Author: Emerald Knox (Emerald Knox)

Home / Emerald Knox
Post

Towards Reverse Engineering Reversible Logic

Samah Mohamed Saeed, Xiaotong Cui, Robert Wille, Alwin Zulehner, Kaijie Wu, Rolf Drechsler, and Ramesh Karri Reversible logic has two main properties. First, the number of inputs is equal to the number of outputs. Second, it implements a one-to-one mapping; i.e., one can reconstruct the inputs from the outputs. These properties enable its applications in...

Post

How The Update Framework Improves Security of Software Updates

Updating software is one of the most important ways to keep users and organizations secure. But how can software be updated securely? That’s the challenge that The Update Framework (TUF) aims to solve. Justin Cappos, assistant professor at New York University [Tandon School of Engineering], detailed how TUF works and what’s coming to further improve...

Post

A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks

Zhiheng Xu and Quanyan Zhu To meet the growing railway-transportation demand, a new train control system, communication-based train control (CBTC) system, aims to maximize the ability of train lines by reducing the headway of each train. However, the wireless communications expose the CBTC system to new security threats. Due to the cyber-physical nature of the...

Post

Electric power dependent dynamic tariffs for water distribution systems

Varghese Kurian, Juntao Chen and Quanyan Zhu Peak time water demands cause significant burden to the utility providers in terms of pumping loads. Its coincidence with the peak hours of electricity consumption makes the situation worse. In this paper, we bring forth the requirement as well as the viability of implementing time-varying tariffs in the ‘smart...

Post

Fingerprints Fall Short When It Comes to Securing Smartphones

Consumers can be pretty lax about their online security. About 4% of the time, the password to unlock a smartphone is 1-2-3-4, says Nasir Memon, a professor of computer science and engineering at New York University Tandon School of Engineering. … A new study, however, conducted over the past year by the Tandon School of...

Post

Optimizing Mission Critical Data Dissemination in Massive IoT Networks

Muhammad Junaid Farooq , Hesham ElSawy , Quanyan Zhu  and Mohamed-Slim Alouini. Mission critical data dissemination in massive Internet of things (IoT) networks imposes constraints on the message transfer delay between devices. Due to low power and communication range of IoT devices, data is foreseen to be relayed over multiple device-to-device (D2D) links before reaching...