Author: Emerald Knox (Emerald Knox)

Home / Emerald Knox
Post

3D Printing Industry Review Of The Year May 2017

A month of celebration – in May we held the first ever annual 3D Printing Industry Awards and hosted a gala dinner of esteemed guests including Siemens, 3D Systems, Ultimaker, Zortrax, Desktop Metal, Shining 3D, Markforged, Zortrax, Sinterit, HP, Dassault Systèmes, DWS, Autodesk, Polymaker and UCL. … And a team at the New York University...

Post

CCS and C2SMART Center Post-Doc Opportunity

The C2SMART Center and the NYU Center for Cybersecurity (cyber.nyu.edu) are jointly seeking to hire a Post-doctoral fellow to conduct state-of-the art research on emerging transportation cybersecurity problems. With the emergence of connected and autonomous vehicles as well as the increasing levels of automation of all transportation systems, there is a growing recognition of cybersecurity...

Post

TERMinator Suite: Benchmarking Privacy-Preserving Architectures

Dimitris Mouris, Nektarios Georgios Tsoutsos, and Michail Maniatakos Security and privacy are fundamental objectives characterizing contemporary cloud computing. Despite the wide adoption of encryption for protecting data in transit and at rest, data in use remains unencrypted inside cloud processors and memories, as computation is not applicable on encrypted values. This limitation introduces security risks,...

Post

A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy

Jeffrey Pawlick, Edward Colbert and Quanyan Zhu. Cyber attacks on both databases and critical infrastructure have threatened public and private sectors. Meanwhile, ubiquitous tracking and wearable computing have infringed upon privacy. Advocates and engineers have recently proposed using defensive deception as a means to leverage the information asymmetry typically enjoyed by attackers as a tool...

Post

Image Carving with Missing Headers and Missing Fragments

Emre Durmus, Manoranjan Mohanty, Samet Taspinar, Erkam Uzun and Nasir Memon Although some remarkable advancements have been made in image carving, even in the presence of fragmentation, existing methods are not effective when parts (fragments) of an image are missing. This paper addresses this problem and proposes a PRNU (Photo Response Non-Uniformity)-based image carving method....

Post

NYU Tandon Becomes a Center of Influence in the World of Hardware Security

Since 2002, when NYU Tandon Professor of Electrical and Computer Engineering Ramesh Karri and his students generated the first research on attack-resilient chip architecture, the school has been at the forefront of this vital field, demonstrating before anyone else that integrated circuits’ test and debug ports could be used by hackers; delivering the first set...

Post

Let’s Talk About the Latest Godawful Cybersecurity Plan

By 2020, some major companies will shovel billions of dollars into developing more comprehensive forms of security according to the International Data Corporation, and policy-makers are following closely, proposing new legislation and regulations to accompany them. One of the latest is the newly repurposed Active Cyber Defense Certainty (ACDC) Act, also called the hack-back bill....

Post

Random Light Patterns – A Novel Cyber Security Solution?

Researchers at New York University Tandon School of Engineering have developed a new class of unclonable cybersecurity security primitives using the high level of structural randomness in 2D MoS2. … In a paper published in the journal ACS Nano (‘Physically Unclonable Cryptographic Primitives by Chemical Vapor Deposition of Layered MoS2), Davood Shahrjerdi and his NYU...

Post

A Timely Talk About Cyber Threats to Our Democracy

On November 16, as many Americans prepared for Thanksgiving, Ed Amoroso — former chief security officer of AT&T Services, advisor to four presidential administrations, CEO of global security firm TAG Cyber LLC, and NYU Tandon Distinguished Research Professor — gave a rapt audience a good reason to be thankful: that there are brilliant, experienced, and...

Post

Evolution of Logic Locking

Muhammad Yasin and Ozgur Sinanoglu The globalization of integrated circuit (IC) supply chain and the emergence of threats, such as intellectual property (IP) piracy, reverse engineering, and hardware Trojans, have forced semiconductor companies to revisit the trust in the supply chain. Logic locking is emerging as a popular and effective countermeasure against these threats. Over...