computer engineering /ecee/ en Izraelevitz aims to make complex memory technologies visible to programmers with CAREER Award /ecee/2023/04/05/izraelevitz-aims-make-complex-memory-technologies-visible-programmers-career-award <span>Izraelevitz aims to make complex memory technologies visible to programmers with CAREER Award</span> <span><span>Anonymous (not verified)</span></span> <span><time datetime="2023-04-05T16:22:36-06:00" title="Wednesday, April 5, 2023 - 16:22">Wed, 04/05/2023 - 16:22</time> </span> <div> <div class="imageMediaStyle focal_image_wide"> <img loading="lazy" src="/ecee/sites/default/files/styles/focal_image_wide/public/article-thumbnail/joe-israelevitz.jpg?h=7ddd46d7&amp;itok=TCLaYZ01" width="1200" height="600" alt="Joe Izraelevitz"> </div> </div> <div role="contentinfo" class="container ucb-article-categories" itemprop="about"> <span class="visually-hidden">Categories:</span> <div class="ucb-article-category-icon" aria-hidden="true"> <i class="fa-solid fa-folder-open"></i> </div> <a href="/ecee/taxonomy/term/52"> News </a> </div> <div role="contentinfo" class="container ucb-article-tags" itemprop="keywords"> <span class="visually-hidden">Tags:</span> <div class="ucb-article-tag-icon" aria-hidden="true"> <i class="fa-solid fa-tags"></i> </div> <a href="/ecee/taxonomy/term/155" hreflang="en">computer engineering</a> </div> <span>Emily Adams</span> <div class="ucb-article-content ucb-striped-content"> <div class="container"> <div class="paragraph paragraph--type--article-content paragraph--view-mode--default"> <div class="ucb-article-content-media ucb-article-content-media-above"> <div> <div class="paragraph paragraph--type--media paragraph--view-mode--default"> <div> <div class="imageMediaStyle large_image_style"> <img loading="lazy" src="/ecee/sites/default/files/styles/large_image_style/public/article-image/joe-israelevitz.jpg?itok=JT1WdImm" width="1500" height="1780" alt="Joe Izraelevitz"> </div> </div> </div> </div> </div> <div class="ucb-article-text d-flex align-items-center" itemprop="articleBody"> <div><div class="ucb-box ucb-box-title-hidden ucb-box-alignment-right ucb-box-style-fill ucb-box-theme-white"> <div class="ucb-box-inner"> <div class="ucb-box-title"></div> <div class="ucb-box-content">Joe Izraelevitz</div> </div> </div> <p>Much like computing itself, the landscape of computer memory is rapidly changing. In addition to random-access memory (RAM), caches and hard drives, we now have technologies like non-volatile memory, non-uniform memory access and encrypted memory.</p> <p>The problem, according to Assistant Professor <a href="/ecee/joseph-joe-izraelevitz" rel="nofollow">Joe Izraelevitz</a> of the <a href="/ecee/" rel="nofollow">Department of Electrical, Computer and Energy Engineering</a>, is that this new memory landscape is not visible to the programmers who are writing code for today’s machines.</p> <p>“There are these distinctions about memory that the programmer might not be aware of,” he said. “There are actually a lot of layers in between the processor and memory.”</p> <p>Izraelevitz plans to use a recent CAREER Award from the National Science Foundation to begin providing that visibility. He wants to develop extensions to programming languages that would allow coders to explicitly control where data is stored.</p> <p>He uses the example of network-accessible memory, which is directly readable by a remote computer. Programmers wouldn’t want to rely on that type of memory for sensitive data, but they currently have to trust the hardware to make the best decision about where to store information. They may also need to know about persistent memory, which helps assure that data isn’t lost in a power outage.</p> <p>“We’re looking at how to expose this complicated landscape to the programmer in an efficient way,” Izraelevitz said. “By agreeing on a common language between the programmer and the rest of the stack, we can enforce that and make the programmer say, ‘I want this secret’ or ‘I want this persistent.’ Then we can take action through the compiler.”</p> <p>He said these memory challenges have existed for a while, but the penalty for not solving them has mainly been performance issues, rather than safety and data security.</p> <p>“I can't just assume the hardware is going to do the right thing,” Izraelevitz said. “The downside of it guessing wrong isn’t a performance hit. It's data loss or secrets lost or data inaccessible.”