Dr. Periwinkle Doerfler from the Computer Science and Engineering department was one of 18 NYU Tandon graduates from all levels featured in a series of “2021 Commencement Profiles” shared on the school’s website and featured in the ceremony’s program. In the profile, Doerfler, one of five CCS-affiliated doctoral candidates to be awarded a Ph.D. at...
Author: Lois Anne DeLong (Lois Anne DeLong)
Tandon’s Dvorkin points out security “gap” revealed by Colonial Pipeline attack
The critical lesson of the recent Colonial Pipeline incident is less about what was exploited and more about the lack of options operators had once the attack was known. A May 13 article on Cybersecurity Dive noted that, despite the fact that the hack did not affect the operations side, the decision to shutdown all...
Tandon research projects tap emerging encryption strategies to better secure data
The early months of 2021 have been a productive period for Dr. Brandon Reagen, an assistant professor of Electrical and Computer Engineering (ECE) and a member of the NYU Center for Cybersecurity (CCS). His recent initiatives to enhance data security have included two different projects utilizing an increasingly popular form of encryption called fully homomorphic encryption...
Amoroso and Milch of CCS argue against FBI “Hack to Patch” operation
Are law enforcement officials justified in hacking thousands of computers if the end result is a patch that corrects a critical vulnerability? In an editorial in JustSecurity posted on April 30, two faculty members from NYU’s Center for Cybersecurity (CCS) argue that, in a recent case when the FBI engaged in a “hack to patch,”...
A.I. can write code, but should it?
Writing code can be a time-consuming and labor-intensive process, so it is not surprising that research is underway to automate the process using artificial intelligence (A.I.). But, while machine-based code can make things easier, it also opens the possibility of perpetuating bugs and other flaws that were never fixed in the original source code. As...
Cappos describes the evolution of cyber attackers in Radio Spectrum interview
Anyone who might underestimate the skills and resources of today’s cyber attackers does so at their own risk. That was one of the takeaways from a recent appearance on IEEE Radio Spectrum by Dr. Justin Cappos, an associate professor of computer science and engineering at NYU Tandon School of Engineering. Describing malware as, “something that...
Tandon research team reveals GANs cannot completely protect identity
Generative adversarial networks (GANs) are machine-learning (ML) systems used to “scrub” images of any traces of personal identity. But, after exploring the machine-learning frameworks behind these tools, a team of researchers at the NYU Tandon School of Engineering’s Department of Electrical and Computer Engineering suggest that these scrubbed images leave a lot of “residue” behind. The...
Political Ad Initiative Broadens its Focus, Changes its Name
For the past few years, NYU Tandon Associate Professor of Computer Science and Engineering Dr. Damon McCoy and Ph.D. candidate Laura Edelson have been peering behind the curtain of social media to reveal the sources behind political ads and content, and to use data analysis to expose possible disinformation campaigns. Through the Online Political Advertising...
As Bitcoin value soars, look for cryptocrime to follow suit
Fame has a price and so does fortune. As Bitcoin was reaching $1 trillion in value, the U.S. Department of Justice was indicting three North Korean military hackers for stealing and extorting more than $1.3 billion in money and cryptocurrency from financial institutions and companies. That indictment spurred a warning from the FBI and Department of Homeland...
Zhu research paper quoted in article about risks to IIoT: “There is no control over upstream supply chain…”
A February 1, 2021 article in IoT World, pointed to a glaring flaw in efforts to secure the Industrial Internet of Things (IIOT)—the secondary supply chains introduced by components manufactured apart from the main supply chain. As the article’s author Rich Castagna writes, “The purchaser of those devices is at the end of the supply...