• Type

Subscribe to our mailing list and get the latest CITRIS news, research updates and event announcements delivered straight to your inbox.

BERC Fall Gala

The BERC Fall Gala is the signature fundraising event for Berkeley’s energy and resources community, bringing together industry and alumni with students and faculty to celebrate BERC’s fifth anniversary and to kick off the 2010-11 academic year.

TRUST Security Seminar: Secure Information Flow in Trust Networks

Who is responsible for the harm and risk of security flaws? The advent of worldwide networks such as the internet made software security (or the lack of software security) became a problem of international proportions. There are no mathematical/statistical risk models available today to assess networked systems with interdependent failures. Without this tool, decision-makers are bound to overinvest in activities that don’t generate the desired return on investment or under invest on mitigations, risking dreadful consequences. Experience suggests that no party is solely responsible for the harm and risk of software security flaws but a model of partial responsibility can only emerge once the duties and motivations of all parties are examine and understood. State of the art practices in software development won’t guarantee products free of flaws.

The Evolving Internet: Driving Forces, Uncertainties, and Four Scenarios to 2025

What will the Internet be like in 2025? How much bigger will it have grown from today’s 2 billion users and $3 trillion market? Will it have achieved its full potential to connect the world’s entire population in ways that advance global prosperity, business productivity, education and social interaction?

TRUST Security Seminar: Return-Oriented Programming: The Impact of the Gadget on Civilization

Return-oriented programming is an attack technique that induces arbitrary behavior in the compromised program without injecting new code into its address space. A return-oriented attack combines short sequences of instructions from a target program’s executable image into a Turing-complete set of combinators, called “gadgets,” from which any desired functionality can be synthesized.

Research Exchange: Leveraging Machine-learning and Crowdsourcing to Process Text Messages in the world’s Less-resourced Language

Text-messaging has quickly become the dominant form of remote communication in much of the world, surpassing email, phone calls and even grid electricity. This has social development and crisis response organizations to leverage mobile technologies to support health, banking, access to market information, literacy and emergency response.

Social Entrepreneurship in Developing Nations: A View from the Field

David Green is a MacArthur Fellow, an Ashoka Fellow and is recognized by Schwab Foundation as a leading social entrepreneur. He helped establish Aurolab (India), to produce affordable intraocular lenses (now has 8% of the global market share) and suture. He has also helped develop high-volume, quality eye care programs that are affordable to the poor and self-sustaining from user fees, including Aravind Eye Hospital in India, which performs 300,000 surgeries per year.