skip to Main Content

Recent News

U.S. Department of Commerce Appoints Members for New Internet of Things Advisory Board

The U.S. Department of Commerce has appointed 16 experts for the new Internet of Things Advisory Board (IoTAB), to advise the Internet of Things Federal Working Group. The advisory board includes a wide range of stakeholders outside of the federal…

CAP Center Director and Scholar Receive Intellectual Property Innovation of the Year Award

Congratulations to our Director, Dr. Kevin Kornegay and former CAP Scholar, Dr. Tsion Yimer, for being selected as finalists for an Intellectual Property Innovation of the Year award in the Information Science category. Their innovative contributions to the university and…

Dr. Kevin Kornegay Appointed Eugene M. DeLoatch Endowed Chair in Cybersecurity Engineering

Congratulations to the CAP Center Director, Dr. Kevin Kornegay, for his appointment as the Eugene M. DeLoatch Endowed Chair in Cybersecurity Engineering. Morgan State University was awarded $3 million in matching endowment funding for the creation of three new research…

CAP Center Featured in Morgan Magazine Online Exclusive

Morgan’s Cybersecurity Assurance and Policy (CAP) Center Cultivates Excellence in Cybersecurity Scholarship and Research ------------------------ View the featured exclusive in Morgan Magazine Plus (MM+):

Welcome to CAP

Our mission is to provide the electronics industry and intelligence community with knowledge, methodology, solutions, and skilled cybersecurity engineers to help prevent penetration and manipulation of our nation’s cyber-physical infrastructures. We use noninvasive hardware and software reverse engineering techniques to assess physical layer cybersecurity vulnerabilities in embedded systems, specifically IoT devices. We also develop countermeasures to secure them against sensitive data extraction, disruption, diversion, and obfuscation.

A Message from
Dr. Kevin Kornegay


  • Hardware Security
  • Side Channel Analysis (SCA)
    • Simple Power Analysis (SPA)
    • Differential Power Analysis (DPA)
    • Correlation Power Analysis (CPA)
    • Differential Electromagnetic Analysis (DEMA)
  • Fault Injection (FI)
    • Power and Clock Glitching
  • Security-at-the-Edge
  • Secure System-on-Chip (SoC) Design
    (e.g., Intel 16 nm CMOS Technology)
  • Hardware/Software Reverse Engineering
  • Countermeasure Assessment and Development
  • Wireless Interface/Protocol Vulnerability Assessment
    (e.g., 5G, Matter, etc.)
  • Trustworthy AI
Back To Top