-
Solutions
-
Researching, developing, and transitioning advances in separation architectures, model-based system engineering, and mathematical analysis.
- Safety & Security AnalysisAnalyze system models for gaps in safety and security compliance, and generate documentation to support certification requirements.
- Real-time Operating System SchedulingProvide end-to-end, system-wide schedulabilty analysis, and generate real-time operating system (RTOS) schedules and configuration information
- Embedded System Tradespace AnalysisSupport least-commitment design strategies by continuously evaluating embedded system design alternatives against diverse requirements.
- Isolation TechnologyEnable virtual security enclaves within a single physical server
-
-
Initiatives
-
What’s next: Innovative research examining hard problems of national importance.
- Weird MachinesAnticipating vulnerabilities related to computer systems that employ artificial intelligence
- Education InnovationDelivering game-based education to adolescents and young adults
- Automated Behavior AnalysisDetecting vulnerabilities in embedded systems using timed automata (VOLTA)
- Code GenerationAutomating the integration of cyber-resilient components in complex systems
-
- About Us
Countering Inside Threat Actors in Algorithm-Based Media
Countering Inside Threat Actors in Algorithm-Based Media
Abstract
The risks of insider threats and social media disinformation have independently received much attention in recent years. Missing from the conversation is discussion of insider threats inside social media organizations. This paper considers the risks of insider threats in social media organizations and proposes ZK-Sedai, an approach leveraging current and evolving techniques for zero-knowledge verifiable computing that will grant consumers verifiable evidence of fairness on the part of social media organizations without requiring undue exposure of proprietary organizational information.
Year of Publication
2018
Source
2018 IEEE International Conference on Big Data