skip to Main Content

Recent News

Drs. Kornegay Interview on Shif5 Live Podcast “CREAM of the Crop”

Previously we’ve discussed the Internet of Things or “IOT” -- a physical network device that exchanges data. IOT devices are proliferating at a dizzying rate, and the cybersecurity community is scrambling to keep up. Organizations like the Center for Reverse…

Dr. Kornegay to speak on NSF Panel entitled “Black Scientists & Engineers at Our Nation’s HBCUs: Making American History Now”

Thursday, February 25, 2021, from 12:00 p.m. to 1:00 p.m. The panel, moderated by Dr. Victor McCrary, will be entirely online and open to the public.

CAP Faculty have 3 papers accepted to 2021 IEEE CISS Confernce

CAP Faculty have 3 papers accepted at the 2021 Annual Conference on Information Sciences and Systems (CISS). Dr. Hailu Belay and Dr. Kevin Kornegay, "Energy Efficiency Analysis of RLS-Music Based Smart Antenna System for 5G Network". Dr. Tanvir Arafin and…

CAP Faculty Land $550K Research and Development Contract from ARLIS

CAP faculty receive ARLIS funding for 5G and AI research and development. Dr. Kevin Kornegay leads a project team including Drs. Michel Kornegay and Cliston Cole receive ARLIS funding for 5G vulnerability study in collaboration with Howard University researchers. Dr.…

Welcome to CAP

Our mission is to provide the electronics industry and intelligence community with knowledge, methodology, solutions, and skilled cybersecurity engineers to help prevent penetration and manipulation of our nation’s cyber physical infrastructures. We apply invasive and noninvasive hardware and software reverse engineering techniques to assess physical layer cybersecurity vulnerabilities in embedded systems, specifically IoT devices. We also develop countermeasures to secure them against sensitive data extraction, disruption, diversion, and obfuscation.

A Message from
Dr. Kevin Kornegay

CAPABILITIES

  • Hardware Security
  • Side Channel Analysis (SCA)
    • Simple Power Analysis (SPA)
    • Differential Power Analysis (DPA)
    • Correlation Power Analysis (CPA)
    • Differential Electromagnetic Analysis (DEMA)
  • Fault Injection (FI)
    • Power and Clock Glitching
  • Software Reverse Engineering
  • Countermeasure Development and Assessment
  • Wireless Interface/Protocol Hacking (e.g. GPS, WiFi, Bluetooth, ZigBee, ZWave, custom protocols, etc.) via Software Defined Radio
  • Trusted Platform Module Security Applications & Design
  • Semiconductor Supply Chain Security
  • Adversarial AI
Back To Top
×Close search
Search