Author: Emerald Knox (Emerald Knox)

Home / Emerald Knox
Post

Securing Software Updates for Automobiles

Trishank Karthik Kuppusamy, Lois Anne Delong and Justin Cappos Software update systems for automobiles can deliver significant benefits, but, if not implemented carefully, they could potentially incur serious security vulnerabilities. Previous solutions for securing software updates consider standard attacks and deploy widely understood security mechanisms, such as digital signatures for the software updates, and hardware...

Post

Security engineering of nanostructures and nanomaterials

Davood Shahrjerdi, Bayan Nasri, Darren Armstrong, Abduallah Alharbi, Ramesh Karri Proliferation of electronics and their increasing connectivity pose formidable challenges for information security. At the most fundamental level, nanostructures and nanomaterials offer an unprecedented opportunity to introduce new approaches to securing electronic devices. First, we discuss engineering nanomaterials, (e.g., carbon nanotubes (CNTs), graphene, and layered transition...

Post

CamoPerturb: secure IC camouflaging for minterm protection

Muhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, and Jeyavijayan Rajendran This paper presents CamoPerturb, a countermeasure to thwart the decamouflaging attack by integrating logic perturbation with IC camouflaging. CamoPerturb, contrary to all the existing camouflaging schemes, perturbs the functionality of the given design minimally, i.e., adds/removes one minterm, rather than camouflaging the design.

Post

Can flexible, domain specific programmable logic prevent IP theft?

Xiaotong Cui, Kaijie Wu, Siddharth Garg and Ramesh Karri Fab-less design houses are outsourcing fabrication to third-party foundries to reduce costs. However, this has security consequences including intellectual property (IP) theft and piracy. Obfuscation techniques have been proposed to increase resistance to reverse engineering, IP recovery, IP theft and piracy.

Post

Power-side-channel analysis of carbon nanotube FET based design

Chandra K. H. Suresh, Bodhisatwa Mazumdar, Sk Subidh Ali and Ozgur Sinanoglu Continuous scaling of CMOS technology beyond sub-nanometer region has aggravated short-channel effects, resulting in increased leakage current and high power densities. Furthermore, elevated leakage current and power density render CMOS based security-critical applications vulnerable to power-side-channel attacks. Carbon Nanotubes (CNT) is a promising alternative to CMOS technology.

Post

A massive cyberattack blocked your favorite websites; FBI and Homeland Security are investigating

The Department of Homeland Security and the FBI are investigating a massive cyberattack that stopped or slowed access to Twitter, Spotify, Amazon and other sites.…Hacking an email server or stealing user account information from a network is more targeted than a DDoS attack, which aims to cause widespread disruption, said Justin Cappos, a professor in...

Post

Yik Yak Users Not So Anonymous After All

…Now users of mobile app Yik Yak face the ignominy of being truly discoverable. At least that’s what a research team at New York University’s Tandon School of Engineering suggests in a new paper… Keith Ross, a professor of computer science at Tandon and the dean of engineering and computer science at New York U’s...

Post

Ensuring Chip Integrity: Siddharth Garg on Securing the Electronic Supply Chain

In today’s electronics industry, chips are designed by globally dispersed teams, outsourced for fabrication, packaging, and testing, and distributed via complex supply chains. In such a scenario, how can chip integrity be guaranteed against threats such as intellectual property (IP) theft, malicious modification, and counterfeiting? Siddharth Garg, assistant professor of electrical and computer engineering at...