Researchers have demonstrated the ability to steal an artificial intelligence (AI) model without hacking into the device where the model was running. The technique is novel in that it works even when the thief has no prior knowledge of the software or architecture that support the AI.
Tag: Data Security
Expert: Three Skills Cybersecurity Professionals Should Have in 2024
In advance of October’s Cybersecurity Awareness Month, Michael Nizich, Ph.D., adjunct associate professor of computer science at New York Institute of Technology and author of the new book, The Cybersecurity Workforce of Tomorrow, is available for interviews/comments on the most critical…
Down the tubes: Common PVC pipes can hack voice identification systems
Researchers are in an arms race with hackers to prevent data theft. Their standard tools include strategies like multi-factor authentication systems, fingerprint technology and retinal scans. One type of security system that is gaining popularity is automatic speaker identification, which uses a person’s voice as a passcode.
Researchers Discover New Side Channel Attack on Low-End Phones
Georgia Tech researchers have recently discovered a new side channel attack that is effective on a wide range of low-end phones. All that’s needed for the attack to work is to place a sensor close to the phone, for example, under the coffee table where the phone is sitting. If the sensor bears witness to a single secure transaction, like a bank login, then the attacker can immediately break the user’s encryption and forge their digital signature.
Privacy and artificial intelligence: challenges for protecting health information in a new era
Abstract Background Advances in healthcare artificial intelligence (AI) are occurring rapidly and there is a growing discussion about managing its development. Many AI technologies end up owned and controlled by private entities. The nature of the implementation of AI could…
Improved method for generating synthetic data solves major privacy issues in research
Researchers at the Finnish Center for Artificial Intelligence have developed a machine learning-based method that produces synthetic data, making it possible for researchers to share even sensitive data with one other without privacy concerns.
Columbia Engineering Team Builds First Hacker-resistant Cloud Software System
Columbia Engineering researchers have developed SeKVM, the first system that guarantees–through a mathematical proof–the security of virtual machines in the cloud. “This is the first time that a real-world multiprocessor software system has been shown to be mathematically correct and secure,” said Computer Science Professor Jason Nieh. “This means that users’ data are correctly managed by software running in the cloud and are safe from security bugs and hackers.”
Tandon team to design novel microchips so data to be processed without being decrypted
A research team at the NYU Center for Cyber Security (CCS) at NYU Tandon are participating in a major initiative in collaboration with data security company Duality — supported by a $14 million grant from the Defense Advanced Research Projects Agency (DARPA) — to design a revolutionary new microchip (codenamed “Trebuchet”).
Novel Tandon-designed microchip will allow data to be processed without being decrypted
A research team at the NYU Center for Cyber Security (CCS) at NYU Tandon are participating in a major initiative in collaboration with data security company Duality — supported by a $14 million grant from the Defense Advanced Research Projects Agency (DARPA) — to design a revolutionary new microchip (codenamed “Trebuchet”).
TikTok ban reasonable given the threat of Chinese surveillance
The House of Representatives voted this week to ban TikTok from government-issued devices amid concerns that the Chinese-owned social media company’s access to U.S. data poses a national security threat. Sarah Kreps, professor of government at Cornell University, studies misinformation…
Story Tips: Fusion squeeze, global image mapping, computing mental health and sodium batteries
Story Tips: Fusion squeeze, global image mapping, computing mental health and sodium batteries