Menu

Blog

Archive for the ‘security’ category: Page 78

May 30, 2020

TSA says an airport full-body scanner must add a filter to protect travelers’ privacy

Posted by in categories: security, transportation

Circa 2019


A full-body scanner that the Transportation Security Administration hopes can speed up airport security checkpoints must go back to the drawing board for software to protect the privacy of travelers being scanned.

The scanner, built by British firm Thruvision, was promoted as being able to simultaneously screen multiple airport passengers from a distance of up to 25 feet away. The TSA began trying out the device last year at an Arlington, Va., testing facility before planning to use it on a trial basis at U.S. airports.

Continue reading “TSA says an airport full-body scanner must add a filter to protect travelers’ privacy” »

May 30, 2020

Manufacturing-friendly SiC boasts quantum credentials at telecom wavelengths

Posted by in categories: particle physics, quantum physics, security

Decoherence is the bane of quantum technologies. In coherent systems, the phase of the wave functions representing the quantum states of particles in the system have definite relations between each other. This allows quantum devices to operate in a meaningful way that differs from classical devices. However, interacting with the world around us rapidly leads to decoherence, which makes it harder to exploit quantum effects for enhancing computation efficiency or communication security. Research has shown that quantum systems with impressively long coherence times are possible in diamond, but diamond is far from the favorite for manufacturers. Now, researchers at the University of Science and Technology in Hefei and Wuhan University in China have demonstrated SiC can boast some of the quantum merits of diamond with the additional advantage of optical control at the wavelengths used by the telecommunications industry.

The defects prized for quantum technologies are nitrogen-vacancy (NV) centers, in which a carbon atom in diamond is replaced by a nitrogen with a missing carbon at the neighboring crystal lattice site. What makes this kind of defect interesting for quantum technologies is that you can control its states with light and produce photon-spin entanglement with long coherence times, even at room temperature. The difficulties arise when trying to position the technology in the real world as opposed to the lab. The photon-spin interactions for NV centers in diamond need light at visible wavelengths—telecommunications wavelengths are much longer. In addition, these finely engineered devices need to be hacked out of one of the hardest (and most expensive) materials known to man, one that industry does not have established nanofabrication protocols for.

It turns out there are types of defects in SiC that might also be useful for quantum technologies. SiC is widely used in power electronics, so commercially viable avenues for producing SiC devices already exist. Over the past 10 years, vacancies and divacancies (where one or a pair of atoms in the lattice are absent) in SiC began to attract interest when researchers learned that they could also control their spin states with light at room temperature with long coherence times. The observation of NV centers in SiC really piqued interest, as these were optically active at the wavelengths used by the telecommunications industry as opposed to the shorter visible wavelengths needed to control the spin states of vacancies and divacancies in SiC.

May 29, 2020

Quantum-Resistant Cryptography: Our Best Defense Against An Impending Quantum Apocalypse

Posted by in categories: computing, encryption, information science, quantum physics, security

As far back as 2015, the National Institute of Standards and Technology (NIST) began asking encryption experts to submit their candidate algorithms for testing against quantum computing’s expected capabilities — so this is an issue that has already been front of mind for security professionals and organizations. But even with an organization like NIST leading the way, working through all those algorithms to judge their suitability to the task will take time. Thankfully, others within the scientific community have also risen to the challenge and joined in the research.

It will take years for a consensus to coalesce around the most suitable algorithms. That’s similar to the amount of time it took ECC encryption to gain mainstream acceptance, which seems like a fair comparison. The good news is that such a timeframe still should leave the opportunity to arrive at — and widely deploy — quantum-resistant cryptography before quantum computers capable of sustaining the number of qubits necessary to seriously threaten RSA and ECC encryption become available to potential attackers.

The ongoing development of quantum-resistant encryption will be fascinating to watch, and security professionals will be sure to keep a close eye on which algorithms and encryption strategies ultimately prove most effective. The world of encryption is changing more quickly than ever, and it has never been more important for the organizations dependent on that encryption to ensure that their partners are staying ahead of the curve.

May 29, 2020

DARPA Selects Teams to Increase Security of Semiconductor Supply Chain

Posted by in categories: computing, economics, internet, security

As Internet of Things (IoT) devices rapidly increase in popularity and deployment, economic attackers and nation-states alike are shifting their attention to the vulnerabilities of digital integrated circuit (IC) chips. Threats to IC chips are well known, and despite various measures designed to mitigate them, hardware developers have largely been slow to implement security solutions due to limited expertise, high cost and complexity, and lack of security-oriented design tools integrated with supporting semiconductor intellectual property (IP). Further, when unsecure circuits are used in critical systems, the lack of embedded countermeasures exposes them to exploitation. To address the growing threat this poses from an economic and national security perspective, DARPA developed the Automatic Implementation of Secure Silicon (AISS) program. AISS aims to automate the process of incorporating scalable defense mechanisms into chip designs, while allowing designers to explore chip economics versus security trade-offs based on the expected application and intent while maximizing designer productivity.

Today, DARPA is announcing the research teams selected to take on AISS’ technical challenges. Two teams of academic, commercial, and defense industry researchers and engineers will explore the development of a novel design tool and IP ecosystem – which includes tool vendors, chip developers, and IP licensors – allowing, eventually, defenses to be incorporated efficiently into chip designs. The expected AISS technologies could enable hardware developers to not only integrate the appropriate level of state-of-the-art security based on the target application, but also balance security with economic considerations like power consumption, die area, and performance.

