Skip to content
GCC AI Research

Search

Results for "Trusted Computing"

TII Unveils UAE’s First Secure Cloud Technologies Programme

TII ·

Technology Innovation Institute (TII) in Abu Dhabi has launched the UAE’s first secure cloud technologies programme via its Cryptography Research Center (CRC). The program will focus on advancing Privacy Enhancing Technologies (PETs) like fully homomorphic encryption (FHE) and secure multi-party computation (MPC). TII researchers are also developing hardware accelerators to improve the efficiency of FHE. Why it matters: The initiative addresses growing security and privacy challenges in cloud computing, positioning the UAE as a leader in advanced cryptographic solutions for data protection.

TII’s SSRC joins Confidential Computing Consortium

TII ·

Technology Innovation Institute’s (TII) Secure Systems Research Center (SSRC) has joined the Confidential Computing Consortium (CCC). The CCC aims to accelerate the adoption of confidential computing through hardware-based Trusted Execution Environment (TEE) technologies. SSRC will contribute to standardizing hardware-level security capabilities, particularly for secure RISC-V solutions. Why it matters: This partnership strengthens the UAE's position in cyber-physical systems security by enhancing data protection during processing, an area often overlooked in conventional infrastructure.

Towards Trustworthy AI: From High-dimensional Statistics to Causality

MBZUAI ·

Dr. Xinwei Sun from Microsoft Research Asia presented research on trustworthy AI, focusing on statistical learning with theoretical guarantees. The work covers methods for sparse recovery with false-discovery rate analysis and causal inference tools for robustness and explainability. Consistency and identifiability were addressed theoretically, with applications shown in medical imaging analysis. Why it matters: The research contributes to addressing key limitations of current AI models regarding explainability, reproducibility, robustness, and fairness, which are crucial for real-world applications in sensitive fields like healthcare.

SSRC’s Suresh Sugumar completes one year as Chair of RISC-V Trusted Computing Group (TCG) Special Interest Group (SIG)

TII ·

Suresh Sugumar from TII's Secure Systems Research Center (SSRC) has completed a year as Chair of the RISC-V Trusted Computing Group (TCG) Special Interest Group (SIG). The RISC-V TCG SIG is focused on defining trusted computing strategies for RISC-V, including confidential computing and trusted execution environments. SSRC's contribution to the SIG team supports zero-trust security and aims to boost the UAE's economic development. Why it matters: This leadership role for a UAE-based researcher highlights the country's growing influence in shaping open-source hardware security standards and contributing to global technological advancements.

SSRC Joins Forces with UNSW to Fortify Systems, Prevent Hacking

TII ·

The Secure Systems Research Center (SSRC) has partnered with the University of New South Wales (UNSW Sydney) to research enhancements and scaling of the seL4 microkernel on edge devices. The collaboration aims to extend the seL4 microkernel to support dynamic virtualization, combining minimal trusted computing base with strong isolation. This will address challenges related to heterogeneous hardware, software, and environmental factors in edge computing. Why it matters: This partnership aims to improve the security of edge devices in critical sectors, addressing vulnerabilities in cyber-physical and autonomous systems.

Trustworthiness Assurance for Autonomous Software Systems in the AI Era

MBZUAI ·

Dr. Youcheng Sun from the University of Manchester presented on ensuring the trustworthiness of AI systems using formal verification, software testing, and explainable AI. He discussed applying these techniques to challenges like copyright protection for AI models. Dr. Sun's research has been funded by organizations including Google, Ethereum Foundation, and the UK’s Defence Science and Technology Laboratory. Why it matters: As AI adoption grows in the GCC, ensuring the safety, dependability, and trustworthiness of these systems is crucial for public trust and responsible innovation.

CRC Seminar Series - Jose Maria Bermudo Mera

TII ·

The National Institute of Standards and Technology (NIST) has been evaluating Post-Quantum Cryptography proposals since 2017. Lattice-based schemes have emerged as efficient candidates for Key Encapsulation Mechanisms (KEM) and Digital Signatures. This talk will cover the core operations within lattice-based schemes and efficient implementation strategies. Why it matters: As quantum computing advances, exploring and standardizing post-quantum cryptography is crucial for maintaining secure communication and data protection in the future.

Hard to crack hardware

KAUST ·

KAUST researchers have designed an integrated circuit logic lock to protect electronic devices from cyberattacks. The protective logic locks are based on spintronics and can be incorporated into electronic chips. The lock uses a magnetic tunnel junction (MTJ) where the keys are stored in tamper-proof memory, ensuring hardware security. Why it matters: This hardware-based security feature could significantly increase confidence in globalized integrated circuit manufacturing, protecting against counterfeiting and malicious modifications.