Author: Emerald Knox (Emerald Knox)

Home / Emerald Knox
Post

Guest Editorial: Special Issue on Secure and Trustworthy Computing

Ozgur Sinanoglu and Ramesh Karri There is a growing concern regarding the trustworthiness and reliability of the hardware underlying all information systems on which modern society is reliant. Trustworthy and reliable semiconductor supply chain, hardware components, and platforms are essential to all critical infrastructures including financial, healthcare, transportation, and energy.

Post

FPGA Trust Zone: Incorporating trust and reliability into FPGA designs

Vinayaka Jyothi, Manasa Thoonoli, Richard Stern and Ramesh Karri This paper proposes a novel methodology FPGA Trust Zone (FTZ) to incorporate security into the design cycle to detect and isolate anomalies such as Hardware Trojans in the FPGA fabric. Anomalies are identified using violation to spatial correlation of process variation in FPGA fabric.

Post

Hardware Trojans: Lessons Learned after One Decade of Research

Kan Xiao, Domenic Forte, Yier Jin, Ramesh Karri, Swarup Bhunia, and Mark Mohammad Tehranipoor  Given the increasing complexity of modern electronics and the cost of fabrication, entities from around the globe have become more heavily involved in all phases of the electronics supply chain. In this environment, hardware Trojans (i.e., malicious modifications or inclusions made by untrusted third parties)...

Post

Securing digital microfluidic biochips by randomizing checkpoints

Jack Tang, Ramesh Karri, Mohamed Ibrahim, and Krishnendu Chakrabarty Much progress has been made in digital microfluidic biochips (DMFB), with a great body of literature addressing low-cost, high-performance, and reliable operation. Despite this progress, security of DMFBs has not been adequately addressed. We present an analysis of a DMFB system prone to malicious modification of routes...

Post

WNYU Radio Interview with Professor Nasir Memon (audio)

Is your credit card ripe for the picking? Some say it is, after crooks finish hijacking a record breaking $4 billion in credit card fraud by the end of 2016. WNYU’s Devin Knight spoke with computer engineering and network security professor Nasir Memon [of NYU Tandon School of Engineering] about ways to protect your info.

Post

How IBM’s Watson Will Change Cybersecurity

IBM captured our imaginations when it unveiled Watson, the artificial intelligence computer capable of playing—and winning—the “Jeopardy” game show. … “Generally we learn by examples,” says Nasir Memon, professor of computer science and engineering at NYU Tandon School of Engineering. “We get an algorithm and examples, and we learn when we are able to look...

Post

World’s Largest Student Cyber Security Contest Names Winners

Students from high schools through doctoral programs throughout North America, the Middle East, North Africa, and India competed in the final rounds of the world’s largest student-run security games, the 13th annual New York University Cyber Security Awareness Week (NYU CSAW), held November 12-14, 2016. For the first time in the history of NYU CSAW,...

Post

Security engineering of nanostructures and nanomaterials

Davood Shahrjerdi, B. Nasri, D. Armstrong, A. Alharbi, and Ramesh Karri Proliferation of electronics and their increasing connectivity pose formidable challenges for information security. At the most fundamental level, nanostructures and nanomaterials offer an unprecedented opportunity to introduce new approaches to securing electronic devices. First, we discuss engineering nanomaterials, (e.g., carbon nanotubes (CNTs), graphene, and layered...