Skip to content

Software & Hardware Systems

Our researchers are driving innovation across the entire hardware, software and network stack to make computer systems more reliable, efficient and secure. 

From internet-scale networks, to next-generation chip designs, to deep learning frameworks and more, we build and refine the devices and applications that individuals, industries and, indeed, entire economies depend upon every day.


Research Groups & Labs

Gloved hands piping liquid into a smalll rectangular nanopore device connected to a laptop

Molecular Information Systems Lab (MISL)

MISL explores the intersection of information technology and molecular biology using in-silico and wet lab experiments, drawing upon expertise from computer architecture, programming languages, synthetic biology and biochemistry.

Three padlocks of different sizes linked by a chain

Cryptography Research Group

The Cryptography Group advances the foundations and applications of cryptography, including public-key and symmetric cryptography, obfuscation, attribute-based and functional encryption, secure multi-party computation, quantum cryptography and more.


Faculty Members

Faculty

Adjunct Faculty


Centers & Initiatives

IFDS logo in multi-colored block letters with graphic of neuron connections and wording underneath Institute for Foundations of Data Science

Institute for Foundations of Data Science (IFDS)

IFDS organizes its research around four core themes: complexity, robustness, closed-loop data science, and ethics and algorithms. By making concerted progress on these fundamental fronts, IFDS aims to lower several of the barriers to better understanding of data science methodology and to its improved effectiveness and wider relevance to application areas.

ACTION logo

NSF AI ACTION Institute

The NSF AI Institute for Agent-based Cyber Threat Intelligence and Operation (ACTION) seeks to change the way mission-critical systems are protected against sophisticated, ever-changing security threats. In cooperation with (and learning from) security operations experts, intelligent agents will use complex knowledge representation, logic reasoning, and learning to identify flaws, detect attacks, perform attribution, and respond to breaches in a timely and scalable fashion.

Highlights