skip to Main Content

Recent News

CAP Center Selected to the USCYBERCOM Academic Engagement Network Program

USCYBERCOM's intent through the first year is to extend partnership opportunities to all Academic Engagement Network (AEN) institutions through collaboration and access to the cyber enterprise via scheduled monthly events and engagements with the staff and their Commands. Also, they…

CAP Center receives $3.1M NSF CyberCorps Scholarship for Service in Secure Embedded Systems

CyberCorps Scholarship for Service in Secure Embedded Systems We live in a world of connected embedded systems, from smart cars to baby monitors that we interact with daily. Unfortunately, these devices are the constant target of exploitation by hackers that…

Dr. Kornegay’s Interview on Federal Drive with Tom Temin

THE NATIONAL SECURITY AGENCY WORRIES ABOUT HOW SMART CARS ARE GETTING Anyone driving to the store to buy hamburger knows how vulnerable the nation's infrastructure has become to cyber attacks. Both the energy and food industries have been hit in…

Welcome to CAP

Our mission is to provide the electronics industry and intelligence community with knowledge, methodology, solutions, and skilled cybersecurity engineers to help prevent penetration and manipulation of our nation’s cyber physical infrastructures. We apply invasive and noninvasive hardware and software reverse engineering techniques to assess physical layer cybersecurity vulnerabilities in embedded systems, specifically IoT devices. We also develop countermeasures to secure them against sensitive data extraction, disruption, diversion, and obfuscation.

A Message from
Dr. Kevin Kornegay


  • Hardware Security
  • Side Channel Analysis (SCA)
    • Simple Power Analysis (SPA)
    • Differential Power Analysis (DPA)
    • Correlation Power Analysis (CPA)
    • Differential Electromagnetic Analysis (DEMA)
  • Fault Injection (FI)
    • Power and Clock Glitching
  • Software Reverse Engineering
  • Hardware Reverse Engineering
  • Countermeasure Assessment and Development
  • Wireless Interface/Protocol Hacking
  • Trusted Platform Module Security Applications & Design
  • Semiconductor Supply Chain Security
  • Trustworthy AI
Back To Top