Author: Emerald Knox (Emerald Knox)

Home / Emerald Knox
Post

System, method and computer-accessible medium for security-centric electronic system design

Jeyavijayan Rajendran, Ramesh Karri, and Ozgur Sinanoglu An exemplary system, method and computer-accessible medium can be provided which can include, for example, generating a super control dataflow graph(s) (CDFG) by applying a plurality of electronic system level ESL design constraints associated with an integrated circuit, determining an upper bound(s) number and a lower bound(s) number based...

Post

Does My Eye Deceive Me? Not With These Digital Forensics Tools

The Internet is awash with images and videos that may hold national security and intelligence value, but the task of teasing out real images from  altered ones is formidable. Even off-the-shelf editing tools can trick digital forensics experts. Nasir Memon, professor of computer science and engineering at the New York University Tandon School of Engineering,...

Post

Winning High School Cyber Sleuths to Compete in Forensics Challenge at NYU Tandon, NYU Abu Dhabi

More than 20 teams of high school students in the United States and the United Arab Emirates have won coveted slots to compete in the world’s largest set of student-led cybersecurity contests, the New York University Tandon School of Engineering’s annual Cyber Security Awareness Week (CSAW) games. For the first time, the final round of...

Post

Professor Memon Takes Part in Forum on Underrepresented Groups in Cybersecurity

On October 4, the International Consortium of Minority Cybersecurity Professionals (ICMCP), in partnership with IBM, hosted an all-day forum on women and minorities in the field of cybersecurity, and included on the list of speakers was Professor of Computer Science and Engineering Nasir Memon, a seminal member of NYU’s multidisciplinary Center for Cybersecurity.

Post

GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats

Stefan Rass and Quanyan Zhu We present a dynamic game framework to model and design defense strategies for advanced persistent threats (APTs). The model is based on a sequence of nested finite two-person zero-sum games, in which the APT is modeled as the attempt to get through multiple protective shells of a system towards conquering...

Post

Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things

Juntao Chen and Quanyan Zhu The development of advanced wireless communication technologies and smart embedded control devices makes everything connected, leading to an emerging paradigm of the Internet of Controlled Things (IoCT). IoCT consists of two layers of systems: cyber layer and physical layer. This work aims to establish a holistic framework that integrates the cyber-physical...

Post

The Man Who Defends Hardware from Hackers: Siddharth Garg is One of the 10 Most Brilliant People of 2016

It might sound like the premise of a bad supervillain flick, but it’s all too feasible: Hackers can tweak a microchip so when a certain trigger occurs, it throws open the gates for attackers to commandeer—or destroy—the device in which that chip is embedded. All it takes is one saboteur at the factory, and you’ve...

Post

Mapping the Matrix

The new Center for Cybersecurity brings legal and technical talent together to take the lead on one of the most urgent issues of our time.