Jeyavijayan Rajendran, Ramesh Karri, and Ozgur Sinanoglu An exemplary system, method and computer-accessible medium can be provided which can include, for example, generating a super control dataflow graph(s) (CDFG) by applying a plurality of electronic system level ESL design constraints associated with an integrated circuit, determining an upper bound(s) number and a lower bound(s) number based...
Author: Emerald Knox (Emerald Knox)
Hold that Yak: NYU Researchers Discover Clues for Identifying Yik Yak Users on College Campuses
Experiments by researchers at the NYU Tandon School of Engineering and NYU Shanghai have successfully cracked the veil of anonymity in Yik Yak, an ostensibly anonymous social media application.
Does My Eye Deceive Me? Not With These Digital Forensics Tools
The Internet is awash with images and videos that may hold national security and intelligence value, but the task of teasing out real images from altered ones is formidable. Even off-the-shelf editing tools can trick digital forensics experts. Nasir Memon, professor of computer science and engineering at the New York University Tandon School of Engineering,...
Winning High School Cyber Sleuths to Compete in Forensics Challenge at NYU Tandon, NYU Abu Dhabi
More than 20 teams of high school students in the United States and the United Arab Emirates have won coveted slots to compete in the world’s largest set of student-led cybersecurity contests, the New York University Tandon School of Engineering’s annual Cyber Security Awareness Week (CSAW) games. For the first time, the final round of...
Meet the IITians Who Have Made Their Way Into World’s Largest Hardware Hacking Competition Finals
For the first time, IIT students from India are among seven teams to have sailed through to the finals of the oldest and largest hardware hacking competition in the world. They have won finalist slots in the ninth annual Embedded Security Challenge (ESC), a competition deemed to be one of the most difficult events at...
Professor Memon Takes Part in Forum on Underrepresented Groups in Cybersecurity
On October 4, the International Consortium of Minority Cybersecurity Professionals (ICMCP), in partnership with IBM, hosted an all-day forum on women and minorities in the field of cybersecurity, and included on the list of speakers was Professor of Computer Science and Engineering Nasir Memon, a seminal member of NYU’s multidisciplinary Center for Cybersecurity.
GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats
Stefan Rass and Quanyan Zhu We present a dynamic game framework to model and design defense strategies for advanced persistent threats (APTs). The model is based on a sequence of nested finite two-person zero-sum games, in which the APT is modeled as the attempt to get through multiple protective shells of a system towards conquering...
Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things
Juntao Chen and Quanyan Zhu The development of advanced wireless communication technologies and smart embedded control devices makes everything connected, leading to an emerging paradigm of the Internet of Controlled Things (IoCT). IoCT consists of two layers of systems: cyber layer and physical layer. This work aims to establish a holistic framework that integrates the cyber-physical...
The Man Who Defends Hardware from Hackers: Siddharth Garg is One of the 10 Most Brilliant People of 2016
It might sound like the premise of a bad supervillain flick, but it’s all too feasible: Hackers can tweak a microchip so when a certain trigger occurs, it throws open the gates for attackers to commandeer—or destroy—the device in which that chip is embedded. All it takes is one saboteur at the factory, and you’ve...
Mapping the Matrix
The new Center for Cybersecurity brings legal and technical talent together to take the lead on one of the most urgent issues of our time.