Author: Emerald Knox (Emerald Knox)

Home / Emerald Knox
Post

Lecture Will Explore the Dangers of Hardware Hackers in a World of Interconnected Devices

The eighth event in a series of open lectures on cybersecurity and privacy at the New York University Tandon School of Engineering will convene in Downtown Brooklyn on Tuesday, April 25, 2017, with an exploration of the hardware security challenges posed by interconnected devices and cloud computing. Convergence of IoT, Cloud, Security: A Perfect Storm...

Post

Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering

Nektarios Georgios Tsoutsos, Homer Gamil and Michail Maniatakos As 3D printing becomes more ubiquitous, traditional centralized process chains are transformed to a distributed manufacturing model, where each step of the process can be outsourced to different parties. Despite the countless benefits of this revolutionary technology, outsourcing parts of the process to potentially untrusted parties raises...

Post

Logic Locking for Secure Outsourced Chip Fabrication: A New Attack and Provably Secure Defense Mechanism

Mohamed El Massad, Jun Zhang, Siddharth Garg, and Mahesh V. Tripunitara Chip designers outsource chip fabrication to external foundries, but at the risk of IP theft. Logic locking, a promising solution to mitigate this threat, adds extra logic gates (key gates) and inputs (key bits) to the chip so that it functions correctly only when...

Post

The (Research) Stars Shine Bright in Texas

When Jeyavijayan (JV) Rajendran was a graduate student at the NYU Tandon School of Engineering, it was not unusual to see him mentioned on the school website. Working with Professor Ramesh Karri of Electrical and Computer Engineering, he helped cement Tandon’s reputation at the forefront of hardware security … Now a tenure-track assistant professor at...

Post

Is Privacy Real? The CIA Is Jeopardizing America's Digital Security, Experts Warn

WikiLeaks released the latest cache of confidential C.I.A. documents Thursday as part of an ongoing ‘Vault 7’ operation, exposing the U.S. government of its hacking and digital espionage capabilities. … The agency may have left millions open to the exact attacks it said it was trying to prevent, regardless of its intentions, by not reporting...

Post

Demystifying advanced persistent threats for industrial control systems.

Keliris, Anastasis and Maniatakos, Michail. Cyberattacks are an emerging threat for Industrial Control Systems (ICS) that, given the tight coupling between the cyber and physical components, can have far-reaching implications. It is typical for contemporary ICS components to utilize Commercial-Off-The-Shelf (COTS) hardware and software, rendering them prone to vulnerabilities and exploitation techniques that afflict IT systems (Figure...

Post

3D Printing Has an Urgent Need for Cybersecurity

… According to a new paper, “Manufacturing and Security Challenges in 3D Printing”, written by researchers at New York University’s Tandon School of Engineering … 3D printing carries cybersecurity vulnerabilities that can lead to potentially dangerous, undetectable defects as well as opening the door for counterfeit products. Nikhil Gupta, an associate professor of mechanical and...