skip to Main Content

Recent News

cybersecurity workforce certification training
cybersecurity workforce certification training
Developing Secure Edge Computing Skills: Resources and Training for IoT Professionals

In the rapidly evolving landscape of the Internet of Things (IoT) and edge computing, the demand for skilled professionals who can navigate the complexities of developing secure, efficient systems is at an all-time high. As businesses and industries increasingly rely…

hardware cybersecurity
Secure Edge Computing: Transforming IoT in Healthcare, Manufacturing, and Beyond

In the rapidly evolving digital landscape, the integration of Internet of Things (IoT) devices with secure edge computing is revolutionizing industries by offering smarter, faster, and more efficient solutions. Particularly in sectors like healthcare and manufacturing, where data sensitivity and…

CAP Center Featured for Science/AAAS

With two centers focused on AI technology and cybersecurity, Morgan State University (MSU) is poised to level the playing field for students and users of the technology... ...With the advent of the Internet of Things, hacking one device can compromise…

CAP Center at Morgan State University Among Powerhouse Universities to Join Microelectronics Coalition

The U.S. Department of Defense has announced that it has awarded approximately $27 million for a USC-led Microelectronics Commons project. The university will lead a coalition of research and industry organizations with the power to accelerate the development and manufacturing…

System on Chip Hardware & Software Cybersecurity

Welcome to the CAP Center

The Leader in Hardware and Software Cybersecurity

Our mission is to provide the electronics industry and intelligence community with knowledge, methodology, solutions, and skilled cybersecurity engineers to help prevent penetration and manipulation of our nation’s cyber-physical infrastructures. We use noninvasive hardware and software reverse engineering techniques to assess physical layer cybersecurity vulnerabilities in embedded systems, specifically IoT devices. We also develop countermeasures to secure them against sensitive data extraction, disruption, diversion, and obfuscation.

We specialize in providing information on system on chip hardware and software cybersecurity. System on a chip hardware allows for the creation of smaller and more efficient devices, driving innovation in the creation of netbooks, laptops, smartphones, and IoT devices. By partnering with CAP, you can expect to understand the best system-on-chip hardware and hardware cybersecurity solutions on the market today. Our partners enjoy the very best in hardware security practices.

A Message from
Dr. Kevin Kornegay


  • Hardware Security
  • Side Channel Analysis (SCA)
    • Simple Power Analysis (SPA)
    • Differential Power Analysis (DPA)
    • Correlation Power Analysis (CPA)
    • Differential Electromagnetic Analysis (DEMA)
  • Fault Injection (FI)
  • System on Chip Design
  • Security-at-the-Edge
  • Secure System-on-Chip (SoC) Design
    (e.g., Intel 16 nm CMOS Technology)
  • Hardware/Software Reverse Engineering
  • Countermeasure Assessment and Development
  • Wireless Interface/Protocol Vulnerability Assessment
    (e.g., 5G, Matter, etc.)
  • Trustworthy AI
Back To Top