Yezekael Hayel and Quanyan Zhu With an increasing number of wide-spreading cyber-attacks on networks such as the recent WannaCry and Petya Ransomware, protection against malware and virus spreading in large scale networks is essential to provide security to network systems. In this paper, we consider a network protection game in which heterogeneous agents decide their...
Author: Emerald Knox (Emerald Knox)
Strategic Defense Against Deceptive Civilian GPS Spoofing of Unmanned Aerial Vehicles
Tao Zhang and Quanyan Zhu The Global Positioning System (GPS) is commonly used in civilian Unmanned Aerial Vehicles (UAVs) to provide geolocation and time information for navigation. However, GPS is vulnerable to many intentional threats such as the GPS signal spoofing, where an attacker can deceive a GPS receiver by broadcasting incorrect GPS signals. Defense...
Women in Tech Tell Us How to Fix the Industry’s Gender Problem (Video)
The headlines calling out tech’s gender gap just keep coming. For women in tech who are used to sexism and discrimination, this isn’t really news. So what could fix the problem? VICE News asked women who work in tech how they’d fix the industry’s gender gap, and they pointed to three main areas for improvement:...
Equifax CEO Richard Smith Is Out Days Before Congressional Hearing
But does Equifax have a problem retaining top talent? The great demand for cybersecurity experts at companies across the world could be one of the reasons these people moved jobs, Dr. Edward Amoroso, a distinguished research professor at New York University’s Tandon School of Engineering, said in a recent interview. Dr. Amoroso said that chief...
Security Smarts for Smartwatches
Smartwatches have quickly gone from sci-fi to commonplace, and it’s easy to see why. … Experts are looking for ways to make smartwatch security stronger and more convenient—including locking in particular—so keep an eye out for new and easier ways to protect yourself from others getting access to the data on your smartwatch. [Articles cites...
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks
Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang and Keith Ross. Popular User-Review Social Networks (URSNs)-such as Dianping, Yelp, and Amazon-are often the targets of reputation attacks in which fake reviews are posted in order to boost or diminish the ratings of listed products and services. These attacks often emanate from a collection of accounts, called...
Linking Amplification DDoS Attacks to Booter Services
Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy and Michael Backes We present techniques for attributing amplification DDoS attacks to the booter services that launched the attack. Our k-Nearest Neighbor (k-NN) classification algorithm is based on features that are characteristic for a DDoS service, such as the set of reflectors used by that service. This...
Apple's Touch ID Is Probably Doomed, And That's OK
When the iPhone X eventually arrives in November it will come loaded with a futuristic camera module that, if all goes right, should let you securely open your phone with little more than a glance. … “Fingerprint scanners have been around a long time,” Nasir Memon, a computer scientist with a focus on cyber security...
Enabling Extreme Energy Efficiency Via Timing Speculation for Deep Neural Network Accelerators
Jeff (Jun) Zhang, Zahra Ghodsi, Kartheek Rangineni and Siddharth Garg Due to the success of deep neural networks (DNN) in achieving and surpassing state-of-the-art results for a range of machine learning applications, there is growing interest in the design of high-performance hardware accelerators for DNN execution. Further, as DNN hardware accelerators are increasingly being deployed...
NYU Tandon’s IllusionPIN Combats Shoulder-Surfing
Researchers at the NYU Tandon School of Engineering recently developed a new technology that combats shoulder-surfing, a spying technique in which personal information such as PINs, passwords and other personal data are obtained by looking over someone’s shoulder or standing next to them. … The project was headed by Tandon professor Nasir Memon, with help...