“The ultimate goal of the AISS program is to accelerate the timeline from architecture to security-hardened RTL from one year, to one week – and to do so at a substantially reduced cost,” said the DARPA program manager leading AISS, Mr. Serge Leef.

May 28, 2020

A new scheme for satellite-based quantum-secure time transfer

Posted by in categories: encryption, quantum physics, satellites, security

Researchers at the University of Science and Technology of China have recently introduced a new satellite-based quantum-secure time transfer (QSTT) protocol that could enable more secure communications between different satellites or other technology in space. Their protocol, presented in a paper published in Nature Physics, is based on two-way quantum key distribution in free space, a technique to encrypt communications between different devices.

“Our main idea was to realize quantum-secure time transfer in order to resolve the in practical time–frequency transfer,” Feihu Xu, one of the researchers who carried out the study, told Phys.org.

Quantum key distribution (QKD) is a technique to achieve secure communication that utilize based on the laws of quantum mechanics. Quantum protocols can generate secret security keys based on , enabling more secure data transfer between different devices by spotting attackers who are trying to intercept communications.

May 26, 2020

Samsung develops new security chip for smartphones

Posted by in categories: computing, mobile phones, security

Samsung has launched a new secure element (SE) chip to protect private and sensitive data on mobile devices, the company said on Tuesday.

The chip, dubbed S3FV9RR, will be offered as a standalone turnkey with security software, Samsung said.

Common Criteria, which certifies the security level of IT products from EAL0 to EAL7 with seven being the most secure, gave the security chip a Common Criteria Evaluation Assurance Level (CC EAL) 6+ certification.

May 23, 2020

Critical “Starbleed” vulnerability in FPGA chips identified

Posted by in categories: computing, encryption, mobile phones, security

April 2020


Field programmable gate arrays, FPGAs for short, are flexibly programmable computer chips that are considered very secure components in many applications. In a joint research project, scientists from the Horst Görtz Institute for IT Security at Ruhr-Universität Bochum and from Max Planck Institute for Security and Privacy have now discovered that a critical vulnerability is hidden in these chips. They called the security bug “Starbleed.” Attackers can gain complete control over the chips and their functionalities via the vulnerability. Since the bug is integrated into the hardware, the security risk can only be removed by replacing the chips. The manufacturer of the FPGAs has been informed by the researchers and has already reacted.

The researchers will present the results of their work at the 29th Usenix Security Symposium to be held in August 2020 in Boston, Massachusetts, U.S… The has been available for download on the Usenix website since April 15, 2020.

Continue reading “Critical ‘Starbleed’ vulnerability in FPGA chips identified” »

May 21, 2020

The key points of the national security law for Hong Kong

Posted by in categories: law, security

China’s legislators will discuss a new national security law specifically crafted for Hong Kong. The issue has long been controversial in the city, despite the Basic Law requiring its enactment.

May 21, 2020

Laser-based technique captures 3D images of impressionist-style brushstrokes

Posted by in categories: media & arts, security

Researchers have developed a new strategy that uses optical coherence tomography (OCT) to acquire both the surface and underlying details of impressionist style oil paintings. This information can be used to create detailed 3D reconstructions to enhance the viewing experience and offer a way for the visually impaired to experience paintings.

“Visitors to art museums can’t closely examine paintings and see the artists’ techniques because of security and conservation concerns,” said research team leader Yi Yang from Penn State Abington. “Our new technology can create 3D reconstructions that can be rotated and magnified to view details such as brushstrokes. This would be especially useful for online classes.”

Yang and colleagues from Penn State University Park and New Jersey Institute of Technology report the new technique in the Optical Society journal Applied Optics. The research team brought together specialists in art history and conservation with electrical and optical engineers.

May 19, 2020

Technology In A Time Of Crisis: How DARPA And AI Are Shaping The Future

Posted by in categories: bioengineering, biotech/medical, health, information science, policy, robotics/AI, security

Then there is the COVID-19 Open Research Dataset (CORD-19), a multi-institutional initiative that includes The White House Office of Science and Technology Policy, Allen Institute for AI, Chan Zuckerberg Initiative (CZI), Georgetown University’s Center for Security and Emerging Technology (CSET), Microsoft, and the National Library of Medicine (NLM) at the National Institutes of Health (NIH).

The goal of this initiative is to create new natural language processing and machine learning algorithms to scour scientific and medical literature to help researchers prioritize potential therapies to evaluate for further study. AI is also being used to automate screening at checkpoints by evaluating temperature via thermal cameras, as well as modulations in sweat and skin discoloration. What’s more, AI-powered robots have even been used to monitor and treat patients. In Wuhan, the original epicenter of the pandemic, an entire field hospital was transitioned into a “smart hospital” fully staffed by AI robotics.

Any time of great challenge is a time of great change. The waves of technological innovation that are occurring now will echo throughout eternity. Science, technology, engineering and mathematics are experiencing a call to mobilization that will forever alter the fabric of discovery in the fields of bioengineering, biomimicry and artificial intelligence. The promise of tomorrow will be perpetuated by the pangs of today. It is the symbiosis of all these fields that will power future innovations.

Page 78 of 142First7576777879808182Last