Thursday, August 21, 2014

Center for Extreme Events Research at UC San Diego / website launch

The Center for Extreme Events Research at the Jacobs School of Engineering is focused on advancing the engineering research essential to protect critical infrastructure and bio-systems from extreme hazardous events.

Jiun-Shyan (JS) Chen is the Director of the Center for Extreme Events Research at UC San Diego. Chen holds the William Prager Endowed Chair in the Department of Structural Engineering at UC San Diego. He is Editor-in-Chief of Interaction and Multiscale Mechanics: an International Journal.

The Center for Extreme Events Research is the second "agile center" to be launched at the Jacobs School of Engineering under the leadership of Dean Albert P. Pisano. (Learn about Pisano's vision for agile centers at the Jacobs School here.)


Researchers find security flaws in backscatter X-ray scanners

A team of researchers from the University of California, San Diego, the University of Michigan, and Johns Hopkins University have discovered several security vulnerabilities in full-body backscatter X-ray scanners deployed to U.S. airports between 2009 and 2013. In laboratory tests, the team was able to successfully conceal firearms and plastic explosive simulants from the Rapiscan Secure 1000 scanner.  The team was also able to modify the scanner operating software so it presents an “all-clear” image to the operator even when contraband was detected.  

The researchers presented their study Aug. 21 at USENIX Security '14 in San Diego. Naturally, they have attracted plenty of media attention. 

A list of links for your reading pleasure:

Wired, Aug. 20, 2014, Researchers Easily Slipped Weapons Past TSA's X-Ray Bodyscanners

UT San Diego, Aug. 20, 2014, Full-body scanners miss guns, explosives

Popular Science, Aug. 21. 2014, Weapons Can Be Carried Easily Through The TSA's Full-Body "Naked" Scanners


CNNMoney, Aug. 21, 2014, Body Scanners Problem: Fails to Detect Guns, http://money.cnn.com/2014/08/21/technology/rapiscan-gun/index.html

Computerworld, Aug. 21, 2014, Retired US airport body scanners fail to spot guns, knives

MarketWatch, The Wall Street Journal, Aug. 20, 2014, Airport scanners failed to detect guns, knives, explosives

Businessweek, Aug. 20, 2014, TSA Scanners That Saw You Naked Can Be Tricked to Miss Guns, Bombs

Gizmodo, Aug. 20, 2014, It's Shockingly Easy to Hide Guns and Bombs From Backscatter Scanners

Science 2.0, Aug. 20, Low-Tech: Security Flaws In Airport Backscatter X-Ray Scanners


New York Post, Aug. 20, 2014 TSA machines failed to detect guns and bombs





BoingBoing, Aug. 20, 2014, Security researchers buy pornoscanner, demonstrate how to sneak in guns & bombs

Friday, August 15, 2014

Transfer students get help to prepare for the Jacobs School



"You definitely don't want to have three finals on the same day," one student told an audience of 23 incoming transfer students gathered in the Qualcomm Conference Center in Jacobs Hall Thursday morning. They took note.
The students were there for Transfer PrEP, a three-day residential summer program for incoming transfers organized by the Jacobs School's IDEA Student Center. Students go to meet with faculty, teaching assistants, engineering advisers and industry. They also got lab and company tours and heard from alumni about career options.
Thursday morning, they learned about how to pick their classes and sign up for scholarships, among other things, from a group of former transfer students.





Wednesday, August 13, 2014

Get your sweat-powered battery here

Professor Joe Wang is heating up the airwaves and Internet with news of a tattoo "biobattery" that generates energy from sweat. Wenzhao Jia, a postdoctoral researcher in the Wang laboratory, presented a paper on the technology today at the American Chemical Society meeting in San Francisco.

The device works by detecting and responding to lactate, which is naturally present in sweat. Wang's team imprinted a flexible lactate sensor onto temporary tattoo paper. The sensor contained an enzyme that strips electrons from lactate, generating a weak electrical current.

"The current produced is not that high, but we are working on enhancing it so that eventually we could power some small electronic devices," said Jia. Notably, in an experiment with volunteers with a range of fitness levels, the least fit people generated the most energy. As researchers develop wearable sensors for health and fitness and medical monitoring, they will need to figure out how to power them without adding the bulk of heavy conventional batteries. Wang is also the director of the new Center for Wearable Sensors at UC San Diego Jacobs School of Engineering.

