Satwik Patnaik, Mohammed Ashraf, Johann Knechtel, and Ozgur Sinanoglu Layout camouflaging (LC) is a promising technique to protect chip design intellectual property (IP) from reverse engineers. Most prior art, however, cannot leverage the full potential of LC due to excessive overheads and/or their limited scope on an FEOL-centric and accordingly customized manufacturing process. If at...
Author: Emerald Knox (Emerald Knox)
A Quantitative Analysis of Doxing: Who Gets Doxed, and How Can We Detect Doxing Automatically?
A group of NYU [Tandon School of Engineering] and University of Illinois at Chicago computer scientists have presented a paper at the 2017 ACM Internet Measurement Conference in London presenting their findings in a large-scale study of online doxings, with statistics on who gets doxed (the largest cohort being American, male, gamers, and in their...
Cyber Defense Tool Limitations and What Our Leaders Should Be Doing About Them
With: Judith Germano, Senior Fellow at the NYU Center for Cybersecurity and NYU Center on Law & Security and Founder, GermanoLaw LLC Timothy Ryan, Principal, Assurance Services, Fraud Investigation & Dispute Services, Ernst & Young LLP Matthew Waxman, Liviu Librescu Professor of Law and the faculty chair of the National Security Law Program at Columbia...
Why people ruin others’ lives by exposing all their data online
… All these people were doxed – that is, someone published their personal information against their will, in a public forum intended for dissemination and abuse, instigating a torrent of attacks from strangers. … But despite many individual cases catching the public eye, up until now there has been very little research examining the scale...
Weaponizing 3-D printers: Cyberattacks could turn battlefield tech into threats
Flaws [in military equipment] could be introduced in the 3-D printing software by a cyberattack if the printers aren’t equipped with proper cybersecurity, said Nikhil Gupta, New York University associate professor of mechanical and aerospace engineering and an affiliate faculty at the NYU Center for Cyber Security. The possibility of a bug altering a 3-D...
Inaugural Award for Cybersecurity Journalism Honors Wired’s Andy Greenberg for Reporting Russia’s Hack of the Ukraine Grid
WIRED magazine’s July 2017 cover story, Lights Out: How An Entire Nation Became Russia’s Test Lab for Cyberwar, won the inaugural NYU Cyber Security Awareness Week (CSAW) Cyber Journalism Award. Its author, Andy Greenberg, accepted the award. … Ramesh Karri, NYU Tandon professor of electrical and computer engineering, and Charles Seife, professor at the NYU...
Special session: emerging (Un-)reliability based security threats and mitigations for embedded systems
Hussam Amrouch, Prashanth Krishnamurthy, Naman Patel, Jörg Henkel, Ramesh Karri and Farshad Khorrami This paper addresses two reliability-based security threats and mitigations for embedded systems namely, aging and thermal side channels. Device aging can be used as a hardware attack vector by using voltage scaling or specially crafted instruction sequences to violate embedded processor guard bands. Short-term aging effects can be...
There’s Now an Academic Study on the Dark Art of Doxing
Plenty of people want to get famous online, but most people don’t. Researchers at the NYU Tandon School of Engineering and the University of Illinois at Chicago released a report Tuesday on the very modern-day phenomenon of doxing, or revealing someone’s personal information online. The report, “Fifteen Minutes of Unwanted Fame,” analyzed 1.7 million text...
Identifying Synthesis Approaches for IP Piracy of Reversible Circuits
Samah Mohamed Saeed, Nithin Mahendran, Alwin Zulehner, Robert Wille and Ramesh Karri. Reversible circuits are vulnerable to intellectual property and integrated circuit piracy. To show these vulnerabilities, a detailed understanding on how to identify the function embedded in a reversible circuit is crucial. To obtain the embedded function, one needs to know the synthesis approach used...
Linux Foundation Taps Researcher’s Security Framework as Standard for the Cloud
The Linux Foundation recently recognized The Update Framework (TUF), which is overseen by a research team at NYU Tandon School of Engineering, as a key security system. … The Foundation tapped TUF as one of two new projects hosted by its Cloud Native Computing Foundation (CNCF). The other is Notary — the most prominent implementation...