Justin Cappos warns about the security risks inherent in smart devices such as mobile phones and connected appliances. “You have to ask yourself, is the risk worth the benefit,” he said.
Author: Emerald Knox (Emerald Knox)
Guest Editorial: Special Issue on Secure and Trustworthy Computing
Ozgur Sinanoglu and Ramesh Karri There is a growing concern regarding the trustworthiness and reliability of the hardware underlying all information systems on which modern society is reliant. Trustworthy and reliable semiconductor supply chain, hardware components, and platforms are essential to all critical infrastructures including financial, healthcare, transportation, and energy.
FPGA Trust Zone: Incorporating trust and reliability into FPGA designs
Vinayaka Jyothi, Manasa Thoonoli, Richard Stern and Ramesh Karri This paper proposes a novel methodology FPGA Trust Zone (FTZ) to incorporate security into the design cycle to detect and isolate anomalies such as Hardware Trojans in the FPGA fabric. Anomalies are identified using violation to spatial correlation of process variation in FPGA fabric.
Hardware Trojans: Lessons Learned after One Decade of Research
Kan Xiao, Domenic Forte, Yier Jin, Ramesh Karri, Swarup Bhunia, and Mark Mohammad Tehranipoor Given the increasing complexity of modern electronics and the cost of fabrication, entities from around the globe have become more heavily involved in all phases of the electronics supply chain. In this environment, hardware Trojans (i.e., malicious modifications or inclusions made by untrusted third parties)...
Securing digital microfluidic biochips by randomizing checkpoints
Jack Tang, Ramesh Karri, Mohamed Ibrahim, and Krishnendu Chakrabarty Much progress has been made in digital microfluidic biochips (DMFB), with a great body of literature addressing low-cost, high-performance, and reliable operation. Despite this progress, security of DMFBs has not been adequately addressed. We present an analysis of a DMFB system prone to malicious modification of routes...
You Can Yak but You Can't Hide: Localizing Anonymous Social Network Users
Minhui Xue, Cameron Ballard, Kelvin Liu, Carson Nemelka, Yanqiu Wu, Keith Ross, and Haifeng Qian The recent growth of anonymous social network services — such as 4chan, Whisper, and Yik Yak — has brought online anonymity into the spotlight. For these services to function properly, the integrity of user anonymity must be preserved. If an...
WNYU Radio Interview with Professor Nasir Memon (audio)
Is your credit card ripe for the picking? Some say it is, after crooks finish hijacking a record breaking $4 billion in credit card fraud by the end of 2016. WNYU’s Devin Knight spoke with computer engineering and network security professor Nasir Memon [of NYU Tandon School of Engineering] about ways to protect your info.
How IBM’s Watson Will Change Cybersecurity
IBM captured our imaginations when it unveiled Watson, the artificial intelligence computer capable of playing—and winning—the “Jeopardy” game show. … “Generally we learn by examples,” says Nasir Memon, professor of computer science and engineering at NYU Tandon School of Engineering. “We get an algorithm and examples, and we learn when we are able to look...
World’s Largest Student Cyber Security Contest Names Winners
Students from high schools through doctoral programs throughout North America, the Middle East, North Africa, and India competed in the final rounds of the world’s largest student-run security games, the 13th annual New York University Cyber Security Awareness Week (NYU CSAW), held November 12-14, 2016. For the first time in the history of NYU CSAW,...
Security engineering of nanostructures and nanomaterials
Davood Shahrjerdi, B. Nasri, D. Armstrong, A. Alharbi, and Ramesh Karri Proliferation of electronics and their increasing connectivity pose formidable challenges for information security. At the most fundamental level, nanostructures and nanomaterials offer an unprecedented opportunity to introduce new approaches to securing electronic devices. First, we discuss engineering nanomaterials, (e.g., carbon nanotubes (CNTs), graphene, and layered...