</p> <p>Izraelevitz, who served as a U.S. Army officer between finishing his undergraduate degree and starting his PhD, believes that intersection with security makes the research area a promising one for those with a military background. He plans to use part of the CAREER Award to provide financial support to students on a GI Bill who need to build their technical skills with a master’s degree before pursuing their PhD.</p> <p>Izraelevitz earned his PhD from the University of Rochester and was a postdoctoral researcher at the University of California San Diego before joining the CU Boulder faculty in 2019. He also completed research internships at Oracle and HP Labs, as well as a limited-stay postdoc at IMDEA Software in Madrid.&nbsp;</p> <p>CAREER Awards provide approximately $500,000 over five years for junior faculty members “who have the potential to serve as academic role models in research and education and to lead advances in the mission of their department or organization.”&nbsp;In addition to the funding provided, Izraelevitz said the award was a chance to reflect on the future trajectory of his research.&nbsp;</p> <p>“It's an interesting exercise to write this grant proposal because I've been forced to think so long term about where to go with my research,” he said. “It makes you really think about where the research, technology, science and industry are going and how you can have an impact there.”</p></div> </div> </div> </div> </div> <div>Assistant Professor Joe Izraelevitz of the Department of Electrical, Computer and Energy Engineering will use a prestigious NSF CAREER to develop extensions to programming languages that would allow programmers to explicitly control where data is stored.</div> <h2> <div class="paragraph paragraph--type--ucb-related-articles-block paragraph--view-mode--default"> <div>Off</div> </div> </h2> <div>Traditional</div> <div>0</div> <div>On</div> <div>White</div> Wed, 05 Apr 2023 22:22:36 +0000 Anonymous 2377 at /ecee CU Boulder lands $750K research grant for 5G communications security /ecee/2022/10/24/cu-boulder-lands-750k-research-grant-5g-communications-security <span>CU Boulder lands $750K research grant for 5G communications security</span> <span><span>Anonymous (not verified)</span></span> <span><time datetime="2022-10-24T09:27:06-06:00" title="Monday, October 24, 2022 - 09:27">Mon, 10/24/2022 - 09:27</time> </span> <div> <div class="imageMediaStyle focal_image_wide"> <img loading="lazy" src="/ecee/sites/default/files/styles/focal_image_wide/public/article-thumbnail/adobestock_298361523.jpeg?h=faab700c&amp;itok=sx-5TdoS" width="1200" height="600" alt="A cell tower against a blue sky"> </div> </div> <div role="contentinfo" class="container ucb-article-categories" itemprop="about"> <span class="visually-hidden">Categories:</span> <div class="ucb-article-category-icon" aria-hidden="true"> <i class="fa-solid fa-folder-open"></i> </div> <a href="/ecee/taxonomy/term/52"> News </a> </div> <div role="contentinfo" class="container ucb-article-tags" itemprop="keywords"> <span class="visually-hidden">Tags:</span> <div class="ucb-article-tag-icon" aria-hidden="true"> <i class="fa-solid fa-tags"></i> </div> <a href="/ecee/taxonomy/term/155" hreflang="en">computer engineering</a> </div> <div class="ucb-article-content ucb-striped-content"> <div class="container"> <div class="paragraph paragraph--type--article-content paragraph--view-mode--default"> <div class="ucb-article-content-media ucb-article-content-media-above"> <div> <div class="paragraph paragraph--type--media paragraph--view-mode--default"> </div> </div> </div> <div class="ucb-article-text d-flex align-items-center" itemprop="articleBody"> </div> </div> </div> </div> <div>Two ECEE researchers are involved in a unique military-oriented project to enable secure use of 5G networks that may be controlled by an adversary.