Author: Emerald Knox (Emerald Knox)

Home / Emerald Knox
Post

iPhone X First Look: Let's Talk About Face ID

The iPhone X’s Face ID camera module has received a bit more press than Apple might’ve intended. The facial recognition security tech was the whiz-bang feature that caught everybody’s eye during the Tim Cook and friends keynote—and later it was repeatedly fingered as the culprit behind the long-rumored iPhone X shortages and delays. So what’s...

Post

CNCF Adds Security, Service Mesh and Tracing Projects: Docker Notary, Lyft Envoy and Uber Jaeger

The Cloud Native Computing Foundation (CNCF) has announced the addition of four new hosted projects over the past month ..[including] The Update Framework (TUF) an open source specification that was written in 2009 by Professor Justin Cappos and developed further by members of the Professor Cappos’s Secure Systems Lab at NYU’s Tandon School of Engineering....

Post

A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks

Linan Huang, Juntao Chen, and Quanyan Zhu The integration of modern information and communication technologies (ICTs) into critical infrastructures (CIs) improves its connectivity and functionalities yet also brings cyber threats. It is thus essential to understand the risk of ICTs on CIs holistically as a cyberphysical system and design efficient security hardening mechanisms. To this...

Post

Reverse Engineering Camouflaged Sequential Circuits Without Scan Access

Mohamed El Massad, Siddharth Garg and Mahesh Tripunitara. Integrated circuit (IC) camouflaging is a promising technique to protect the design of a chip from reverse engineering. However, recent work has shown that even camouflaged ICs can be reverse engineered from the observed input/output behaviour of a chip using SAT solvers. However, these so-called SAT attacks have so...

Post

3D Printing Gives Hackers Entirely New Ways to Wreak Havoc

Effects created from a hacked file may not materialize until some point in the future, and when they do, it may be in an entirely unpredictable manner… For example, in a recent study, New York University researchers examined two aspects of 3D printing with cybersecurity implications: printing orientation and insertion of fine defects. These tiny errors inducted...

Post

The Cloud Native Computing Foundation adds two security projects to its open source stable

Today, the CNCF is expanding its stable with the addition of the Docker-incubated Notary and The Update Framework (TUF), which was originally developed by professor Justin Cappos and his team at NYU’s Tandon School of engineering. These are actually related projects. Notary, which can provide a layer of trust to any content, is actually an...

Post

DPFEE: A High Performance Scalable Pre-processor for Network Security Systems

Vinayaka Jyothi, Sateesh K. Addepalli and Ramesh Karri Network Intrusion Detection Systems (NIDS) and Anti-Denial-of-Service (DoS) employ Deep Packet Inspection (DPI) which provides visibility to the content of payload to detect network attacks. All DPI engines assume a pre-processing step that extracts the various protocol-specific fields. However, application layer (L7) field extraction is computationally expensive. We...