The iPhone X’s Face ID camera module has received a bit more press than Apple might’ve intended. The facial recognition security tech was the whiz-bang feature that caught everybody’s eye during the Tim Cook and friends keynote—and later it was repeatedly fingered as the culprit behind the long-rumored iPhone X shortages and delays. So what’s...
Author: Emerald Knox (Emerald Knox)
Top Experts: Can Facebook Legally Disclose Russian Ads–What does the Stored Communications Act say?
How could the Stored Communications Act (SCA) prohibit Facebook from providing Congress with the “Russian Ads” one day, but permit it the next?
CNCF Adds Security, Service Mesh and Tracing Projects: Docker Notary, Lyft Envoy and Uber Jaeger
The Cloud Native Computing Foundation (CNCF) has announced the addition of four new hosted projects over the past month ..[including] The Update Framework (TUF) an open source specification that was written in 2009 by Professor Justin Cappos and developed further by members of the Professor Cappos’s Secure Systems Lab at NYU’s Tandon School of Engineering....
A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks
Linan Huang, Juntao Chen, and Quanyan Zhu The integration of modern information and communication technologies (ICTs) into critical infrastructures (CIs) improves its connectivity and functionalities yet also brings cyber threats. It is thus essential to understand the risk of ICTs on CIs holistically as a cyberphysical system and design efficient security hardening mechanisms. To this...
Reverse Engineering Camouflaged Sequential Circuits Without Scan Access
Mohamed El Massad, Siddharth Garg and Mahesh Tripunitara. Integrated circuit (IC) camouflaging is a promising technique to protect the design of a chip from reverse engineering. However, recent work has shown that even camouflaged ICs can be reverse engineered from the observed input/output behaviour of a chip using SAT solvers. However, these so-called SAT attacks have so...
3D Printing Gives Hackers Entirely New Ways to Wreak Havoc
Effects created from a hacked file may not materialize until some point in the future, and when they do, it may be in an entirely unpredictable manner… For example, in a recent study, New York University researchers examined two aspects of 3D printing with cybersecurity implications: printing orientation and insertion of fine defects. These tiny errors inducted...
CNCF Brings In Notary, The Update Framework to Boost Container Security
The Cloud Native Computing Foundation on Oct. 24 announced that it is expanding its project roster with the addition of the Notary container trust project and The Update Framework security effort. Notary relies on TUF, which is a software development and update model that was described in detail by co-creator Justin Cappos, an assistant professor...
The Cloud Native Computing Foundation adds two security projects to its open source stable
Today, the CNCF is expanding its stable with the addition of the Docker-incubated Notary and The Update Framework (TUF), which was originally developed by professor Justin Cappos and his team at NYU’s Tandon School of engineering. These are actually related projects. Notary, which can provide a layer of trust to any content, is actually an...
DPFEE: A High Performance Scalable Pre-processor for Network Security Systems
Vinayaka Jyothi, Sateesh K. Addepalli and Ramesh Karri Network Intrusion Detection Systems (NIDS) and Anti-Denial-of-Service (DoS) employ Deep Packet Inspection (DPI) which provides visibility to the content of payload to detect network attacks. All DPI engines assume a pre-processing step that extracts the various protocol-specific fields. However, application layer (L7) field extraction is computationally expensive. We...
Cybersecurity Awareness Month Lasts All Year Long at Tandon
By developing ways to make automotive software and hardware more resistant to hacking, keep banking PINs reliably private, and a host of other important research, Tandon is always working towards a safer, more secure world. Read on to learn about what our cybersecurity experts have accomplished recently.