All projects Privacy Protection & CryptographyBlockchains & Smart ContractsSoftware VerificationDevice & System SecurityMachine LearningFinanceHealthGovernment & HumanitarianCritical InfrastructureDigital Information
Jan 2020 → Nov 2021 Project

Secure Distributed-Learning on Threat Intelligence

Partner: armasuisse
EPFL Laboratory: Laboratory for Data Security (LDS)

Cyber security information is often extremely sensitive and confidential, it introduces a tradeoff between the benefits of improved threat-response capabilities and the drawbacks of disclosing national-security-related information to foreign agencies or institutions. This results in the retention of valuable information (a.k.a. as the free-rider problem), which considerably limits the efficacy of data sharing. The purpose of this project is to resolve the cybersecurity information-sharing tradeoff by enabling more accurate insights on larger amounts of more relevant collective threat-intelligence data. This project will have the benefit of enabling institutions to build better models by securely collaborating with valuable sensitive data that is not normally shared. This will expand the range of available intelligence, thus leading to new and better threat analyses and predictions.

TopicsPrivacy Protection & CryptographyMachine Learning

Mar 2019 → Mar 2020 Project


Partner: CHUV
EPFL Laboratory: Laboratory for Data Security (LDS)

MedCo, developed in the lab of EPFL professor Jean-Pierre Hubaux in collaboration with professor Bryan Ford’s DEDIS lab and the Lausanne University Hospital (CHUV), is the first operational system to protect sensitive patient data – including genetic information – so that it can be used collectively for crucial medical research.

TopicsPrivacy Protection & CryptographyHealth

Jan 2018 → Dec 2018 Project

onChain secrets implementation

Partner: Byzgen
EPFL Laboratory: Decentralized Distributed Systems Laboratory (DEDIS)

Byzen and C4DT-affiliated DEDIS laboratory collaborated to implement DEDIS's onChain secrets service. This technology can be used to re-encrypt the most sensitive of data and ensure that any reads to that data are validated, via a distributed and consensus driven decryption process.

TopicsPrivacy Protection & CryptographyBlockchains & Smart Contracts