Author: Emerald Knox (Emerald Knox)

Home / Emerald Knox
Post

Obfuscating the Interconnects: Low-Cost and Resilient Full-Chip Layout Camouflaging

Satwik Patnaik, Mohammed Ashraf, Johann Knechtel, and Ozgur Sinanoglu Layout camouflaging (LC) is a promising technique to protect chip design intellectual property (IP) from reverse engineers. Most prior art, however, cannot leverage the full potential of LC due to excessive overheads and/or their limited scope on an FEOL-centric and accordingly customized manufacturing process. If at...

Post

A Quantitative Analysis of Doxing: Who Gets Doxed, and How Can We Detect Doxing Automatically?

A group of NYU [Tandon School of Engineering] and University of Illinois at Chicago computer scientists have presented a paper at the 2017 ACM Internet Measurement Conference in London presenting their findings in a large-scale study of online doxings, with statistics on who gets doxed (the largest cohort being American, male, gamers, and in their...

Post

Cyber Defense Tool Limitations and What Our Leaders Should Be Doing About Them

With: Judith Germano, Senior Fellow at the NYU Center for Cybersecurity and NYU Center on Law & Security and Founder, GermanoLaw LLC Timothy Ryan, Principal, Assurance Services, Fraud Investigation & Dispute Services, Ernst & Young LLP Matthew Waxman, Liviu Librescu Professor of Law and the faculty chair of the National Security Law Program at Columbia...

Post

Why people ruin others’ lives by exposing all their data online

… All these people were doxed – that is, someone published their personal information against their will, in a public forum intended for dissemination and abuse, instigating a torrent of attacks from strangers. … But despite many individual cases catching the public eye, up until now there has been very little research examining the scale...

Post

Weaponizing 3-D printers: Cyberattacks could turn battlefield tech into threats

Flaws [in military equipment] could be introduced in the 3-D printing software by a cyberattack if the printers aren’t equipped with proper cybersecurity, said Nikhil Gupta, New York University associate professor of mechanical and aerospace engineering and an affiliate faculty at the NYU Center for Cyber Security. The possibility of a bug altering a 3-D...

Post

Inaugural Award for Cybersecurity Journalism Honors Wired’s Andy Greenberg for Reporting Russia’s Hack of the Ukraine Grid

WIRED magazine’s July 2017 cover story, Lights Out: How An Entire Nation Became Russia’s Test Lab for Cyberwar, won the inaugural NYU Cyber Security Awareness Week (CSAW) Cyber Journalism Award. Its author, Andy Greenberg, accepted the award. … Ramesh Karri, NYU Tandon professor of electrical and computer engineering, and Charles Seife, professor at the NYU...

Post

Special session: emerging (Un-)reliability based security threats and mitigations for embedded systems

Hussam Amrouch, Prashanth Krishnamurthy, Naman Patel, Jörg Henkel, Ramesh Karri and Farshad Khorrami This paper addresses two reliability-based security threats and mitigations for embedded systems namely, aging and thermal side channels. Device aging can be used as a hardware attack vector by using voltage scaling or specially crafted instruction sequences to violate embedded processor guard bands. Short-term aging effects can be...

Post

There’s Now an Academic Study on the Dark Art of Doxing

Plenty of people want to get famous online, but most people don’t. Researchers at the NYU Tandon School of Engineering and the University of Illinois at Chicago released a report Tuesday on the very modern-day phenomenon of doxing, or revealing someone’s personal information online. The report, “Fifteen Minutes of Unwanted Fame,” analyzed 1.7 million text...

Post

Identifying Synthesis Approaches for IP Piracy of Reversible Circuits

Samah Mohamed Saeed, Nithin Mahendran, Alwin Zulehner, Robert Wille and Ramesh Karri. Reversible circuits are vulnerable to intellectual property and integrated circuit piracy. To show these vulnerabilities, a detailed understanding on how to identify the function embedded in a reversible circuit is crucial. To obtain the embedded function, one needs to know the synthesis approach used...