Trishank Karthik Kuppusamy, Lois Anne Delong and Justin Cappos Software update systems for automobiles can deliver significant benefits, but, if not implemented carefully, they could potentially incur serious security vulnerabilities. Previous solutions for securing software updates consider standard attacks and deploy widely understood security mechanisms, such as digital signatures for the software updates, and hardware...
Author: Emerald Knox (Emerald Knox)
Security engineering of nanostructures and nanomaterials
Davood Shahrjerdi, Bayan Nasri, Darren Armstrong, Abduallah Alharbi, Ramesh Karri Proliferation of electronics and their increasing connectivity pose formidable challenges for information security. At the most fundamental level, nanostructures and nanomaterials offer an unprecedented opportunity to introduce new approaches to securing electronic devices. First, we discuss engineering nanomaterials, (e.g., carbon nanotubes (CNTs), graphene, and layered transition...
CamoPerturb: secure IC camouflaging for minterm protection
Muhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, and Jeyavijayan Rajendran This paper presents CamoPerturb, a countermeasure to thwart the decamouflaging attack by integrating logic perturbation with IC camouflaging. CamoPerturb, contrary to all the existing camouflaging schemes, perturbs the functionality of the given design minimally, i.e., adds/removes one minterm, rather than camouflaging the design.
Decision and Game Theory for Security: 7th International Conference, GameSec 2016
Quanyan Zhu, Tansu Alpcan, Emmanouil Panaousis, Milind Tambe, and William Casey This book constitutes the refereed proceedings of the 7th International Conference on Decision and Game Theory for Security, GameSec 2016, held in New York, NY, USA, in November 2016.
Fox 5 Report About Email Security, Featuring Justin Cappos (Video)
Assistant Professor Justin Cappos of NYU Tandon speaks to reporters about email security.
Can flexible, domain specific programmable logic prevent IP theft?
Xiaotong Cui, Kaijie Wu, Siddharth Garg and Ramesh Karri Fab-less design houses are outsourcing fabrication to third-party foundries to reduce costs. However, this has security consequences including intellectual property (IP) theft and piracy. Obfuscation techniques have been proposed to increase resistance to reverse engineering, IP recovery, IP theft and piracy.
Power-side-channel analysis of carbon nanotube FET based design
Chandra K. H. Suresh, Bodhisatwa Mazumdar, Sk Subidh Ali and Ozgur Sinanoglu Continuous scaling of CMOS technology beyond sub-nanometer region has aggravated short-channel effects, resulting in increased leakage current and high power densities. Furthermore, elevated leakage current and power density render CMOS based security-critical applications vulnerable to power-side-channel attacks. Carbon Nanotubes (CNT) is a promising alternative to CMOS technology.
A massive cyberattack blocked your favorite websites; FBI and Homeland Security are investigating
The Department of Homeland Security and the FBI are investigating a massive cyberattack that stopped or slowed access to Twitter, Spotify, Amazon and other sites.…Hacking an email server or stealing user account information from a network is more targeted than a DDoS attack, which aims to cause widespread disruption, said Justin Cappos, a professor in...
Yik Yak Users Not So Anonymous After All
…Now users of mobile app Yik Yak face the ignominy of being truly discoverable. At least that’s what a research team at New York University’s Tandon School of Engineering suggests in a new paper… Keith Ross, a professor of computer science at Tandon and the dean of engineering and computer science at New York U’s...
Ensuring Chip Integrity: Siddharth Garg on Securing the Electronic Supply Chain
In today’s electronics industry, chips are designed by globally dispersed teams, outsourced for fabrication, packaging, and testing, and distributed via complex supply chains. In such a scenario, how can chip integrity be guaranteed against threats such as intellectual property (IP) theft, malicious modification, and counterfeiting? Siddharth Garg, assistant professor of electrical and computer engineering at...