Two new technologies born in Downtown Brooklyn made Popular Science magazine’s list of top inventions for 2017. Uptane, a cybersecurity for cars project out of NYU Tandon, and goTenna, a decentralized cell network technology were listed in the magazine’s Best of What’s New feature. … Uptane is the work of NYU Tandon professor Justin Cappos...
Author: Emerald Knox (Emerald Knox)
The 100 greatest innovations of 2017
Don’t let nefarious coders take you for a ride. Late-model cars are basically just engines wrapped in computers. Those computers need updates, but malicious code hidden in software can leave you driving a couple tons of compromised steel. Hackers could track you, or even steer you off the road. Uptane—an open-source software protocol—checks incoming instructions...
Game-Theoretic Design of Secure and Resilient Distributed Support Vector Machines with Adversaries
Rui Zhang and Quanyan Zhu With a large number of sensors and control units in networked systems, distributed support vector machines (DSVMs) play a fundamental role in scalable and efficient multisensor classification and prediction tasks. However, DSVMs are vulnerable to adversaries who can modify and generate data to deceive the system to misclassification and misprediction....
An Information Theoretic Framework for Active De-anonymization in Social Networks Based on Group Memberships
Farhad Shirani, Siddharth Garg, and Elza Erkip In this paper, a new mathematical formulation for the problem of de-anonymizing social network users by actively querying their membership in social network groups is introduced. In this formulation, the attacker has access to a noisy observation of the group membership of each user in the social network....
Understanding Cyber Collateral Damage
In this article, Sasha Romanosky and Zachary Goldman address the problem of how to define “collateral damage” in the cyber realm.
OSIRIS
CSAW
Rethinking Split Manufacturing: An Information-Theoretic Approach with Secure Layout Techniques
Abhrajit Sengupta, Satwik Patnaik, Johann Knechtel, Mohammed Ashraf, Siddharth Garg and Ozgur Sinanoglu Split manufacturing is a promising technique to defend against fab-based malicious activities such as IP piracy, overbuilding, and insertion of hardware Trojans. However, a network flow-based proximity attack, proposed by Wang et al. (DAC’16) [1], has demonstrated that most prior art on split manufacturing is highly...
Understanding China’s Crackdown on Bitcoin and ICOs
China’s crackdown on ICO’s highlights an underappreciated perspective: consumer protection
Manipulating Adversary’s Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security
Karel Horák, Quanyan Zhu and Branislav Bošanský. Due to the sophisticated nature of current computer systems, traditional defense measures, such as firewalls, malware scanners, and intrusion detection/prevention systems, have been found inadequate. These technological systems suffer from the fact that a sophisticated attacker can study them, identify their weaknesses and thus get an advantage over the defender. To prevent this...