skip to Main Content

Recent News

CAP Center Featured in Morgan Magazine Online Exclusive

Morgan’s Cybersecurity Assurance and Policy (CAP) Center Cultivates Excellence in Cybersecurity Scholarship and Research ------------------------ View the featured exclusive in Morgan Magazine Plus (MM+):

$300K NSF Grant Awarded to Dr. Onyema Osuagwu

Congratulations to Dr. Onyema Osuagwu for his newly funded research and development project entitled "EIR: A Unified Theoretical Framework for Zero Trust Architectures". The proposed effort involves: 1) conducting research and development of the mathematical rules and bounds to accurately…

AIoT Digital Forum Features Dr. Kevin Kornegay

Join Dr. Kevin Kornegay as he engages in a deep-dive discussion on the different opportunities and challenges related to the business value of AIoT. This unique digital forum connects industry thought-leaders and practitioners in focused groups for meaningful and content-rich…

MSU’s CAP Center to Provide 24 Secure Embedded Systems Scholarships to Students Seeking Careers in Government Cybersecurity

Morgan State University’s (MSU) Cybersecurity Assurance and Policy (CAP) Center has been awarded a $3.2 million National Science Foundation (NSF) grant to implement the agency’s novel CyberCorps® Scholarship for Service (SFS) program at Morgan, providing 24 cybersecurity scholarships to undergraduate and…

Welcome to CAP

Our mission is to provide the electronics industry and intelligence community with knowledge, methodology, solutions, and skilled cybersecurity engineers to help prevent penetration and manipulation of our nation’s cyber physical infrastructures. We apply invasive and noninvasive hardware and software reverse engineering techniques to assess physical layer cybersecurity vulnerabilities in embedded systems, specifically IoT devices. We also develop countermeasures to secure them against sensitive data extraction, disruption, diversion, and obfuscation.

A Message from
Dr. Kevin Kornegay


  • Hardware Security
  • Side Channel Analysis (SCA)
    • Simple Power Analysis (SPA)
    • Differential Power Analysis (DPA)
    • Correlation Power Analysis (CPA)
    • Differential Electromagnetic Analysis (DEMA)
  • Fault Injection (FI)
    • Power and Clock Glitching
  • Software Reverse Engineering
  • Hardware Reverse Engineering
  • Countermeasure Assessment and Development
  • Wireless Interface/Protocol Hacking
  • Trusted Platform Module Security Applications & Design
  • Semiconductor Supply Chain Security
  • Trustworthy AI
Back To Top