skip to Main Content

Recent News

MSU’s CAP Center to Provide 24 Secure Embedded Systems Scholarships to Students Seeking Careers in Government Cybersecurity

Morgan State University’s (MSU) Cybersecurity Assurance and Policy (CAP) Center has been awarded a $3.2 million National Science Foundation (NSF) grant to implement the agency’s novel CyberCorps® Scholarship for Service (SFS) program at Morgan, providing 24 cybersecurity scholarships to undergraduate and…

Outstanding Achievers Highlight Morgan State University’s 145th Spring Commencement

Khir Henderson (CAP Center Scholar) was one of four students in Morgan’s first cohort of Secure Embedded Systems Ph.D. graduates. Raised by his father in a single-parent home, he graduated from high school a year early and came to Morgan…

Image (left to right): Dr. Khir Henderson, Dr. Otily Toutsop, Dr. Kevin  Kornegay (CAP Center Director), Dr. Tsion Yimer, Dr. Denzel Hamilton
CAP Center Graduates 1st Cohort of Ph.D. Recipients

The Cybersecurity Assurance and Policy Center sets an historic record of graduating four students rising from underrepresented groups as the 1st cohort of Secure Embedded Systems Ph.D. recipients! Dr. Denzel Hamilton || Dissertation: Exploring Explainable AI for Autonomous Vehicle Assurance Dr.…

CAP Center Among First Cohort of IBM Cybersecurity Leadership Centers

IBM is announcing the first six of more than twenty Cybersecurity Leadership Centers among HBCUs and HBCU systems. The Cybersecurity Assurance and Policy Center (CAP) at Morgan State University is among the first cohort selected! IBM Tackles Talent Shortage and…

Welcome to CAP

Our mission is to provide the electronics industry and intelligence community with knowledge, methodology, solutions, and skilled cybersecurity engineers to help prevent penetration and manipulation of our nation’s cyber physical infrastructures. We apply invasive and noninvasive hardware and software reverse engineering techniques to assess physical layer cybersecurity vulnerabilities in embedded systems, specifically IoT devices. We also develop countermeasures to secure them against sensitive data extraction, disruption, diversion, and obfuscation.

A Message from
Dr. Kevin Kornegay


  • Hardware Security
  • Side Channel Analysis (SCA)
    • Simple Power Analysis (SPA)
    • Differential Power Analysis (DPA)
    • Correlation Power Analysis (CPA)
    • Differential Electromagnetic Analysis (DEMA)
  • Fault Injection (FI)
    • Power and Clock Glitching
  • Software Reverse Engineering
  • Hardware Reverse Engineering
  • Countermeasure Assessment and Development
  • Wireless Interface/Protocol Hacking
  • Trusted Platform Module Security Applications & Design
  • Semiconductor Supply Chain Security
  • Trustworthy AI
Back To Top