</div> <script> window.location.href = `/engineering/2022/10/24/cu-boulder-lands-750k-research-grant-5g-communications-security`; </script> <h2> <div class="paragraph paragraph--type--ucb-related-articles-block paragraph--view-mode--default"> <div>Off</div> </div> </h2> <div>Traditional</div> <div>0</div> <div>On</div> <div>White</div> Mon, 24 Oct 2022 15:27:06 +0000 Anonymous 2345 at /ecee Wustrow will use CAREER Award to fight Internet censorship /ecee/2022/05/09/wustrow-will-use-career-award-fight-internet-censorship <span>Wustrow will use CAREER Award to fight Internet censorship</span> <span><span>Anonymous (not verified)</span></span> <span><time datetime="2022-05-09T14:17:04-06:00" title="Monday, May 9, 2022 - 14:17">Mon, 05/09/2022 - 14:17</time> </span> <div> <div class="imageMediaStyle focal_image_wide"> <img loading="lazy" src="/ecee/sites/default/files/styles/focal_image_wide/public/article-thumbnail/wustrow_career_thumb_0.png?h=448c04ac&amp;itok=ZLLGgV82" width="1200" height="600" alt="Eric Wustrow, with an aerial shot of campus and the Flatirons in the background"> </div> </div> <div role="contentinfo" class="container ucb-article-categories" itemprop="about"> <span class="visually-hidden">Categories:</span> <div class="ucb-article-category-icon" aria-hidden="true"> <i class="fa-solid fa-folder-open"></i> </div> <a href="/ecee/taxonomy/term/52"> News </a> </div> <div role="contentinfo" class="container ucb-article-tags" itemprop="keywords"> <span class="visually-hidden">Tags:</span> <div class="ucb-article-tag-icon" aria-hidden="true"> <i class="fa-solid fa-tags"></i> </div> <a href="/ecee/taxonomy/term/155" hreflang="en">computer engineering</a> </div> <span>Emily Adams</span> <div class="ucb-article-content ucb-striped-content"> <div class="container"> <div class="paragraph paragraph--type--article-content paragraph--view-mode--default"> <div class="ucb-article-content-media ucb-article-content-media-above"> <div> <div class="paragraph paragraph--type--media paragraph--view-mode--default"> </div> </div> </div> <div class="ucb-article-text d-flex align-items-center" itemprop="articleBody"> <div><p>When <a href="/ecee/eric-wustrow" rel="nofollow">Assistant Professor Eric Wustrow</a> began studying ways to combat Internet censorship as a graduate student, he thought it would be a short-lived project. He said he expected governments to see that censoring the Internet was not a viable long-term solution and give up their efforts.&nbsp;</p> <p>“I could not have been more wrong about that,” he said. “Since then, censors have doubled down on their efforts and have made more sophisticated and more complex infrastructure to block and censor the internet. It's been fascinating to watch that evolve and find ways to circumvent it.”</p> <p>Wustrow, who is based in the&nbsp;<a href="/ecee/" rel="nofollow">Department of Electrical, Computer and Energy Engineering,</a> recently received a CAREER Award, a $569,000, five-year grant from<a href="https://nsf.gov/awardsearch/showAward?AWD_ID=2145783&amp;HistoricalAwards=false" rel="nofollow"> the National Science Foundation</a> to further his computer engineering research into how censorship can be fought from within networks.</p> <p>As of 2018, over half of Internet users worldwide lived in countries that censor political, social or religious content online, Wustrow explained. And because much of the research into censorship relies on in-country vantage points, the censors hold the upper hand – they can see what is being monitored and more easily block circumvention tools like proxy servers.&nbsp; &nbsp;</p> <p>To level that playing field, Wustrow plans to deploy passive measurement and circumvention tools at Internet service providers (ISPs) outside of the censoring countries.</p> <p>Those passive taps will allow his team to observe tell-tale signs of censorship, such as prematurely terminated connections and “missing” expected traffic. They can then use that information to better camouflage circumvention tools, with protocols, packet sizes, timings and configurations that mimic “normal,” non-censored traffic.</p> <p>The new techniques build on some of Wustrow’s previous successes with <a href="https://refraction.network/" rel="nofollow">refraction networking</a>, which today supports Internet freedom for more than 1 million users, with the backing of the U.S. State Department's Bureau of Democracy, Human Rights and Labor.</p> <p>“I've always been really passionate about finding ways to apply engineering and security principles for good, helping people to get autonomy and access to information in places where they otherwise wouldn't,” Wustrow said.