Researchers have developed a technique for detecting types of malware that use a system's architecture to thwart traditional security measures. The new detection approach works by tracking power fluctuations in embedded systems.
Debates over gun regulations make headlines across the world, but there's an underground operation for weapons that has drawn very little attention -- until now. Researchers from Michigan State University crept into the dark web to investigate how firearms are anonymously bought and sold around the world.
Portland State University researcher Nirupama Bulusu wants to prevent counterfeit pharmaceuticals from flooding the market. Bulusu recently published a blockchain protocol that could do just that.
New adversarial techniques developed by engineers at Southwest Research Institute can make objects 'invisible' to image detection systems that use deep-learning algorithms. These techniques can also trick systems into thinking they see another object or can change the location of objects. The technique mitigates the risk for compromise in automated image processing systems.
Researchers from the NUS-Singtel Cyber Security Research & Development Laboratory demonstrate a way to improve quantum key distribution over fiber networks.
In response to serious new security flaws found in almost every computer chip on the market today, researchers at Technische Universität Kaiserslautern, Germany, in collaboration with scientists at Stanford, have developed a mathematical algorithm to automate and expedite the process of finding flaws in future designs prior to production.
Researchers at the University of Luxembourg are part of an international team that has proposed the first blockchain system to guarantee proper performance even when more than 51 percent of the system's computing power is controlled by an attacker.
A thriving marketplace for SSL and TLS certificates -- small data files used to facilitate confidential communication between organizations' servers and their clients' computers -- exists on a hidden part of the Internet, according to new research by Georgia State University's Evidence-Based Cybersecurity Research Group (EBCS) and the University of Surrey.
A new study debunks a popular, two-decade-old theory about the shape of networks.
Researchers have analyzed the real-time effect of a large-scale hack on automobiles in a major urban environment. Using percolation theory, they analyzed how a large, disseminated hack on automobiles would affect traffic flow in New York City, and they found that it could create citywide gridlock. However, based on these findings the team also developed a risk-mitigation strategy to prevent mass urban disruption -- work they will describe at the 2019 APS March Meeting.