Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1 - 25 of 2274

Photonic Millimeter-wave Generation Beyond the Cavity Thermal Limit

February 11, 2025
Author(s)
William Groman, Igor Kudelin, Takuma Nakamura, Yifan Liu, Charles McLemore, Franklyn Quinlan, Scott Diddams, Dahyeon Lee, Megan Kelleher, Joel Guo, Warren Jin, John Bowers
With the next generation of telecommunications and radar/navigation upon us, moving from the microwave to the higher bandwidth, millimeter-wave domain has become ever relevant. Simultaneously, the burgeoning field of photonic integrated chips has yielded a

BIT-FL: Blockchain-Enabled Incentivized And Secure Federated Learning Framework

February 1, 2025
Author(s)
Tao Zhang, Chenhao Ying, Fuyuan Xia, Haiming Jin, Yuan Luo, David Wei, Xinchun Yu, Yibin Xu, Xikun Jiang, Weiting Zhang, Dacheng Tao
Federated learning (FL) enables the protection of data privacy through collaborative training of a machine learning (ML) model without sharing local data. However, several common problems arise when designing FL frameworks, as they rely on a central server

Designing Usable Audio for Voting Systems: Best Practices and a Test Approach

January 31, 2025
Author(s)
Lynn Baumeister, Whitney Quesenbery, Sharon J. Laskowski
Voting systems must support multiple interaction modes: presenting information both visually and auditorily, accepting navigation and selections from both screen touches and key presses on a tactile controller. The best practices outlined in this document

Security Property Verification by Transition Model

January 31, 2025
Author(s)
Chung Tong Hu
Verifying the security properties of access control policies is a complex and critical task. The policies and their implementation often do not explicitly express their underlying semantics, which may be implicitly embedded in the logic flows of policy

Enabling Global Image Data Sharing in the Life Sciences

December 23, 2024
Author(s)
Anne L. Plant, Peter Bajcsy
Public, reference data are one of the most important foundational resources in the modern life and biomedical sciences. Over the last 40 years, the public release and availability of genomic and macromolecule structural databases accelerated discovery

Implementation Guidance for Common Data Formats

November 15, 2024
Author(s)
John Dziurlaj
This document discusses various topics related to the practical implementation of the NIST Voting Common Data Formats. This includes materials on how the CDFs are constructed, cross-referencing data inside and outside CDF instances, handling of

Hardware Security Failure Scenarios

November 13, 2024
Author(s)
Peter Mell, Irena Bojanova
Historically, hardware has been assumed to be inherently secure. However, chips are both created with software and contain complex encodings (e.g., circuit designs and firmware). This leads to bugs, some of which compromise security. This publication

POTENT: Post-Synthesis Obfuscation for Secure Network-on-Chip Architectures

November 5, 2024
Author(s)
Kostas Amberiadis, Dipal Halder, Sandip Ray, Yuntao Liu, Ankur Srivastava
We develop a novel post-synthesis obfuscation technique, POTENT, to protect NoC fabrics against reverse engineering attacks. POTENT integrates programmable switches at NoC routers, concealing topology and communication paths under a dynamically controlled

Base de referencia de las capacidades de apoyo no tecnicas del IoT

October 30, 2024
Author(s)
Michael Fagan, Katerina Megas, Jeffrey Marron, Kevin Brady, Barbara Cuthill, Rebecca Herold
Las capacidades de apoyo no técnicas son acciones que realiza un fabricante o una organización de terceros en apoyo de la seguridad cibernética de un dispositivo de Internet de las cosas (IoT, por sus siglas en inglés). Esta publicación define una línea

Service Mesh Proxy Models for Cloud-Native Applications

October 16, 2024
Author(s)
Ramaswamy Chandramouli, Zack Butcher, James Callaghan
The service mesh has become the de facto application services infrastructure for cloud-native applications. It enables the various runtime functions of an application through proxies that form the data plane of the service mesh. Depending on the

