Amir Rahmati

Amir Rahmati, Assistant Professor at Stony Brook University, discusses his work on IoT security.

“There is currently a huge cat and mouse game being played with new attacks and new defenses being designed every day. We need to go back to the basics and figure out what the fundamental properties that allow these attacks to design better defenses.”

Dawn Song

Dawn Song is a Professor at University of California, Berkeley and CEO of Oasis Labs, a blockchain startup.

“We are at such an early stage and don’t know how to ensure security properties of machine learning systems. Going forward, we will have AI and machine learning to help us make increasingly important decisions that range from financial services to governance to home robots to manufacturing to self-driving cars and so on.”

Mike Dodds

Mike Dodds, Principal Scientist at Galois, elaborates on how formal verification can be used to make systems more secure.

“Software, in general, is regrettably unreliable, and the formal verification can give you strong guarantees that your software really does what you want and that you’re not going to end up being surprised by unwanted bad behavior.”

Clark Wood

Clark Wood is a second-year Master’s student within the Technology Policy Program at MIT and founder of Intafel. Clark speaks about his previous work on the DARPA Cyber Grand Challenge and current forays into technology policy.

“Transitioning to policy is an attempt to have more immediate impact, particularly because science and technology is hard and it’s especially hard to advocate for.”

Hang Hu

Hang Hu shares his work on various anti-spoofing projects as a PhD student at Virginia Tech.

“The biggest threat to email spoofing is using spear-phishing. Normal phishing attempts try to get at your password. Spear phishing targets just you or your company.”

Kathleen Fisher

Kathleen Fisher is a Professor in and the Chair of the Computer Science Department at Tufts. She shares her experience on programming languages, formal verification, and security.

“Right now formal methods are good for verifying a hundred thousand lines of code but beyond that it’s outside the scope of what the techniques could do. In those settings, a hundred thousand lines of code gets you a long way toward having a much more secure system.”

Introduction

Technology is dissipating into the fabric of society and is no longer just an industry but a mode of implementation through which every industry is being shaped. As technology integrates with increasing facets of our lives, we must take a more holistic approach to security and privacy. With this series, it is our hope to…