Samah Mohamed Saeed, Xiaotong Cui, Robert Wille, Alwin Zulehner, Kaijie Wu, Rolf Drechsler, and Ramesh Karri Reversible logic has two main properties. First, the number of inputs is equal to the number of outputs. Second, it implements a one-to-one mapping; i.e., one can reconstruct the inputs from the outputs. These properties enable its applications in...
Author: Emerald Knox (Emerald Knox)
You Really Should Read an App's Service Terms (Video)
When you install an app on your phone, do you read the terms of service agreement? Probably not…”If you’re using a service that’s a free service, then the reason why it’s a free service is because you’re really the product,” Cappos said. “You’re being sold to marketers.”
How The Update Framework Improves Security of Software Updates
Updating software is one of the most important ways to keep users and organizations secure. But how can software be updated securely? That’s the challenge that The Update Framework (TUF) aims to solve. Justin Cappos, assistant professor at New York University [Tandon School of Engineering], detailed how TUF works and what’s coming to further improve...
A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks
Zhiheng Xu and Quanyan Zhu To meet the growing railway-transportation demand, a new train control system, communication-based train control (CBTC) system, aims to maximize the ability of train lines by reducing the headway of each train. However, the wireless communications expose the CBTC system to new security threats. Due to the cyber-physical nature of the...
Electric power dependent dynamic tariffs for water distribution systems
Varghese Kurian, Juntao Chen and Quanyan Zhu Peak time water demands cause significant burden to the utility providers in terms of pumping loads. Its coincidence with the peak hours of electricity consumption makes the situation worse. In this paper, we bring forth the requirement as well as the viability of implementing time-varying tariffs in the ‘smart...
Fingerprints Fall Short When It Comes to Securing Smartphones
Consumers can be pretty lax about their online security. About 4% of the time, the password to unlock a smartphone is 1-2-3-4, says Nasir Memon, a professor of computer science and engineering at New York University Tandon School of Engineering. … A new study, however, conducted over the past year by the Tandon School of...
Optimizing Mission Critical Data Dissemination in Massive IoT Networks
Muhammad Junaid Farooq , Hesham ElSawy , Quanyan Zhu and Mohamed-Slim Alouini. Mission critical data dissemination in massive Internet of things (IoT) networks imposes constraints on the message transfer delay between devices. Due to low power and communication range of IoT devices, data is foreseen to be relayed over multiple device-to-device (D2D) links before reaching...
Crackdowns on Social Media Accounts Backfire by Driving up Demand
Facebook shut down as many as 30,000 fake accounts in the past week — but that’s unlikely to hurt the multi-million-dollar spam industry. … “If you go to the underground markets where they sell fake Facebook accounts, you can buy 1,000 of these for $300 to $400,” Damon McCoy, a New York University [Tandon School...
Computer Scientists Are Developing A ‘Master’ Fingerprint That Could Unlock Your Phone
Fingerprint readers, like the TouchID on an iPhone, exist to make your device extra secure while keeping the process of unlocking it easy. Computer scientists at New York University and Michigan State are poised to turn that security benefit on its head. Like a master key that can open any lock, these researchers developed digital...
Computer Scientists Are Developing a ‘Master’ Fingerprint That Could Unlock Your Phone
Fingerprint readers, like the TouchID on an iPhone, exist to make your device extra secure while keeping the process of unlocking it easy. Computer scientists at New York University and Michigan State are poised to turn that security benefit on its head. … “The sensors are small and they don’t capture the full fingerprint,” says...