Frank Imeson, Saeed Nejati, Siddharth Garg, and Mahesh V. Tripunitara The security of digital Integrated Circuits (ICs) is essential to the security of a computer system that comprises them. A particularly pernicious attack is the insertion of a hardware backdoor, that is triggered in the field using a timer that is also inserted in the...
Author: Emerald Knox (Emerald Knox)
InVEST: Intelligent visual email search and triage
Jay Koven, Enrico Bertini, Luke Dubois, and Nasir Memon Large email data sets are often the focus of criminal and civil investigations. This has created a daunting task for investigators due to the extraordinary size of many of these collections. Our work offers an interactive visual analytic alternative to the current, manually intensive methodology used...
The Right to be Forgotten in the Media: A Data-Driven Study
Minhui Xue, Gabriel Magno, Evandro Cunha, Virgilio Almeida, and Keith W. Ross Due to the recent “Right to be Forgotten” (RTBF) ruling, for queries about an individual, Google and other search engines now delist links to web pages that contain “inadequate, irrelevant or no longer relevant, or excessive” information about that individual. In this paper...
The Cybersecurity Competition Experience: Perceptions from Cybersecurity Workers
Colin Wee, Masooda Bashir, and Nasir Memon How do workers within the field of cybersecurity perceive cybersecurity competitions? This study aims to address this question and investigate if competitions left a positive mark on the information security workers who participated in them.
Student research highlight: Secure and resilient distributed machine learning under adversarial environments
Rui Zhang and Quanyan Zhu Machine learning algorithms, such as support vector machines (SVMs), neutral networks, and decision trees (DTs) have been widely used in data processing for estimation and detection. They can be used to classify samples based on a model built from training data. However, under the assumption that training and testing samples come...
Do You Trust Your Chip?
Ozgur Sinanoglu This talk will cover various forms of threats that the electronic chip supply chain is up against, as well as defenses against these threats. The talk will elucidate the development of CAD algorithms/tools for this newly emerging field by mostly leveraging principles from other more mature research domains.
Profiling Underground Merchants Based on Network Behavior
Srikanth Sundaresan, Damon McCoy, Sadia Afroz, and Vern Paxson Online underground forums serve a key role in facilitating information exchange and commerce between gray market or even cybercriminal actors. In order to streamline bilateral communication to complete sales, merchants often publicly post their IM contact details, such as their Skype handle. Merchants that publicly post...
Manufacturing and Security Challenges in 3D Printing
Steven Eric Zeltmann, Nikhil Gupta, Nektarios Georgios Tsoutsos, Michail Maniatakos, Jeyavijayan Rajendran, and Ramesh Karri As the manufacturing time, quality, and cost associated with additive manufacturing (AM) continue to improve, more and more businesses and consumers are adopting this technology. Some of the key benefits of AM include customizing products, localizing production and reducing logistics....
SARLock: SAT attack resistant logic locking
Muhammad Yasin, Bodhisatwa Mazumdar, Jeyavijayan J V Rajendran, and Ozgur Sinanoglu Logic locking is an Intellectual Property (IP) protection technique that thwarts IP piracy, hardware Trojans, reverse engineering, and IC overproduction. Researchers have taken multiple attempts in breaking logic locking techniques and recovering its secret key. A Boolean Satisfiability (SAT) based attack has been recently...
Threshold-Dependent Camouflaged Cells to Secure Circuits Against Reverse Engineering Attacks
Maria I. Mera Collantes, Mohamed El Massad, and Siddharth Garg With current tools and technology, someone who has physical access to a chip can extract the detailed layout of the integrated circuit (IC). By using advanced visual imaging techniques, reverse engineering can reveal details that are meant to be kept secret, such as a secure...