Author: Emerald Knox (Emerald Knox)

Home / Emerald Knox
Post

Researchers Race To Develop Software To Prevent Car Hacking (audio – featuring Prof. Justin Cappos at 1:19)

Modern cars have between 50 and 100 electronic control units, or computers, to run everything from the overhead dome light to the automatic transmission. Many of the computers are networked together but made by different vendors, which makes them easier to hack. Now, researchers backed by the Department of Homeland Security are looking for ways to...

Post

New Forensic Tool Could Add Filter to Child Porn Scans

The staggering amount of data involved in searching for child pornography is a serious hurdle in hunting down pedophile rings. … A new set of filters improving the ability to comb through terabytes of data and hundreds of thousands of hours of video is now under development by computer scientists at New York University. The...

Post

New Forensics Tools Will Speed the Identification and Rescue of Children Pictured in Child Sexual Exploitation Material

Researchers at the New York University Tandon School of Engineering and the digital intelligence tech company Griffeye have begun building a sophisticated suite of tools to be provided pro bono to law enforcement officials seeking to identify children in child sexual exploitation material (sometimes referred to as child pornography) and rescuing victims. … Professor of...

Post

Learning from Experience: A Dynamic Closed-Loop QoE Optimization for Video Adaptation and Delivery

Imen Triki, Quanyan Zhu, Rachid Elazouzi, Majed Haddad, and Zhiheng Xu In general, the quality of experience QoE is subjective and context-dependent, identifying and calculating the factors that affect QoE is a difficult task. Recently, a lot of effort has been devoted to estimating the users QoE in order to enhance video delivery. In the...

Post

Secure and Flexible Trace-Based Debugging of Systems-on-Chip

Jerry Backer, David Hely and Ramesh Karri This work tackles the conflict between enforcing security of a system-on-chip (SoC) and providing observability during trace-based debugging. On one hand, security objectives require that assets remain confidential at different stages of the SoC life cycle. On the other hand, the trace-based debug infrastructure exposes values of internal...

Post

Phishing for Phools in the Internet of Things: Modeling One-to-Many Deception using Poisson Signaling Games

Jeffrey Pawlick and Quanyan Zhu Strategic interactions ranging from politics and pharmaceuticals to e-commerce and social networks support equilibria in which agents with private information manipulate others which are vulnerable to deception. Especially in cyberspace and the Internet of things, deception is difficult to detect and trust is complicated to establish. For this reason, effective...

Post

Law Enforcement Agencies to Receive Free Access to NYU Developed Solution Combating Child Exploitation

Researchers at the New York University Tandon School of Engineering and the digital intelligence tech company Griffeye have begun building a sophisticated suite of tools to be provided pro bono to law enforcement officials seeking to identify children in child sexual exploitation material (sometimes referred to as child pornography) and rescuing victims….Professor of Computer Science...

Post

Fox 5 Report: WikiLeaks Revelation of CIA Documents and Personal Device Vulnerabilities, Featuring Professor Justin Cappos (at 3.14)

Justin Cappos speaks with Ernie Anastos, news anchor for Fox 5 News about CIA documents revealed by WikiLeaks, and vulnerabilities of consumer devices. “It’s concerning to me that there is this big warehouse of information on weaknesses that were not disclosed to the vendors of these products, that is now available to hackers and people...