The challenge that motivates the ANA group is to foster a healthy future for the Internet. The interplay of private sector investment, public sector regulation and public interest advocacy, as well as the global diversity in drivers and aspirations, makes for an uncertain future.
We focus on finding novel approaches to improve the performance of modern computer systems without unduly increasing the complexity faced by application developers, compiler writers, or computer architects.
(This project is no longer active.) The T-1000, a prototype system of a thousand realistic processors embedded throughout an ensemble of interconnected FPGAs, seeks to demonstrate the scalability of timestamp-based cache coherence protocols on distributed shared memory systems.
Our goal is to understand the nature of cyber security arms races between malicious and bonafide parties. Our vision is autonomous cyber defenses that anticipate and take measures against counter attacks.
Alloy is a language for describing structures and a tool for exploring them. It has been used in a wide range of applications from finding holes in security mechanisms to designing telephone switching networks. Hundreds of projects have used Alloy for design analysis, for verification, for simulation, and as a backend for many other kinds of analysis and synthesis tools, and Alloy is currently being taught in courses worldwide.
In order to be able to design synthetic organs that function autonomously, we will need to engineer artificial tissue homeostasis. To control the size of these artificial tissues, two major mechanisms will have to be engineered.
Using AI methods, we are developing an attack tree generator that automatically enumerates cyberattack vectors for industrial control systems in critical infrastructure (electric grids, water networks and transportation systems). The generator can quickly assess cyber risk for a system at scale.
We aim to base a variety of cryptographic primitives on complexity theoretic assumptions. We focus on the assumption that there exist highly structured problems --- admitting so called "zero-knowledge" protocols --- that are nevertheless hard to compute
BlueDBM is an architecture of computer clusters consisting of fast distributed flash storage and in-storage accelerators, which often outperforms larger and more expensive clusters in applications such as graph analytics.
We aim to better understand the features of network protocols that facilitate denial of service attacks, in order to design more robust protocols and architectures in the future and evaluate existing designs more accurately.
Existing methods for cloning and recombination of DNA enable construction of arbitrary sequences. However, the sequential nature of these techniques makes them time-consuming and expensive. Furthermore, while the transformation of an existing plasmid into a host strain can be reliable when a selection marker is used, there are many current limitations: the number of different plasmids that can be co-transformed is limited by the choice of markers and compatible origins of replication; plasmids are less stable than chromosomal DNA and are difficult to maintain indefinitely without mutation; and cistronic interactions cannot be designed since each new nucleotide sequence added is on an unconnected DNA molecule. To overcome these limitations, we are designing reconfigurable chromosomes consisting of both fixed and variable regions. While the fixed region is carefully optimized and tuned ahead of time, the variable region can be modified in the field, at the point-of-use, leading to rapid and on-demand realization of novel biocircuits with many different phenotypes.
On January 15, 2019, the MIT Internet Policy Research Initiative (IPRI) and Quest for Intelligence (QI) hosted the first MIT AI Policy Congress. The conference brought together global policymakers, technical experts, and industry executives to discuss the impact of AI across sectors, with panels on transportation and safety, manufacturing and labor, healthcare, criminal justice and fairness, national security and defense, and international perspectives.
Last week MIT’s Institute for Foundations of Data Science (MIFODS) held an interdisciplinary workshop aimed at tackling the underlying theory behind deep learning. Led by MIT professor Aleksander Madry, the event focused on a number of research discussions at the intersection of math, statistics, and theoretical computer science.
Every spring, engineering students from MIT and law students from Georgetown University overcome the distance between their institutions and disciplines in a semester-long flurry of virtual classroom meetings and late-night Google hangout sessions, culminating in presentations to policy experts in DC.