Author: Emerald Knox (Emerald Knox)

Home / Emerald Knox
Post

Automotive Electrical/Electronic Architecture Security via Distributed In-Vehicle Traffic Monitoring

Peter Waszecki, Philipp Mundhenk, Sebastian Steinhorst, Martin Lukasiewycz, Ramesh Karri, and Samarjit Chakraborty Due to the growing interconnectedness and complexity of in-vehicle networks, in addition to safety, security is becoming an increasingly important topic in the automotive domain. In this paper we study techniques for detecting security infringements in automotive Electrical and Electronic (E/E) architectures....

Post

FBI Official: Feds Can't Compete With Top Tech Companies for Cybersecurity Analysts

The United States has a shortage of cybersecurity analysts qualified to prevent cyberattacks that is contributing to the vulnerability of the nation’s computer networks, an FBI official said Wednesday…Professor Nasir Memon of the New York University Tandon School of Engineering said a good cybersecurity analyst needs to know not just the technology, but also human...

Post

Mining Anonymity: Identifying Sensitive Accounts on Twitter

Sai Teja Peddinti, Keith W. Ross, and Justin Cappos We explore the feasibility of automatically finding accounts that publish sensitive content on Twitter. One natural approach to this problem is to first create a list of sensitive keywords, and then identify Twitter accounts that use these words in their tweets. But such an approach may...

Post

Microfluidic encryption of on-chip biochemical assays

Sk Subidh Ali- , Mohamed Ibrahim, Ozgur Sinanoglu, Krishnendu Chakrabarty, and Ramesh Karri Recent security analysis of digital micro-fluidic biochips (DMFBs) has revealed that the DMFB design flow is vulnerable to IP piracy, Trojan attacks, overproduction, and counterfeiting. An attacker can launch assay manipulation attacks against DMFBs that are used for clinical diagnostics in healthcare.

Post

A Future Car May Be Protected From Hacking By Software Developed in San Antonio (audio)

Someone looking to hack into your car probably isn’t trying to steal from your bank account…but the results could be far more damaging. … ‘If you can exploit an update system, it is like the golden entryway,’ says NYU Professor of Engineering Justin Cappos. Mott, Cappos and their research teams, which includes NYU’s Tandon School...

Post

Physical Unclonable Functions and Intellectual Property Protection Techniques

Ramesh Karri, Ozgur Sinanoglu and Jeyavijayan Rajendran On one hand, traditionally, secure systems rely on hardware to store the keys for cryptographic protocols. Such an approach is becoming increasingly insecure, due to hardware-intrinsic vulnerabilities. A physical unclonable function (PUF) is a security primitive that exploits inherent hardware properties to generate keys on the fly, instead...

Post

Automotive ECU Updates: Keeping the Hackers Out

We’ve already seen software hacks in vehicles, as Junko Yoshida reported in Auto Security Demands All-Over Answer. Recognizing the problem, a group of researchers, students, and developers from New York University, the University of Michigan, and the Southwest Research Institute have developed a software architecture designed to combat intrusions during ECU firmware updates.