Author: Emerald Knox (Emerald Knox)

Home / Emerald Knox
Post

Dynamics of Strategic Protection Against Virus Propagation in Heterogeneous Complex Networks

Yezekael Hayel and Quanyan Zhu With an increasing number of wide-spreading cyber-attacks on networks such as the recent WannaCry and Petya Ransomware, protection against malware and virus spreading in large scale networks is essential to provide security to network systems. In this paper, we consider a network protection game in which heterogeneous agents decide their...

Post

Strategic Defense Against Deceptive Civilian GPS Spoofing of Unmanned Aerial Vehicles

Tao Zhang and Quanyan Zhu The Global Positioning System (GPS) is commonly used in civilian Unmanned Aerial Vehicles (UAVs) to provide geolocation and time information for navigation. However, GPS is vulnerable to many intentional threats such as the GPS signal spoofing, where an attacker can deceive a GPS receiver by broadcasting incorrect GPS signals. Defense...

Post

Equifax CEO Richard Smith Is Out Days Before Congressional Hearing

But does Equifax have a problem retaining top talent? The great demand for cybersecurity experts at companies across the world could be one of the reasons these people moved jobs, Dr. Edward Amoroso, a distinguished research professor at New York University’s Tandon School of Engineering, said in a recent interview. Dr. Amoroso said that chief...

Post

Security Smarts for Smartwatches

Smartwatches have quickly gone from sci-fi to commonplace, and it’s easy to see why. … Experts are looking for ways to make smartwatch security stronger and more convenient—including locking in particular—so keep an eye out for new and easier ways to protect yourself from others getting access to the data on your smartwatch. [Articles cites...

Post

Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks

Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang and Keith Ross. Popular User-Review Social Networks (URSNs)-such as Dianping, Yelp, and Amazon-are often the targets of reputation attacks in which fake reviews are posted in order to boost or diminish the ratings of listed products and services. These attacks often emanate from a collection of accounts, called...

Post

Linking Amplification DDoS Attacks to Booter Services

Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy and Michael Backes We present techniques for attributing amplification DDoS attacks to the booter services that launched the attack. Our k-Nearest Neighbor (k-NN) classification algorithm is based on features that are characteristic for a DDoS service, such as the set of reflectors used by that service. This...

Post

Apple's Touch ID Is Probably Doomed, And That's OK

When the iPhone X eventually arrives in November it will come loaded with a futuristic camera module that, if all goes right, should let you securely open your phone with little more than a glance. … “Fingerprint scanners have been around a long time,” Nasir Memon, a computer scientist with a focus on cyber security...

Post

Enabling Extreme Energy Efficiency Via Timing Speculation for Deep Neural Network Accelerators

Jeff (Jun) Zhang, Zahra Ghodsi, Kartheek Rangineni and Siddharth Garg Due to the success of deep neural networks (DNN) in achieving and surpassing state-of-the-art results for a range of machine learning applications, there is growing interest in the design of high-performance hardware accelerators for DNN execution. Further, as DNN hardware accelerators are increasingly being deployed...

Post

NYU Tandon’s IllusionPIN Combats Shoulder-Surfing

Researchers at the NYU Tandon School of Engineering recently developed a new technology that combats shoulder-surfing, a spying technique in which personal information such as PINs, passwords and other personal data are obtained by looking over someone’s shoulder or standing next to them. … The project was headed by Tandon professor Nasir Memon, with help...