Researchers at the University of Illinois have designed a sound that is completely inaudible to humans (40 kHz or above) yet is audible to any microphone. The sound combines multiple tones that, when interacting with the microphone's mechanics, create what researchers call a 'shadow,' which is a sound that the microphones can detect.
A research team led by Professor Hoi-Jun Yoo of the Department of Electrical Engineering has developed a semiconductor chip, CNNP (CNN Processor), that runs AI algorithms with ultra-low power, and K-Eye, a face recognition system using CNNP.
In a new study, researchers demonstrate ground-based measurements of quantum states sent by a laser aboard a satellite 38,000 kilometers above Earth.
Researchers in Canada have taken a significant step towards enabling secure quantum communication via moving satellites, as announced by the Canadian Government in April 2017. Their study, published today in the new journal Quantum Science and Technology, demonstrates the first quantum key distribution transmissions from a ground transmitter to a quantum payload on a moving aircraft.
A University at Buffalo-led team of engineers is creating an app to stop voice hacking. The app uses existing smartphone components, including the magnetometer for the phone's compass, to detect when someone's voice is being broadcast on a speaker.
University of Washington security researchers have developed a new system called SeaGlass to detect anomalies in the cellular landscape that can indicate where and when IMSI-catchers, cell-site simulators and other devices used in cell phone surveillance are present.
Researchers from UNIGE have developed a new random numbers generator based on the principles of quantum physics. This physical theory shows that certain physical events occur perfectly at random, making them impossible to predict. Unlike previous methods, the new system allows the user to verify the reliability of the random numbers it generates in real time. This work will greatly complicate the tasks of hackers who can no longer exploit bias resulting from human fallibility.
At the IEEE Symposium on Security and Privacy this week, researchers from MIT's Computer Science and Artificial Intelligence Laboratory are presenting a new system that uses Bitcoin's security machinery to defend against online identity theft.
Newcastle University's cyber team have found a simple new way to prevent forgery of official documents such as certificates and passports.
Since the global supply chain for additive manufacturing (AM)-- also called 3-D printing-- requires companies to share CAD files within the organization or with outside parties via email or cloud, intellectual-property thieves and malefactors have many opportunities to filch a manufacturer's design files to produce counterfeit parts. Researchers have discovered ways for manufacturers to turn the tables on thieves by deliberately embedding hidden flaws in CAD files to thwart intellectual property theft.