Modern cars have between 50 and 100 electronic control units, or computers, to run everything from the overhead dome light to the automatic transmission. Many of the computers are networked together but made by different vendors, which makes them easier to hack. Now, researchers backed by the Department of Homeland Security are looking for ways to...
Author: Emerald Knox (Emerald Knox)
New Forensic Tool Could Add Filter to Child Porn Scans
The staggering amount of data involved in searching for child pornography is a serious hurdle in hunting down pedophile rings. … A new set of filters improving the ability to comb through terabytes of data and hundreds of thousands of hours of video is now under development by computer scientists at New York University. The...
New Forensics Tools Will Speed the Identification and Rescue of Children Pictured in Child Sexual Exploitation Material
Researchers at the New York University Tandon School of Engineering and the digital intelligence tech company Griffeye have begun building a sophisticated suite of tools to be provided pro bono to law enforcement officials seeking to identify children in child sexual exploitation material (sometimes referred to as child pornography) and rescuing victims. … Professor of...
Learning from Experience: A Dynamic Closed-Loop QoE Optimization for Video Adaptation and Delivery
Imen Triki, Quanyan Zhu, Rachid Elazouzi, Majed Haddad, and Zhiheng Xu In general, the quality of experience QoE is subjective and context-dependent, identifying and calculating the factors that affect QoE is a difficult task. Recently, a lot of effort has been devoted to estimating the users QoE in order to enhance video delivery. In the...
Secure and Flexible Trace-Based Debugging of Systems-on-Chip
Jerry Backer, David Hely and Ramesh Karri This work tackles the conflict between enforcing security of a system-on-chip (SoC) and providing observability during trace-based debugging. On one hand, security objectives require that assets remain confidential at different stages of the SoC life cycle. On the other hand, the trace-based debug infrastructure exposes values of internal...
NYU Tandon Paper on Cyber Risks of 3D Printing is Springer’s Most-Read Engineering Research of 2016
The publishing company Springer has more than 245 engineering journals in its portfolio … when editors took stock of the works that had been the most cited, downloaded, and shared in 2016, it was an article from JOM, The Journal of the Minerals, Metals & Materials Society that stood out at number one in the...
Phishing for Phools in the Internet of Things: Modeling One-to-Many Deception using Poisson Signaling Games
Jeffrey Pawlick and Quanyan Zhu Strategic interactions ranging from politics and pharmaceuticals to e-commerce and social networks support equilibria in which agents with private information manipulate others which are vulnerable to deception. Especially in cyberspace and the Internet of things, deception is difficult to detect and trust is complicated to establish. For this reason, effective...
Law Enforcement Agencies to Receive Free Access to NYU Developed Solution Combating Child Exploitation
Researchers at the New York University Tandon School of Engineering and the digital intelligence tech company Griffeye have begun building a sophisticated suite of tools to be provided pro bono to law enforcement officials seeking to identify children in child sexual exploitation material (sometimes referred to as child pornography) and rescuing victims….Professor of Computer Science...
The 42 Words You Can Never Say in Emails to the D.C. Government
The District’s email system, it turns out, has a lot more verboten words than that: 42. A test email from The Post with one of the offending terms to a dc.gov email address brought a bounceback notice. … Justin Cappos, an assistant professor of systems and security at New York University [Tandon School of Engineering],...
Fox 5 Report: WikiLeaks Revelation of CIA Documents and Personal Device Vulnerabilities, Featuring Professor Justin Cappos (at 3.14)
Justin Cappos speaks with Ernie Anastos, news anchor for Fox 5 News about CIA documents revealed by WikiLeaks, and vulnerabilities of consumer devices. “It’s concerning to me that there is this big warehouse of information on weaknesses that were not disclosed to the vendors of these products, that is now available to hackers and people...