Muhammad Junaid Farooq and Quanyan Zhu Enabling the Internet of things in remote areas without traditional communication infrastructure requires a multi-layer network architecture. The devices in the overlay network are required to provide coverage to the underlay devices as well as to remain connected to other overlay devices. The coordination, planning, and design of such...
Author: Emerald Knox (Emerald Knox)
Secure Randomized Checkpointing for Digital Microfluidic Biochips
Jack Tang, Mohamed Ibrahim,Krishnendu Chakrabarty and Ramesh Karri Digital microfluidic biochips (DMFBs) integrated with processors and arrays of sensors form cyberphysical systems and consequently face a variety of unique, recently described security threats. It has been noted that techniques used for error recovery can provide some assurance of integrity when a cyberphysical DMFB is under...
New Locky Variant ‘IKARUSdilapidated’ Strikes Again
A second wave of the Locky ransomware variant called IKARUSdilapidated has been identified by security experts. … Locky is notorious for its effectiveness and profitability. Over the past two years, Locky has extorted more than $7.8 million in payments from victims, according a recent study by Google, Chainalysis, UC San Diego, and the NYU Tandon...
Millions That Ransomware Victims Paid Revealed
Sufferers of ransomware attacks have gave more than $25 Million in ransom money for the period of past 2 Years. This was revealed in a survey carried out by scientists from Chainalysis, Google, NYU Tandon School of Engineering, and UC San Diego. The scientists made a complete picture of the ransomware bionetwork by keeping an...
A Look into the Cybersecurity Issues of 3D Printing
3D printing is pervasive across many industries from medical to automotive to aviation to tech and more. But are there security risks associated with 3D printing? Can 3D printers be hacked? Hari Sreenivasan discusses the cybersecurity issues of 3D printing with Nikhil Gupta, Associate Professor of Mechanical Engineering at New York University.
AI Training Algorithms Susceptible to Backdoors, Manipulation
Three researchers from New York University (NYU) have published a paper this week describing a method that an attacker could use to poison deep learning-based artificial intelligence (AI) algorithms. Researchers based their attack on a common practice in the AI community where research teams and companies alike outsource AI training operations using on-demand Machine-Learning-as-a-Service (MLaaS)...
The 5 Coolest Things on Earth This Week
“IllusionPIN,” a new technology developed by researchers at New York University’s Tandon School of Engineering, can automatically shield the screen of an ATM, smartphone or other electronic device. While the user is able to clearly see the information displayed on the device, anyone more than a few feet away sees something completely different. … “Our...
Even Artificial Neural Networks Can Have Exploitable ‘Backdoors’
Malicious actors can design that behavior to emerge only in response to a very specific, secret signal, as in the case of Garg’s Post-it. Such “backdoors” could be a problem for companies that want to outsource work on neural networks to third parties, or build products on top of freely available neural networks available online....
The Latest Use for Bitcoin? Fighting Sex Trafficking
Computer science researchers at the University of California, Berkeley have developed new tools to identify sex trafficking rings, making them easier for law enforcement to target and prosecute. Those efforts have been stymied, according to the researchers’ report, by the vast quantity of ads for sex posted to websites like Backpage.com, only a portion of...
Researchers Built an Invisible Backdoor to Hack AI’s Decisions
A team of NYU researchers has discovered a way to manipulate the artificial intelligence that powers self-driving cars and image recognition by installing a secret backdoor into the software…“We saw that people were increasingly outsourcing the training of these networks, and it kind of set off alarm bells for us,” Brendan Dolan-Gavitt, a professor at...