Read all the great coverage and watch the video:

Washington Post

Gizmodo

Newsweek

Popular Mechanics


Don't drink and drone: Jacobs School alumns launch Kickstarter to create drone pilot flight school



"Don't drink and drone!" That's the advice in this fun video produced by SparkAerial, a start-up co-founded by Jacobs School computer science alums Radley Angelo, Kurt Selander and Austin Hill. The company bills itself as a full-service UAV shop and offers for example custom-built quadcopters and other flying UAVs and aerial cinematography services.

The team got their start in the Engineers for Exploration program here at the Jacobs School. Their got to accompany researcher Albert Lin on his expedition to find Genghis Khan's tomb in Mongolia. Since then, their work has been featured on CNN, Good Morning America and the National Geographic Channel, among many others.

They have recently launched a Kickstarter to create a drone pilot school. So far, with 26 days to go, backers have pledged $3,115 of a $5,000 goal. The money would go to creating an aerial cinematography video training series and an online resource center for aspiring drone pilots.
According to their Kickstarter page:

Our goal here is simple; we want to teach the world how to have fun, fly safe, and capture amazing content. The series covers everything from the basics, like choosing a copter and taking off for the first time, to more advanced piloting maneuvers that will make your video the talk of the town.

Tuesday, August 12, 2014

CSE-Related Research and Researchers Dominate USENIX Security Forum

Here's an alert to graduate students in CSE who want to attend the 23rd annual USENIX Security Symposium that will take place August 20-22 at the Manchester Grand Hyatt San Diego. The conference has extended the deadline for students to apply for travel, accommodations and/or registration grants to attend this year's event. The new deadline is Monday, July 14, and applications must be submitted online (see link below).
USENIX Security is one of the "big three" conferences in computer security, and this year's meeting is going to showcase the work of current faculty and grad students, but also the work of UC San Diego CSE alumni. CSE Prof. Hovav Shacham (pictured at right) is the senior author of a paper, "On the Practical Exploitability of Dual EC in TLS Implementations," co-authored with colleagues including grad student Jake Maskiewicz and CSE alumni Stephen Checkoway (now at Johns Hopkins) and Tom Ristenpart (University of Wisconsin-Madison). Shacham is also senior author on another paper with co-authors from UC San Diego and the University of Michigan. CSE Ph.D. student Neha Chachra(at left during previous internship at Google), advised by Geoffrey Voelker and Stefan Savage in the Systems and Networking group, is one of the co-authors on a paper titled, "Hulk: Eliciting Malicious Behavior in Browser Extensions." In addition to Chachra, the co-authors on the Hulk paper hail from two other University of California campuses -- three co-authors from UC Santa Barbara, and two from UC Berkeley and the International Computer Science Institute, including senior author Vern Paxson.
In addition to the paper above, CSE alumnus Tom Ristenpart (Ph.D. '10) has three other papers on the USENIX Security program. Both Ristenpart and Georgia Tech professor Alexandra (Sasha) Boldyreva (Ph.D. '04) studied under CSE Prof. Mihir Bellare, and Boldyreva also has a paper at USENIX Security this year. Another CSE alumnus, Stephen Checkoway (Ph.D. '12), had four papers accepted (two of them co-authored with UC San Diego researchers). A fourth CSE alumnus, Chris Kanich (Ph.D. '12) -- now an assistant professor at the University of Illinois at Chicago -- also has a paper ("The Long 'Taile' of Typosquatting Domain Names"). Pictured above (l-r): CSE alumni Ristenpart, Checkoway, Boldyreva and Kanich.
According to Center for Networked Systems director Stefan Savage, CSE's intellectual imprint on USENIX Security 2014 goes beyond the individual papers. "There are two sessions whose purpose is driven by our past work," said Savage. "There is a session on return-oriented programming (ROP) that is driven entirely by Hovav Shacham's seminal work on ROP. On top of that, roughly 75 percent of the side-channel session is motivated by the work Tom Ristenpart did here at UC San Diego on cross-VM attacks in the cloud."

