Privacy-Preserving Programming/Coding

A major barrier to the adoption of privacy-preserving computing is usability. Currently, implementing systems that utilize PETs requires deep domain expertise in cryptography OR HW/SW security. Representative PETs are :
Cryptographic
- Fully Homomorphic Encryption
- Multi-Party Computation
- Zero-Knowledge Proofs
- and other lightweight cryptographic hacks
HW/SW Level
- Process Isolation
- Trusted Execution Environments (highly related with side-channel attacks)
- System Privileges
There are also other domain specific PETs such as Differential Privacy and Federated Learning.
As you can see, there are a lot of different PETs available, but they are far from being adopted for common use. Our ultimate vision is a unified platform that abstracts away this complexity. We aim to build intelligent tools that allow developers to write “normal” unencrypted code, which the system automatically translates into secure, privacy-preserving executions. By integrating various PETs seamlessly, we can choose the right tool for the right job—balancing security, privacy, and speed autonomously.
Key Sub-Topics & Keywords
To give you an idea of potential topics you may be interested in (but not bounded to):
- Integrating multiple PETs (e.g., FHE+MPC+TEE)
- Mitigating Side-Channel Attacks on TEEs
- Real-Time Privacy Monitoring Techniques
- Attacks and Defenses in Federated Learning Applications
Student Note: A lot of organizations are highly interested (some are actively hiring) Privacy Enhancing Techniques researchers – Google, Microsoft, Samsung Electronics, LG Electronics, Thales, and much more. If you are interested in studying about data privacy issues in different AI applications as well as how to overcome the limitations of PETs, this field is for you.