Yuan Liu, Jie Zhang, Quanyan Zhu and Xingwei Wang In electronic commerce, buyers and sellers conduct transactions without physical interactions. In reputation systems, the trustworthiness of sellers is achieved by aggregating the ratings shared by other buyers with whom the sellers have ever conducted transactions. However, the ratings provided by buyers for evaluating the same...
Author: Emerald Knox (Emerald Knox)
PRNU-Based Camera Attribution from Multiple Seam-Carved Images
Samet Taspinar, Manoranjan Mohanty and Nasir Memon Photo Response Non-Uniformity (PRNU) noisebased source attribution is a well known technique to verify the camera of an image or video. Researchers have proposed various countermeasures to prevent PRNU-based source camera attribution. Forced seam-carving is one such recently proposed counter forensics technique. This technique can disable PRNUbased source...
Fake news on agenda at IIT Kanpur's global cyber security competition
The Indian Institute of Technology, Kanpur (IIT-K) is gearing up to host an international-level cyber security competition in collaboration with institutions based in the US, Israel and other countries…This would be the second edition of the world’s biggest student-run cyber security event, Cyber Security Awareness Week (CSAW), which was founded 14 years ago by the...
Trump Hotels Hacked – Again
For the third time in three years, 14 Trump properties have had security breaches exposing customer credit card information. … “It seems very negligent that this could happen a number of times,” Justin Cappos, associate professor of systems and security at New York University, told the Washington Post. “These patterns of oversight are a huge...
A Participant in the Cybersecurity Summer Faculty Program Goes on to Win NSF Career Award
Qiaoyan Yu, an associate professor of electrical and computer engineering at the University of New Hampshire, recently received a prestigious National Science Foundation (NSF) CAREER Award for her development of proactive methods of defending the integrity and security of chips…“While this well-deserved accomplishment is all her own,” Ramesh Karri, a Professor of Electrical and Computer...
World's Biggest Student-Led Cyber Security Games Expand to Israel
The world’s biggest student-run cyber security event will get even bigger this year: Cyber Security Awareness Week (CSAW), founded 14 years ago by the New York University Tandon School of Engineering, announced it will expand to Israel, which will become the fifth country to host the final rounds of competitions that test the skills of...
Fingerprint to Fly?
…Computers that store personal information about Delta’s customers, including fingerprints, could be hacked. And unlike a stolen password that can be changed, a fingerprint is indelible. … “With a password, you can just change it and move on with your life. You can’t do that with fingerprints,” said Nasir Memon, a professor of computer science...
A First Legislative Step in the IoT Security Battle
Despite appearances, there is some important bipartisan work afoot on Capitol Hill. On Aug. 1, Sens. Mark Warner, Cory Gardner, Ron Wyden and Steve Daines dropped the Internet of Things (IoT) Cybersecurity Improvements Act of 2017.
A First Legislative Step in the IoT Security Battle
Randal Milch, Distinguished Fellow at the Center on Law and Security at NYU School of Law and the NYU Center for Cybersecurity, comments on the Internet of Things (IoT) Cybersecurity Improvements Act of 2017: The bill seeks to use the federal government’s purchasing power to drive much-needed cybersecurity improvements in internet-connected devices. In addition, the...
Large-Scale 3D Chips: Challenges and Solutions for Design Automation, Testing, and Trustworthy Integration
Johann Knechtel, Ozgur Sinanoglu, Ibrahim (Abe) M. Elfadel, Jens Lienig and Cliff C. N. Sze Three-dimensional (3D) integration of electronic chips has been advocated by both industry and academia for many years. It is acknowledged as one of the most promising approaches to meet ever-increasing demands on performance, functionality, and power consumption. Furthermore, 3D integration...