Deciphering CSE's Upcoming Presence at Crypto 2014

CSE professors Mihir Bellare and Daniele Micciancio will be in Santa Barbara August 17-21 for the 34th International Cryptology Conference at UC Santa Barbara. The conference is sponsored by the International Association for Cryptologic Research (IACR), and the general chair of the conference is CSE alumna Alexandra (Sasha) Boldyreva (Ph.D. ’04), who worked in Bellare’s lab and is now an associate professor in Georgia Tech’s Information Security Center.
This year’s IACR Distinguished Lecture will be given by UC San Diego’s Bellare (pictured at left). The title of his talk: “Caught in between theory and practice.”  “This talk explores the culture and motivations of the cryptographic research community,” explains Bellare. “I examine the tension between theory and practice through the lens of my own experience in moving between them. I examine the peer-review process through the lens of psychology and sociology. In both cases the aim is to go from critique to understanding and, eventually, change.”
Bellare also has two other papers at Crypto 2014. In the August 18 opening session, he and colleagues Kenneth G. Paterson (University of London) and Phillip Rogaway (UC Davis) have a paper on "Security of Symmetric Encryption against Mass Surveillance." According to its authors, the research was “motivated by revelations concerning population-wide surveillance of encrypted communications.” In the paper, Bellare and colleagues formalize and investigate the resistance of symmetric encryption schemes to mass surveillance. The research abstract notes that, “We assume that the goal of ‘Big Brother’ is undetectable subversion,” going on to spell out a way to defend against so-called algorithm-substitution attacks (ASAs), which aim to replace a real encryption algorithm with a subverted encryption algorithm.
Separately, Bellare and his postdoc (Viet Tung Hoang), and Ph.D. student Sriram Keelveedhi teamed on a paper called, "Cryptography from Compression Functions: The UCE Bridge to the ROM." UCE stands for Universal Computational Extractor, and ROM is the Random Oracle Model.
Then on August 19, in a session on lattices, Micciancio (at right) and his French postdoc Léo Ducas have a paper on “Improved Short Lattice Signatures in the Standard Model.” They will present “a signature scheme provably secure in the standard model (no random oracles) based on the worst-case complexity of approximating the Shortest Vector Problem in ideal lattices within polynomial factors” – achieving short signatures (consisting of a single lattice vector), and “relatively short” public keys.

Monday, August 11, 2014

Lead architect of IBM's 1 million neuron neuromorphic chip is a Jacobs School alum

Huge congratulations to Jacobs School alumnus Dharmendra Modha, the principal investigator on the DARPA SyNAPSE project, which announced last week that it had built a one-million-cores neuromorphic chip and published its results in the journal Science.

The chip, called True North, was developed at IBM Research, where Modha leads the company's Cognitive Computing Group. It's "a synaptic supercomputer in your palm," Modha writes on his blog.
It also consumes dramatically less power than a supercomputer--70 milliwatts, or what it takes to power a hearing aid, according to The New York Times.

Also on the blog, Modha also writes:
The architecture can solve a wide class of problems from vision, audition, and multi–sensory fusion, and has the potential to revolutionize the computer industry by integrating brain–like capability into devices where computation is constrained by power and speed. These systems can efficiently process high–dimensional, noisy sensory data in real time, while consuming orders of magnitude less power than conventional computer architectures.
Modha also wrote a related article on the IBM Research website:

Introducing a Brain-inspired Computer 
TrueNorth's neurons to revolutionize system architecture

Modha earned a Ph.D. in electrical engineering in 1996, under now-retired professor Elias Masry and Robert Hecht-Nielsen, now an adjunct professor in ECE.
When we asked him back in 2009 what he had learned here at the Jacobs School, he said:
I owe a great debt to UCSD, and to my many wonderful professors from the Jacobs School, especially Elias Masry and Robert Hecht-Nielsen, for their priceless gift of education," says Modha, who recently returned to the Jacobs School for a visit. "Fundamental training persists. Professors change lives when they teach thinking, when they teach students how to approach any problem - how to rigorously break down any problem and deal with it," says Modha.
"Now, as a proud UC San Diego alumnus, I am staying connected and working with our university to raise the visibility of the accomplished students, faculty and alumni who add value to our degrees every day."

Computer scientists in the spotlight on the Torrey Pines Mesa

Several Jacobs School computer scientists and their work are highlighted in a UT San Diego story about the history of the scientific institutions on the Torrey Pines Mesa.

Under the major science accomplishments section:

•Computer scientist Kenneth Bowles and his students modified the Pascal programming language, allowing a program to be moved around from machine to machine, a technique now widely used to build mobile applications.

 •George Varghese and Stefan Savage developed the first automated method for automatically identifying worm and virus attacks across the Internet and other high-speed networks almost as soon as the outbreaks occur. Cisco acquired the technology.
We also spotted computer scientists Ryan Kastner and Mia Minnes in the video accompanying the story:

Cybersecurity experts call for better automotive cyber safety, echoing Jacobs School research findings

A group of cybersecurity experts has announced a Five Start Automotive Cyber Safety Program at the annual Defcon conference in Las Vegas this week to prevent cars from being hacked, a threat that was first pointed out by a team of computer scientists here at UC San Diego and at the University of Washington back in 2010.

