Media Authenticity Methods in Practice: Capabilities, Limitations, and Directions
As synthetic media grows, verifying what’s real, and the origin of content, matters more than ever. Our latest report explores media integrity and authentication methods, their limits, and practical paths toward trustworthy provenance across images,…
Efficient Homomorphic Integer Computer from CKKS
Fully homomorphic encryption (FHE) has evolved from Gentry’s original blueprint into a diverse family of practical schemes, including BGV/BFV for exact arithmetic, DM/CGGI-style schemes for fast binary computation, and CKKS for high-throughput approximate arithmetic. I…
FineACL
This project studies the data protection challenges when models and agents interact with sensitive data across multiple users. Large language models (LLMs) are increasingly deployed in enterprise settings where thLarge language models (LLMs) are increasingly…
Fuzzy Extractors are Practical
Despite decades of effort, a chasm existed between the theory and practice of device-level biometric authentication. Deployed authentication algorithms rely on data that overtly leaks private information about the biometric; thus, systems rely on externalized…
Senior Researcher – Security – Microsoft Research
The Security Research Group at Microsoft Research Redmond is pushing the boundaries of data‑driven security. In this role as a Senior Researcher – Security, you will work alongside leading researchers and engineers to design and…
Research Intern – Security Research Group
The Security Research Group at Microsoft Research Redmond works on a variety of areas to ensure computer systems are secure and trustworthy. Their current work investigates systems that leverage general software/systems security, confidential computing, formal…