KAUST professors Roberto Di Pietro and Marc Dacier co-authored a paper on cybersecurity strategies for Saudi Arabia and the Arab world, published in Communications of the ACM. The paper outlines a multidisciplinary framework for digitization aligned with Saudi Vision 2030, emphasizing global best practices, cultural adaptation, and capacity building. KAUST is positioned to advise on national cybersecurity policy in cooperation with the Saudi National Cybersecurity Authority. Why it matters: The framework addresses the critical need for advanced cybersecurity to support Saudi Arabia's rapidly growing digital economy and infrastructure.
The Digital Science Research Center (DSRC) has appointed Prof. David Naccache to its Board of Advisors for the Digital Security Unit. Prof. Naccache's experience includes cryptography and security, with prior roles at École Normale Supérieure (ENS) and Gemplus. He will provide external research assessment and foster collaboration between TII, ENS, RUHL and ULux. Why it matters: The appointment strengthens DSRC's digital security research capabilities through Prof. Naccache's expertise and academic network.
Researchers at ETH Zurich have formalized models of the EMV payment protocol using the Tamarin model checker. They discovered flaws allowing attackers to bypass PIN requirements for high-value purchases on EMV cards like Mastercard and Visa. The team also collaborated with an EMV consortium member to verify the improved EMV Kernel C-8 protocol. Why it matters: This research highlights the importance of formal methods in identifying critical vulnerabilities in widely used payment systems, potentially impacting financial security for consumers in the GCC region and worldwide.
KAUST researchers have designed an integrated circuit logic lock to protect electronic devices from cyberattacks. The protective logic locks are based on spintronics and can be incorporated into electronic chips. The lock uses a magnetic tunnel junction (MTJ) where the keys are stored in tamper-proof memory, ensuring hardware security. Why it matters: This hardware-based security feature could significantly increase confidence in globalized integrated circuit manufacturing, protecting against counterfeiting and malicious modifications.
Cybersecurity specialist James Lyne spoke at KAUST's 2018 Winter Enrichment Program (WEP) about cybersecurity threats and techniques. Lyne demonstrated hacking and phishing attacks, emphasizing how hackers can exploit personal information by bypassing basic security measures. He highlighted the increasing sophistication of cybercriminals and the existence of illicit marketplaces on the dark web where hacking applications are sold. Why it matters: Raising awareness of cybersecurity threats is crucial for protecting individuals and organizations in Saudi Arabia and the broader region as digital infrastructure expands.
KAUST is addressing the cybersecurity skills gap in Saudi Arabia through programs like the Cybersecurity Specialization program in partnership with the National Cybersecurity Authority. KAUST alumnus Jameel Showail emphasizes the growing need for qualified Saudi cybersecurity professionals due to national security concerns and increasing digitization. He highlights that cybersecurity is crucial for protecting against AI-related threats and ensuring data integrity. Why it matters: As Saudi Arabia rapidly digitizes and integrates AI, KAUST's role in developing local cybersecurity talent becomes increasingly vital for safeguarding critical systems and data.
Researchers from KAUST, University of St. Andrews, and the Center for Unconventional Processes of Sciences have developed an uncrackable security system using optical chips. The system uses silicon chips with complex structures that are irreversibly changed to send information, achieving "perfect secrecy" through a one-time key. This method leverages classical physics and the second law of thermodynamics to ensure that keys are never stored, communicated, or recreated, making interception impossible. Why it matters: This breakthrough has the potential to revolutionize communications privacy globally, offering an unbreakable method for securing confidential data on public channels.
Professor Mike Scott will present a seminar at the Technology Innovation Institute's Cryptography Research Centre in the UAE. The seminar will focus on the challenges of keeping secrets safe from attackers in the context of cryptography. It will review proposed solutions, discuss use cases, and present a promising new approach. Why it matters: This seminar indicates TII's ongoing research and development efforts in advanced cryptography, a crucial area for secure digital infrastructure in the UAE and beyond.