Rethinking Hardware for Cryptography, Security, and Privacy

Modern computers run on top of complex processors, but complexity is the worst enemy of security. Scientists and engineers have consistently tried to develop secure software systems for decades. However, my work shows that new classes of vulnerabilities in complicated processors can break the security guarantees provided by software systems, cryptographic protocols, and privacy technologies. In this talk, I will give an overview of my work on discovering, evaluating, and mitigating such vulnerabilities. First, I will talk about side-channel attacks on cryptographic implementations.

Perception and Computational Efficiency for Autonomous Vehicles

The computer science departments at Duke University, North Carolina State University, and the University of North Carolina at Chapel Hill joined forces to create the Triangle Computer Science Distinguished Lecturer Series, which began in the 1995-1996 academic year and rotates among the departments.

This is a hybrid event. It will take place virtually on Zoom and also in-person at 011 Sitterson Hall / Dept of Computer Science / UNC-CH / 201 S. Columbia St. Chapel Hill, NC 27599-3175.


MEM Seminar: Elaine McVey, The Looma Project

Elaine McVey is the VP and Director of Data Science at The Looma Project, which connects shoppers to the people and stories behind food & beverage products. She is a leader focused on making sure data initiatives deliver business value. Previously, she served as Director of Decision Sciences and Director of Quantitative Mobility at TransLoc, Senior Data Scientist at MaxPoint, and Senior Statistician at BD. Elaine has a MS in Statistics from NC State and a BA in Neuroscience from Amherst College.

From Verification to Synthesis of Differentially Private Mechanisms with Randomness Alignment

Differential privacy has become a de facto standard for extracting information from a dataset while protecting the confidentiality of individuals whose data are collected. It has been increasingly adopted in industry and the public sector. Crucial to any differentially private system is a set of privacy mechanisms, the building blocks of larger privacy-preserving algorithms. Those privacy mechanisms inject randomness into non-private computations in order to ensure privacy protections.

Policy Perspectives: Building Climate-Resilient Infrastructure at Home and Abroad

As climate change accelerates, its harmful consequences will only continue to increase and intensify. We can expect extreme weather events (like droughts, flooding, hurricanes, and wildfires), as well as chronic, dispersed threats (including sea level rise, air quality, food insecurity, and loss of natural ecosystems and wildlife). Enhancing the ways in which our social and ecological systems can withstand, respond to, and recover from these stresses and shocks is critical.

ECE SEMINAR: Batteries Not Included: Reimagining Computing for the Next Trillion Devices

In this talk, I'd like to upend the notion that a computing system needs reliable power to support useful computation, sensing, and interaction. For decades, typical computing systems have generally assumed stable, reliable power from a battery or wall outlet. All our smart devices (i.e., wireless sensing and computing systems), from FitBits to Game Boys, have been powered by batteries. This is a problem: batteries are bulky, expensive, high-maintenance, and not sustainable for the next trillion devices.

No Code, No Problem: Tech jobs that don't require coding skills

There's more to tech jobs than just coding. If you've ever considered working in the tech industry but are unsure what job roles are available, this event is for you! Whether you're a CS major who doesn't want to code for the rest of their career or, someone who just loves tech you will leave with information and occupations to consider.

Select More Event Information below to register in Handshake

Ready for Launch - Space Diplomacy Lab: Media Perspectives on Challenges of the Next Year in Space

With the recent proliferation of countries and companies with access to low earth orbit (and beyond), a host of geopolitical and geoeconomic issues have arisen which require diplomacy informed by sound science and technology analysis. Space Diplomacy needs to consider the involvement of multiple nation-state and private sector actors, burgeoning space infrastructure and satellite internet service providers, launch and space junk scenarios, and deep space regulatory and extractive industry issues.