Author: Emerald Knox (Emerald Knox)

Home / Emerald Knox
Post

Popular Science Names Two Brooklyn Technologies Among Top 100 Inventions of 2017

Two new technologies born in Downtown Brooklyn made Popular Science magazine’s list of top inventions for 2017. Uptane, a cybersecurity for cars project out of NYU Tandon, and goTenna, a decentralized cell network technology were listed in the magazine’s Best of What’s New feature. … Uptane is the work of NYU Tandon professor Justin Cappos...

Post

The 100 greatest innovations of 2017

Don’t let nefarious coders take you for a ride. Late-model cars are basically just engines wrapped in computers. Those computers need updates, but malicious code hidden in software can leave you driving a couple tons of compromised steel. Hackers could track you, or even steer you off the road. Uptane—an open-source software protocol—checks incoming instructions...

Post

Game-Theoretic Design of Secure and Resilient Distributed Support Vector Machines with Adversaries

Rui Zhang and Quanyan Zhu With a large number of sensors and control units in networked systems, distributed support vector machines (DSVMs) play a fundamental role in scalable and efficient multisensor classification and prediction tasks. However, DSVMs are vulnerable to adversaries who can modify and generate data to deceive the system to misclassification and misprediction....

Post

An Information Theoretic Framework for Active De-anonymization in Social Networks Based on Group Memberships

Farhad Shirani, Siddharth Garg, and Elza Erkip In this paper, a new mathematical formulation for the problem of de-anonymizing social network users by actively querying their membership in social network groups is introduced. In this formulation, the attacker has access to a noisy observation of the group membership of each user in the social network....

Post

Rethinking Split Manufacturing: An Information-Theoretic Approach with Secure Layout Techniques

Abhrajit Sengupta, Satwik Patnaik, Johann Knechtel, Mohammed Ashraf, Siddharth Garg and Ozgur Sinanoglu Split manufacturing is a promising technique to defend against fab-based malicious activities such as IP piracy, overbuilding, and insertion of hardware Trojans. However, a network flow-based proximity attack, proposed by Wang et al. (DAC’16) [1], has demonstrated that most prior art on split manufacturing is highly...

Post

Manipulating Adversary’s Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security

Karel Horák, Quanyan Zhu and Branislav Bošanský. Due to the sophisticated nature of current computer systems, traditional defense measures, such as firewalls, malware scanners, and intrusion detection/prevention systems, have been found inadequate. These technological systems suffer from the fact that a sophisticated attacker can study them, identify their weaknesses and thus get an advantage over the defender. To prevent this...