The group, called I am the Cavalry, breaks down the five stars as follows:
Safety by Design
Third Party Collaboration
Evidence Capture
Security Updates
Segmentation and Isolation

Savage and colleagues explain the threat in the video below (courtesy of Motherboard):



More on the research here

Friday, August 8, 2014

Bioengineering professor featured on "Sex in the Wild," a new PBS series on animal reproduction



How fast is dolphin sperm? This question is addressed in a new episode of “Sex in the Wild,” a multipart PBS documentary that aired on Aug. 6. The episode on dolphins and whales features UC San Diego bioengineering professor Michael Berns. Sex in the Wild is studying animal reproduction in “vivid detail.” A PBS film crew spent a day in the Berns lab last spring to examine orangutan and dolphin sperm that had been imaged and “trapped” in Berns’ pioneering laser tweezers. You can watch the complete episode on PBS.com.
Professor Michael Berns (left) tests the speed of dolphin sperm with veterinary scientist Mark Evans (right) on an episode of PBS' new documentary series "Sex in the Wild" that aired on Aug. 6.
In research published in 2007, researchers in the Berns lab, including then-grad student Jaclyn Nascimento, used the sperm-trapping technology to find evidence that supports the theory that speed and force matters in reproductive competition among primates who are highly promiscuous such as chimpanzees and rhesus macaques. 

The technology relies on the momentum inherent in laser light: when the path of laser light bends as it passes through a small transparent object such as a cell, some of the light’s momentum is transferred to the cell, effectively holding, or trapping it. The stronger the laser, the more firmly the cell is held. After a cell is trapped, the light intensity is reduced in a precise manner. Such a timed decay in laser power allows a trapped sperm cell to escape at the point at which its swimming force exceeds the trapping force. The adjustable laser tweezers and sperm-tracking software allowed the team led by Berns and his Nascimento to precisely and accurately measure swimming force and speed of hundreds of individual sperm cells from males of the four primate species: gorillas, humans, chimpanzees and rhesus macaques. 

Their research attracted the attention of the “Sex in the Wild” producers who were eager to see how the technology works and what it could tell us about orangutan and dolphin sperm.  Referring to the dolphin sperm, “It’s a lot faster than most of the species we looked at,” said Berns during the segment. They also demonstrated that salt water kills dolphin sperm instantly.

Berns is also a professor of biomedical engineering and founder of the Beckman Laser Institute at UC Irvine. He is currently on full time sabbatical at UC San Diego.

Thursday, August 7, 2014

Expert in origami robots, soft robotics and programable matter to join Jacobs School faculty


Michael Tolley, who will become an assistant professor of mechanical engineering at the Jacobs School Nov. 1, is one of the co-authors on a paper about self-folding robots published in Science today. Tolley worked on the project while a postdoctoral researcher at the Wyss Institute for Biologically Inspired Engineering at Harvard.

"I am very excited to pursue similar unconventional approaches to the design and fabrication of robotic systems at UCSD," Tolley said in an email.

According to the paper:
The robot starts as a flat sheet with embedded electronics, and transforms autonomously into a functional machine. To accomplish this, we developed shape-memory composites that fold themselves along embedded hinges. We used these composites to recreate fundamental folded patterns, derived from computational origami, that can be extrapolated to a wide range of geometries and mechanisms. This origami-inspired robot can fold itself in 4 minutes and walk away without human intervention, demonstrating the potential both for complex self-folding machines and autonomous, self-controlled assembly.
 On his website, Tolley describes his contribution as "development of origami-inspired design and fabrication approaches for the fabrication of function electromechanical machines."

The paper has received ample media attention, including:

The Wall Street Journal

The New York Times

NBC News

IEEE Spectrum 

and

NPR

In addition to origami robots, Tolley is interested in soft robotics. He has developed untethered soft robots with integrated power and control systems. Check out this video:


Tolley also has worked on programmable matter, a substance that can follow directions to change its physical properties. According to his website: 

Imagine a system that assembles a pile of regular, mass-produced components into an iPod, computer, robot, or tool with embedded sensing and computation. Objects can be assembled or repaired on-the-fly, and deconstructed to be recycled into new objects when they are no longer needed. This technology would open up new possibilities for rapid prototyping, space exploration, sustainable technology, and evolutionary design.
 Cool videos illustrating the process below: