Security

A Blockchain Architecture for the Internet of Things

The promise of the Internet of Things: This integration should ideally map to a decentralized hardware and software platform.

Continue reading

The Adversarial Robustness Toolbox v0.3.0: Closing the Backdoor in AI Security

A new release of the Adversarial Robustness Toolbox provides a method for defending against poisoning and "backdoor" attacks in machine learning models.

Continue reading

The Adversarial Robustness Toolbox: Securing AI Against Adversarial Threats

Recent years have seen tremendous advances in the development of artificial intelligence (AI). Modern AI systems achieve human-level performance on cognitive tasks such as recognizing objects in images, annotating videos, converting speech to text, or translating between different languages. Many of these breakthrough results are based on Deep Neural Networks (DNNs). DNNs are complex machine […]

Continue reading

Elegant, Disgusting Cryptography

“The prettiest thing I had ever seen” is not how IBM researcher Shai Halevi describes the beaches in Israel where he grew up. Or the sunset after a long day of hiking in Mitzpe Ramon desert. Rather, he saves these words to describe the first time he saw a cryptographic equation as an undergrad student. […]

Continue reading

Dr. Richard L. Garwin, The Problem-Solver

“I’m not a philosopher. I’m a physicist and a technician…you have ideas or you see needs and you think about them. Mostly I’ve done that.” That’s how IBM Fellow Emeritus and former IBM Researcher Richard L. “Dick” Garwin humbly sums up his career as one of the most influential scientists and researchers of his time, […]

Continue reading

Security intelligence

Special Issue of the IBM Journal of Research and Development Cybersecurity is among the most important and pressing challenges of our times. The inadequacy of perimeter-based security controls in protecting enterprises is demonstrated in the increase in the scale, scope, and frequency of cyber-attacks confronting enterprises today. As noted by guest editor and IBM Fellow […]

Continue reading

Career spotlight: Meet Cindy Eisner, cyber-detective

Since she was a child, Cindy Eisner, a senior technical staff member at IBM Research – Haifa, has loved watching whodunit detective shows on TV and reading suspense thrillers. Today, as an expert in malware evasion techniques, she tries to figure out how the bad guys are avoiding detection as they try to hack our […]

Continue reading

It’s always harder to hack a moving target

This blog post was authored by Ayman Jarrous and Fady Copty, research staff members at IBM Research – Haifa. When it comes to hacking, there are always new techniques being used by both us good guys who work in security, and the bad guys who are trying to exploit system vulnerabilities. Today’s tools are getting […]

Continue reading

Delivering financial services via blockchain

Have you recently bought a house, or sold shares in a company, or maybe sent money overseas? If so, I suspect that the experience has left you wondering why these simple transactions take so much time and cost so much money. In each case, what looks like a simple financial transaction takes place over many […]

Continue reading

Protecting personal data using the Cloud

Today on Data Privacy Day, IBM is announcing an innovative cloud-based technology for developers to help consumers better protect their personal data online such as their date of birth, home address and credit card numbers. As cybersecurity threats and identity theft continue to threaten both consumers and businesses, IBM scientists have been developing a clever […]

Continue reading