Developing Interoperable, Accessible Software via the Atomic, Molecular, and Optical Sciences Gateway: A Case Study of the B-spline atomic R-Matrix code Graphical User Interface

October 3, 2024
Author(s)
Barry I. Schneider, kathryn hamilton, Sudhakar Pamidighantam, Tom Wolcott
The Atomic, Molecular, and Optical Science Gateway\citeamosgateway} is a comprehensive cyber\-infrastructure for research and educational activities in computational AMO science. The \hbox$B$-Spline} atomic \hbox$R$-Matrix} (BSR) suite of programs is

Report on Secure Hardware Assurance Reference Dataset (SHARD) Program

October 1, 2024
Author(s)
Paul E. Black, Vadim Okun
Significant vulnerabilities have been found in chips. Computer programs and methods have been developed to prevent, find, and mitigate them. We proposed Secure Hardware Assurance Reference Dataset (SHARD) as a repository of reference examples (test cases)

A Data Protection Approach for Cloud-Native Applications

September 30, 2024
Author(s)
Ramaswamy Chandramouli, Wesley Hales
This document addresses the need for effective data protection strategies in the evolving realm of cloud-native network architectures, including multi-cloud environments, service mesh networks, and hybrid infrastructures. By extending foundational data

Summary Report: CHIPS R&D Program Standards Summit

September 27, 2024
Author(s)
Mary Bedner, Chris Greer
The mission of the National Institute of Standards and Technology's (NIST) CHIPS Research and Development Office (CHIPS R&D) under the Department of Commerce's CHIPS for America Program is to accelerate the development and commercial deployment of

Proxy Validation and Verification for Critical AI Systems

September 26, 2024
Author(s)
Phillip Laplante, Joanna DeFranco, D. Richard Kuhn, Jeff Voas
This white paper offers a suggestion that prior testing artifacts from similar AI systems can be reused for new AI software. Testing AI and Machine learning software is difficult, and if prior testing results from similar systems could be applied as a

IP Security in Structured ASIC: Challenges and Prospects

September 25, 2024
Author(s)
Rasheed Almawzan, Sudipta Paria, Aritra Dasgupta, Kostas Amberiadis, Swarup Bhunia
With the globalization of hardware manufacturing and the growing demand for electronics, companies now heavily rely on offshore facilities for most of the design and manufacturing processes, including emerging technologies like Structured ASICs

Proxima: A Proxy Model-Based Approach to Influence Analysis

September 25, 2024
Author(s)
Sunny Shree, Yu Lei, Raghu Kacker, David Kuhn
Machine learning (ML)-based Artificial Intelligence (AI) systems rely on training data to perform optimally, but the internal workings of how ML models learn from and use this data are often a black- box. Influence analysis provides valuable insights into

On Combinatorial Security Testing for the Tor Anonymity Network Client

September 17, 2024
Author(s)
Dimitris Simos, Bernhard Garn, Dominik-Philip Schreiber, Manuel Leithner, David Kuhn, Raghu Kacker
In this paper, we present an application of combinatorial security testing to the well-known anonymity network Tor. Rigorous testing of the Tor network is important to evaluate not only its functionality, but also the security it provides to its users

Building a Cybersecurity and Privacy Learning Program

September 12, 2024
Author(s)
Marian Merritt, SUSAN HANSCHE, BRENDA ELLIS, Julie Nethery Snyder, KEVIN SANCHEZ-CHERRY, DONALD WALDEN
This publication provides guidance for federal agencies and organizations to develop and manage a life cycle approach to building a Cybersecurity and Privacy Learning Program (CPLP). The approach is intended to address the needs of large and small

Report on the Block Cipher Modes of Operation in the NIST SP 800-38 Series

September 10, 2024
Author(s)
Nicky Mouha, Morris J. Dworkin
This report focuses on the NIST-recommended block cipher modes of operation specified in NIST Special Publications (SP) 800-38A through 800-38F. The goal is to provide a concise survey of relevant research results about the algorithms and their
Displaying 1 - 25 of 2274