things (IoT) has drastically increased the potential scale and scope of destruction hackers can cause. Cloud servers now control and monitor devices such as cars, smart home controls, fitness trackers, medical monitoring systems. These cloud-based devices are at risk, however, in that if they become compromised, third parties could gain full control of all devices and stored information associated with that server. UCI researchers have developed the FIDELIUS system, a technique for secure communication and information storage.

Detecting Malicious Http Users Using The Community Structure Property In Interaction Graph

Background: Wealth is being transferred into the hands of malicious cybercriminals with an estimated annual global cost of $445B from Intellectual Property (IP) theft. The security industry needs to rapidly progress to keep up with the ever more innovating cybercrimes. Due to the inadequacy of traditional security scanning software, we need a better method that is proficient in detecting perpetrators before they gain access to confidential information.  Brief Description: Malicious HTTP scanners scan for vulnerable websites with easy access into private information. UCR researchers created Scanner Hunter, a reconnaissance tool that will enable them to take preemptive measures before actual infiltration occurs. The tool has an innovative approach of filtering HTTP requests and tagging them as malignant or benign. Their dynamic methodology and algorithm successfully achieves its functions with 96.5% accuracy while virtually eliminating all false-positives.

Microfabrication of High Quality 3-D Structures Using Wafer-Level Glassblowing of Fused Quartz and Ultra Low Expansion Glasses

Micro-glassblowing MEMS fabrication process for low expansion and low loss materials

UltraSPI: A Serial Bus Interface to Enable High-Performance and Energy-Efficient Data Logging

This technology features new serial bus interface module for constrained sensor systems.It features better matches flashed-based storage devices read and write performance and augments existing flash-based storage with non-volatile RAM.Additionally, user can enable slave to slave transfer and read caching and buffering while flushing with faster speed and lower energy overhead.

Cacophony: A Framework for Next Generation Software Sensors

The technology is a software architecture for providing robust predictions for software systems from cloud sourced data points. Properties include:the ability to “wrap” existing software sensors with additional services. The technology is used by executing software on a cloud based server and manipulating data points from user update systems, such as Waze, and provide predictive services around these data points.

Cost-Efficient Repair For Cloud Storage Systems Using Progressive Engagement

The technology is a coding process which facilitates efficient data failure recovery in cloud storage systems.It features greater flexibility in choosing subset of storage nodes for recovery and reduces amount of data that must be transferred upon recovery.

Sensor-Assisted Facial Authentication System For Smartphones

Researchers at the University of California, Davis have developed a method using standard mobile device sensors assisting with facial authentication to overcome the limitations faced by current methods.

HCLR: A Hybrid Cross-Layer Routing Protocol For MANETs

Hybrid Routing protocol for more intelligent routing decisions on mobile ad-hoc networks (MANETs).It features leveragesdproactive and reactive routing schemes, a routing table generated globally using existing proactive routing protocol, and locally performed route optimization using on-demand reactive routing protocol.

CMOS Linear Differential Distributed Amplifier and Distributed Active Balun

The technology is a distributed amplifier (and distributed balun) that can be used in broadband communication links.It features a two-stage transconductance stage with single input and dual-output.With this technology, users will see improved overall gain without degrading bandwidth, improving the overall gain-bandwidth product.

Methods To Detect And Respond To Trojan IC Attacks

Researchers at UCLA have developed a novel bus architecture to protect integrated circuit (IC) systems against real-time Trojan attacks, without incurring high cost in terms of bus resources and performances

HDRL: Homogeneous Dual-Rail Logic For DPA Attack Resistive Secure Circuit Design

HDRL (Homogeneous Dual-Rail Logic) is a standard cell level DPA (Differential Power Analysis) attack countermeasure that theoretically guarantees fully-balanced power consumption and has been shown to significantly improve the DPA attack resistivity of hardware with low energy overhead and no delay overhead over conventional countermeasures.

RFID Reader Revocation Checking Using Low Power Attached Displays

A new RFID reader authentication protocol that allows efficient and timely check of revocation status of the reader’s certificate.

A Random Number Generator Based On The Spontaneous Alpha-Decay

The present invention is an apparatus and a method for generation of random numbers. The apparatus comprises an alpha-radiation source, such as Am 241, for which the decay product produces no secondary radiation with the energy equal or higher than that of the prime alpha radiation. The alpha particles emitted by the isotope and having reached the detector have a narrow energy spectrum and, hence, produce identical electrical pulses in a detector. An alpha-particle detection system is provided which includes a differential discriminator in combination with a logical selector. This combination of elements allows a positive identification of individual events of alpha-decay in the alpha-radiation source to be made and filters out any other signals produced by different radiation sources both inside and outside the apparatus. An electronic unit processes the stream of identical electric pulses into a stream of random numbers.

Optimal Routing Protocol Secure against Malicious Adversary

Investigators at UCLA have developed a novel secure routing protocol for data transfer that achieves optimal transfer rate with negligible decoding error even if communication nodes are compromised by a malicious adversary. This advancement will vastly improve internet security and communication safety.

  • Go to Page: