A team at NYU Tandon School of Engineering has found a way to prove the provenance of 3-D printed parts by embedding QR (Quick Response) codes in an innovative way for unique device identification. In the latest issue of Advanced Engineering Materials, the researchers describe converting QR codes into 3-D features so that that they neither compromise the part's integrity nor announce themselves to counterfeiters who have the means to reverse engineer the part.
A novel encryption method devised by MIT researchers secures data used in online neural networks, without dramatically slowing their runtimes. This approach holds promise for using cloud-based neural networks for medical-image analysis and other applications that use sensitive data.
Rice University engineers develop ShareBackup, a hardware and software solution to help data centers recover from failures without slowing applications.
A new study shows that communication channels between different parts and pieces of computer software are prone to security breaches. Anyone with access to a shared computer -- co-workers, family members, or guests -- can attack or involuntarily subject it to security breaches.
Two international teams of security researchers have uncovered Foreshadow, a new variant of the hardware vulnerability Meltdown announced earlier in the year, that can be exploited to bypass Intel Processors' secure regions to access memory and data.
Technology giant Intel has been including an innovative security method in its processors for a number of years. This method works as a vault for your personal data. However, KU Leuven researchers (Belgium) have shown that the system can, in fact, be hacked using the Foreshadow attack. What's more, information processed in cloud systems also seems vulnerable to this kind of attack. Intel will be releasing patches to resolve the flaw in millions of processors.
In collaboration with colleagues from Opole University in Poland, researchers at Horst Görtz Institute for IT Security (HGI) at Ruhr-Universität Bochum (RUB) have demonstrated that the Internet protocol 'IPsec' is vulnerable to attacks. The Internet Key Exchange protocol 'IKEv1', which is part of the protocol family, has vulnerabilities that enable potential attackers to interfere with the communication process and intercept specific information. The research results are published on Aug. 16, 2018 at the Usenix Security Symposium.
Cybersecurity researchers at the Georgia Institute of Technology have helped close a security vulnerability that could have allowed hackers to steal encryption keys from a popular security package by briefly listening in on unintended 'side channel' signals from smartphones.
The researchers analyzed and found vulnerabilities in a number of commercial smart irrigation systems, which enable attackers to remotely turn watering systems on and off at will. The researchers tested three of the most widely sold smart irrigation systems: GreenIQ, BlueSpray, and RainMachine smart irrigation systems.
AUDIT is a cryptographic system aimed at improving government accountability for surveillance while still maintaining enough confidentiality for police to do their jobs. AUDIT involves a public ledger in which officials share information about data requests through so-called 'cryptographic commitments.' If the courts decide to release the data they requested, the public can be assured that the correct documents were released in full; if they decide not to, then that refusal itself is made known.