</p> <p>To share that passion with others, his CAREER proposal includes developing an undergraduate course in censorship circumvention and creating video content for non-technical audiences – including translated versions targeted toward those in censored countries. Wustrow also looks forward to continuing to collaborate with others on the legal, policy and human rights sides of Internet freedom.&nbsp;</p> <p>The CAREER award is the most prestigious program for early career faculty by the National Science Foundation. It is designed to support junior faculty members “who have the potential to serve as academic role models in research and education and to lead advances in the mission of their department or organization.”&nbsp;<a href="/engineering/2022/06/26/college-engineering-celebrates-6-nsf-career-award-winners-2022" rel="nofollow">Six faculty members from the College of Engineering and Applied Science received NSF CAREER Awards in 2022.</a></p></div> </div> </div> </div> </div> <div>With the $569,000, five-year grant from the NSF, he plans to explore how censorship can be fought from within networks using passive measurement and circumvention tools at Internet service providers (ISPs).</div> <h2> <div class="paragraph paragraph--type--ucb-related-articles-block paragraph--view-mode--default"> <div>Off</div> </div> </h2> <div>Traditional</div> <div>0</div> <div>On</div> <div>White</div> Mon, 09 May 2022 20:17:04 +0000 Anonymous 2240 at /ecee Research in Focus: How Tamara Silbergleit Lehman balances security and performance /ecee/2022/01/05/research-focus-how-tamara-silbergleit-lehman-balances-security-and-performance <span>Research in Focus: How Tamara Silbergleit Lehman balances security and performance</span> <span><span>Anonymous (not verified)</span></span> <span><time datetime="2022-01-05T13:34:22-07:00" title="Wednesday, January 5, 2022 - 13:34">Wed, 01/05/2022 - 13:34</time> </span> <div> <div class="imageMediaStyle focal_image_wide"> <img loading="lazy" src="/ecee/sites/default/files/styles/focal_image_wide/public/article-thumbnail/tamara-screengrab.png?h=48ab954d&amp;itok=sgtH2A1K" width="1200" height="600" alt="Lehman at work at a computer in her office"> </div> </div> <div role="contentinfo" class="container ucb-article-categories" itemprop="about"> <span class="visually-hidden">Categories:</span> <div class="ucb-article-category-icon" aria-hidden="true"> <i class="fa-solid fa-folder-open"></i> </div> <a href="/ecee/taxonomy/term/52"> News </a> </div> <div role="contentinfo" class="container ucb-article-tags" itemprop="keywords"> <span class="visually-hidden">Tags:</span> <div class="ucb-article-tag-icon" aria-hidden="true"> <i class="fa-solid fa-tags"></i> </div> <a href="/ecee/taxonomy/term/155" hreflang="en">computer engineering</a> </div> <div class="ucb-article-content ucb-striped-content"> <div class="container"> <div class="paragraph paragraph--type--article-content paragraph--view-mode--default"> <div class="ucb-article-content-media ucb-article-content-media-above"> <div> <div class="paragraph paragraph--type--media paragraph--view-mode--default"> </div> </div> </div> <div class="ucb-article-text d-flex align-items-center" itemprop="articleBody"> <div><p>In her computer engineering lab, <a href="/ecee/tamara-lehman" rel="nofollow">Assistant Professor Tamara Silbergleit Lehman</a> and her team are exploring ways to make computing devices more secure, while also maintaining performance. &nbsp;</p> <p>“We all love the way that our phones work&nbsp;— as fast as we need them to and as responsive as we need them to,” she says. “But that doesn’t really matter if you can’t trust your device.”</p> <p>They focus on security at the hardware level, including a new project on how to prevent attacks on the GPUs in health diagnostic devices.</p> <p>Check out the video to learn more about what she looks for in her graduate students and the “happy, collaborative” environment students will find in electrical, computer and energy engineering at CU Boulder.</p> <p>[video:https://youtu.be/reL_mClsKkY]</p></div> </div> </div> </div> </div> <div>In her computer engineering lab, Assistant Professor Tamara Silbergleit Lehman and her team are exploring ways to make computing devices more secure, while also maintaining performance. &nbsp;</div> <h2> <div class="paragraph paragraph--type--ucb-related-articles-block paragraph--view-mode--default"> <div>Off</div> </div> </h2> <div>Traditional</div> <div>0</div> <div>On</div> <div>White</div> Wed, 05 Jan 2022 20:34:22 +0000 Anonymous 2181 at /ecee