Research Library

Since 2015, CLTC has directly funded more than 160 projects by UC Berkeley students, faculty & affiliates on original cybersecurity research topics, in addition to developing our own white papers, publications, blogs, policy analysis and recommendations, and open-source curricula and toolkits.

Filter & Sort

Sort by
Research Type
Research Topics
Date Type Research Item Topics

May 8, 2025

White Paper

the cover image for the report, showing a circle made of green and blue beams of light.

Survey of Search Engine Safeguards and their Applicability for AI

By: Evan R. Murphy, Nada Madkour, Deepika Raman, Krystal Jackson, Jessica Newman, Survey of Search Engine Safeguards and their Applicability for AI

A new research paper from the Center for Long-Term Cybersecurity examines how safeguards designed for search engines could be adopted by developers of AI systems like ChatGPT. The…

artificial intelligence (AI)data sharingdigital harmsengineeringhomeland securitymachine learning (ML)misinformationnational security

April 16, 2025

White Paper

The South Korean Digital Paradox: How South Korea’s Internet Development Model Creates Unique Cybersecurity Vulnerabilities

By: Nick Merrill, The South Korean Digital Paradox: How South Korea’s Internet Development Model Creates Unique Cybersecurity Vulnerabilities

South Korea is home to one of the world’s most robust digital infrastructures, largely as a result of a government-led development model that has favored domestic technologies. Nearly…

governanceinfrastructureinternet fragmentationmisinformationpolicyriskscenarios

March 31, 2025

White Paper

Managing Commercial Spyware Through Export Controls: Lessons Learned from the Wassenaar Experience

By: Elaine Korzak

A new white paper from the Center for Long-Term Cybersecurity explores the use of international export controls to limit the dissemination of commercial spyware technologies. The paper, “Managing…

digital harmsgovernancelaw enforcementnational securitypolicyprivacysurveillance

February 3, 2025

White Paper

Intolerable Risk Threshold Recommendations for Artificial Intelligence

By: Deepika Raman, Nada Madkour, Evan R. Murphy, Krystal Jackson, Jessica Newman

January has already seen the release of new frontier models that are creating waves with unprecedented innovation in their development and uplift in their capabilities. Simultaneously, we are…

artificial intelligence (AI)risk

January 29, 2025

White Paper

Impacts of Open Radio Access Networks for Operators, Policymakers, and Consumers

By: Jon Metzler

  A new white paper published by the UC Berkeley Center for Long-Term Cybersecurity examines the implications of “open radio access networks,” or Open RAN, a movement focused…

5Ggovernanceinfrastructure

January 28, 2025

White Paper

AI Risk-Management Standards Profile for General-Purpose AI (GPAI) and Foundation Models

By: Anthony Barrett, Jessica Newman, Brandie Nonnecke, Nada Madkour, Dan Hendrycks, Evan R. Murphy, Krystal Jackson, Deepika Raman

The first annual update to the AI Risk-Management Standards Profile for General-Purpose AI Systems (GPAIS) and Foundation Models (Version 1.1) has been published by a team of researchers…

artificial intelligence (AI)risk

November 19, 2024

White Paper

CyberCAN: Cybersecurity for Cities and Nonprofits

By: Sarah Powazek, Shannon Pierson

A new CLTC report provides guidance to help government leaders in San Francisco and other cities more effectively support the digital security of local nonprofits. The report, “CyberCAN:…

Californiapublic interest cybersecurity

October 31, 2024

White Paper

abstract colorful painting

Resistance to Text-to-Image Generators in Creator Communities

Text-to-image generators like DALL-E have sparked controversy among artistic creators, who are concerned about how generative artificial intelligence (Gen AI) models have been trained with copyright-protected materials. A…

artartificial intelligence (AI)deep fakedigital harmspolicy

October 1, 2024

White Paper

solar panels and wind turbines shown with a grid of digital dots

Cyber Resilience and Social Equity: Twin Pillars of a Sustainable Energy Future

By: Emma Stewart, Remy Stolworthy, Virginia Wright

A report published by the Center for Long-Term Cybersecurity, Cyber Resilience and Social Equity: Twin Pillars of a Sustainable Energy Future, examines the importance of cybersecurity in ensuring equitable access to energy. In an era of worsening cybersecurity threats, the paper advocates for “sustainable energy delivery systems that ensure robust defenses without compromising the goals of reducing energy poverty and ensuring energy security.”

digital harmshomeland securityinfrastructurepolicypublic interest cybersecurity

September 3, 2024

White Paper

white dots appearing to form a swarm

A Swarm Intelligence Approach to Prioritizing the CIS Controls V8.0 Implementation

By: Hayat Abdulla Asad Cue, Thirimachos Bourlai, Mark Lupo

Authored by researchers affiliated with CyberArch, a cybersecurity clinic at the University of Georgia’s Carl Vinson Institute of Government (CVIOG), this paper introduces a novel approach for ranking actions outlined in the Center for Internet Security (CIS) framework, a prioritized set of safeguards to help organizations mitigate common cyber attacks.

cyber talent pipelinedigital harmsgovernanceMITRE Attackpublic interest cybersecurityriskusable securityvulnerable populations