skip to Main Content

Recent News

New Ph.D. in Secure Embedded Systems Apply Now!

Doctor of Philosophy (Ph.D.) in Secure Embedded Systems Program Overview The Ph.D. in Secure Embedded Systems provides aspiring scholars and researchers with opportunities to expand the field of cybersecurity through in-depth exploration into embedded systems, artificial intelligence, machine learning, cryptography,…

National Security Agency
2021 NSA Science of Security Summer Intership Program

2021 Summer Internships Flyer Please visit Science of Security link to apply. Applications Due: 10/31/2020

Morgan State University Joins National Effort to Build a Secure Smart Home
Morgan State University has been selected to join a team of seven academic institutions that will work together on a national research project to increase the security and privacy of high-tech products used in smart homes.

Welcome to CAP

Our mission is to provide the electronics industry and intelligence community with knowledge, methodology, solutions, and skilled cybersecurity engineers to help prevent penetration and manipulation of our nation’s cyber physical infrastructures. We apply invasive and noninvasive hardware and software reverse engineering techniques to assess physical layer cybersecurity vulnerabilities in embedded systems, specifically IoT devices. We also develop countermeasures to secure them against sensitive data extraction, disruption, diversion, and obfuscation.

A Message from
Dr. Kevin Kornegay

CAPABILITIES

  • Hardware Pentesting
  • Side Channel Analysis (SCA)
    • Simple Power Analysis (SPA)
    • Differential Power Analysis (DPA)
    • Correlation Power Analysis (CPA)
    • Differential Electromagnetic Analysis (DEMA)
  • Fault Injection (FI)
    • Power and Clock Glitching
  • Software Reverse Engineering
  • Countermeasure Development and Assessment
  • Wireless Interface/Protocol Hacking (e.g. GPS, WiFi, Bluetooth, ZigBee, ZWave, custom protocols, etc.) via Software Defined Radio
  • Trusted Platform Module Security Applications & Design
  • Semiconductor Supply Chain Security
Back To Top
×Close search
Search