Satwik Patnaik , Mohammed Ashraf , Johann Knechtel , and Ozgur Sinanoglu Ensuring the trustworthiness and security of electronics has become an urgent challenge in recent years. Among various concerns, the protection of design intellectual property (IP) is to be addressed, due to outsourcing trends for the manufacturing supply chain and malicious end-user. In other...
Author: Emerald Knox (Emerald Knox)
Hardening the Hardware: A Reverse-engineering Resilient Secure Chip
Abhrajit Sengupta, Muhammad Yasin, Mohammed Nabeel, Mohammed Ashraf, Jeyavijayan Rajendran and Ozgur Sinanoglu With the globalization of integrated circuit (IC) supply chain, the semi-conductor industry is facing a number of security threats, such as Intellectual Property (IP) piracy, hardware Trojans, and counterfeiting. To defend against such threats at the hardware level, logic locking was proposed as...
OSIRIS Lab Welcomes First Female Hacker-In-Residence
NYU Tandon’s Offensive Security, Incident Response and Internet Security Laboratory, well known as the OSIRIS Lab, recently welcomed a new hacker-in-residence: Sophia d’Antoine, a Senior Security Researcher at Trail of Bits.
Professor Nikhil Gupta's lab develops breakthrough 3D-printed foam
… Only 5 percent of the Earth’s oceans have been explored, according to the National Oceanic and Atmospheric Administration. But that could be changing, thanks in part to a new development by researchers at the NYU Tandon School of Engineering. Coming out of the lab of Professor Nikhil Gupta
Pay Us Bitcoin or Never See Your Files Again…
A study by researchers at Google, Chainalysis, University of California San Diego and NYU Tandon School of Engineering estimated that from 2016 to mid 2017, victims paid $25 million in ransom to get files back. CSE Professor, Damon McCoy’s research was referenced in this article.
On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats
Quanyan Zhu and Stefan Rass Advanced persistent threats (APT) are considered as a significant security threat today. Despite their diversity in nature and details, a common skeleton and sequence of phases can be identified that these attacks follow (in similar ways), which admits a game-theoretic description and analysis. This paper describes a general framework that...
Adaptive and Resilient Revenue Maximizing Dynamic Resource Allocation and Pricing for Cloud-Enabled IoT Systems
Muhammad Junaid Farooq and Quanyan Zhu Cloud computing is becoming an essential component in the emerging Internet of Things (IoT) paradigm. The available resources at the cloud such as computing nodes, storage, databases, etc. are often packaged in the form of virtual machines (VMs) to be used by remotely located IoT client applications for computational...
ADMM-based Networked Stochastic Variational Inference
Hamza Anwar and Quanyan Zhu Owing to the recent advances in “Big Data” modeling and prediction tasks, variational Bayesian estimation has gained popularity due to their ability to provide exact solutions to approximate posteriors. One key technique for approximate inference is stochastic variational inference (SVI) [1]. SVI poses variational inference as a stochastic optimization problem...
Justin Cappos, Associate Professor, featured on PBS Sci Tech
Professor Cappos’ segment on PBS Sci Tech will be airing on 3/26/18 on WLIW at 7:30pm. It will repeat on 3/28/18 at 5:30pm and 4/01/18 at 6pm. Additionally, the show will be posted to https://scitechnow.org/ following the first airing.
Damon McCoy, Assistant Professor, Sat on FTC Information Injury Workshop
Professor McCoy described his research with doxing, which is the public release of people’s information and other methods of social engineering that collect personal information. His research indicates that the use of this data can be innocuous or harmful if it is used for extortion or other stalking purposes.