Samet Taspinar, Manoranjan Mohanty and Nasir Memon Photo Response Non-Uniformity (PRNU) noisebased source attribution is a well known technique to verify the camera of an image or video. Researchers have proposed various countermeasures to prevent PRNU-based source camera attribution. Forced seam-carving is one such recently proposed counter forensics technique. This technique can disable PRNUbased source...
Category: Publications
A First Legislative Step in the IoT Security Battle
Randal Milch, Distinguished Fellow at the Center on Law and Security at NYU School of Law and the NYU Center for Cybersecurity, comments on the Internet of Things (IoT) Cybersecurity Improvements Act of 2017: The bill seeks to use the federal government’s purchasing power to drive much-needed cybersecurity improvements in internet-connected devices. In addition, the...
Large-Scale 3D Chips: Challenges and Solutions for Design Automation, Testing, and Trustworthy Integration
Johann Knechtel, Ozgur Sinanoglu, Ibrahim (Abe) M. Elfadel, Jens Lienig and Cliff C. N. Sze Three-dimensional (3D) integration of electronic chips has been advocated by both industry and academia for many years. It is acknowledged as one of the most promising approaches to meet ever-increasing demands on performance, functionality, and power consumption. Furthermore, 3D integration...
Adaptive and Resilient Revenue Maximizing Resource Allocation and Pricing in Cloud Computing Environments
Muhammad Junaid Farooq, Quanyan Zhu Cloud computing is becoming an essential component of modern computer and communication systems. The available resources at the cloud such as computing nodes, storage, databases, etc. are often packaged in the form of virtual machines (VMs) to be used by remotely located client applications for computational tasks. However, the cloud...
Optimal Timing in Dynamic and Robust Attacker Engagement During Advanced Persistent Threats
Jeffrey Pawlick, Thi Thu Hang Nguyen, Quanyan Zhu Advanced persistent threats (APTs) are stealthy attacks which make use of social engineering and deception to give adversaries insider access to networked systems. Against APTs, active defense technologies aim to create and exploit information asymmetry for defenders. In this paper, we study a scenario in which a...
Quantitative Models of Imperfect Deception in Network Security using Signaling Games with Evidence
Jeffrey Pawlick and Quanyan Zhu Deception plays a critical role in many interactions in communication and network security. Game-theoretic models called “cheap talk signaling games” capture the dynamic and information asymmetric nature of deceptive interactions. But signaling games inherently model undetectable deception. In this paper, we investigate a model of signaling games in which the...
MINIMAX GAME-THEORETIC APPROACH TO MULTISCALE H 1 OPTIMAL FILTERING
Hamza Anwar and Quanyan Zhu Sensing in complex systems requires large-scale information exchange and on-the-go communications over heterogeneous networks and integrated processing platforms. Many networked cyber-physical systems exhibit hierarchical infrastructures of information flows, which naturally leads to a multi-level tree-like information structure in which each level corresponds to a particular scale of representation. This work...
A Dynamic Game Analysis and Design of Infrastructure Network Protection and Recovery
Juntao Chen, Corinne Touati, Quanyan Zhu Infrastructure networks are vulnerable to both cyber and physical attacks. Building a secure and resilient networked system is essential for providing reliable and dependable services. To this end, we establish a two-player three-stage game framework to capture the dynamics in the infrastructure protection and recovery phases. Specifically, the goal...
Optimal Secure Multi-Layer IoT Network Design
Juntao Chen, Corinne Touati, Quanyan Zhu With the remarkable growth of the Internet and communication technologies over the past few decades, Internet of Things (IoTs) is enabling the ubiquitous connectivity of heterogeneous physical devices with software, sensors, and actuators. IoT networks are naturally multi-layer with the cloud and cellular networks coexisting with the underlaid device-to-device...
How Biometric Authentication Poses New Challenges to Our Security and Privacy
Nasir Memon The use of biometric data—an individual’s measurable physical and behavioral characteristics—isn’t new. Government and law enforcement agencies have long used it. … Using biometric data to access our personal devices is increasing as a way to get around the limitations of the commonly used password-based mechanism: it’s easier, more convenient, and (theoretically) more...