Category: Publications

Home / Publications
Post

Stressing Out: Bitcoin “Stress Testing”

Khaled Baqer, Danny Yuxing Huang, Damon McCoy, and Nicholas Weaver In this paper, we present an empirical study of a recent spam campaign (a “stress test”) that resulted in a DoS attack on Bitcoin. The goal of our investigation being to understand the methods spammers used and impact on Bitcoin users.

Post

Secure and resilient distributed machine learning under adversarial environments

Rui Zhang and  Quanyan Zhu Machine learning algorithms, such as support vector machines (SVMs), neutral networks, and decision trees (DTs) have been widely used in data processing for estimation and detection. They can be used to classify samples based on a model built from training data. However, under the assumption that training and testing samples...

Post

FACID: A trust-based collaborative decision framework for intrusion detection networks

Carol J. Fung and Quanyan Zhu Computer systems evolve to be more complex and vulnerable. Cyber attacks have also grown to be more sophisticated and harder to detect. Intrusion detection is the process of monitoring and identifying unauthorized system access or manipulation. It becomes increasingly difficult for a single intrusion detection system (IDS) to detect all...

Post

Proposed NY Cybersecurity Regulation: A Giant Leap Backward?

Judith Germano Mid-November marked the end of the comment period for New York’s “first in nation” proposed cybersecurity legislation for financial institutions. As the hot topic of the day, many regulators and government officials have felt compelled to take a stand on cybersecurity. It seems counterintuitive to set out to protect constituents by inaction. But...

Post

Guest Editorial: Special Issue on Secure and Trustworthy Computing

Ozgur Sinanoglu and Ramesh Karri There is a growing concern regarding the trustworthiness and reliability of the hardware underlying all information systems on which modern society is reliant. Trustworthy and reliable semiconductor supply chain, hardware components, and platforms are essential to all critical infrastructures including financial, healthcare, transportation, and energy.

Post

FPGA Trust Zone: Incorporating trust and reliability into FPGA designs

Vinayaka Jyothi, Manasa Thoonoli, Richard Stern and Ramesh Karri This paper proposes a novel methodology FPGA Trust Zone (FTZ) to incorporate security into the design cycle to detect and isolate anomalies such as Hardware Trojans in the FPGA fabric. Anomalies are identified using violation to spatial correlation of process variation in FPGA fabric.

Post

Hardware Trojans: Lessons Learned after One Decade of Research

Kan Xiao, Domenic Forte, Yier Jin, Ramesh Karri, Swarup Bhunia, and Mark Mohammad Tehranipoor  Given the increasing complexity of modern electronics and the cost of fabrication, entities from around the globe have become more heavily involved in all phases of the electronics supply chain. In this environment, hardware Trojans (i.e., malicious modifications or inclusions made by untrusted third parties)...

Post

Securing digital microfluidic biochips by randomizing checkpoints

Jack Tang, Ramesh Karri, Mohamed Ibrahim, and Krishnendu Chakrabarty Much progress has been made in digital microfluidic biochips (DMFB), with a great body of literature addressing low-cost, high-performance, and reliable operation. Despite this progress, security of DMFBs has not been adequately addressed. We present an analysis of a DMFB system prone to malicious modification of routes...

Post

What Is Cyber Collateral Damage? And Why Does It Matter?

Zachary K. Goldman and Sasha Romanosky What happens when the consequences of a cyberattack are not physical? What happens when a digital missile destroys or corrupts data in a manner that is not intended by the person launching a lawful cyberattack? Current legal and policy frameworks for assessing collateral damage do not squarely address the...