skip to Main Content

Recent News

CAP Researchers Honored with Distinguished Paper Award

Dr. Kevin Kornegay, Dr. Wondimu Zegeye and others received the Distinguished Paper Award at the Network and Distributed System Security (NDSS) Symposium during the 2024 Workshop on Security and Privacy in Standardized IoT (SDIoTSec). This award was presented in recognition…

cybersecurity workforce certification training
Developing Secure Edge Computing Skills: Resources and Training for IoT Professionals

In the rapidly evolving landscape of the Internet of Things (IoT) and edge computing, the demand for skilled professionals who can navigate the complexities of developing secure, efficient systems is at an all-time high. As businesses and industries increasingly rely…

hardware cybersecurity
Secure Edge Computing: Transforming IoT in Healthcare, Manufacturing, and Beyond

In the rapidly evolving digital landscape, the integration of Internet of Things (IoT) devices with secure edge computing is revolutionizing industries by offering smarter, faster, and more efficient solutions. Particularly in sectors like healthcare and manufacturing, where data sensitivity and…

CAP Center Featured for Science/AAAS

With two centers focused on AI technology and cybersecurity, Morgan State University (MSU) is poised to level the playing field for students and users of the technology... ...With the advent of the Internet of Things, hacking one device can compromise…

System on Chip Hardware & Software Cybersecurity

Welcome to the CAP Center

The Leader in Hardware and Software Cybersecurity

Our mission is to provide the electronics industry and intelligence community with knowledge, methodology, solutions, and skilled cybersecurity engineers to help prevent penetration and manipulation of our nation’s cyber-physical infrastructures. We use noninvasive hardware and software reverse engineering techniques to assess physical layer cybersecurity vulnerabilities in embedded systems, specifically IoT devices. We also develop countermeasures to secure them against sensitive data extraction, disruption, diversion, and obfuscation.

We specialize in providing information on system on chip hardware and software cybersecurity. System on a chip hardware allows for the creation of smaller and more efficient devices, driving innovation in the creation of netbooks, laptops, smartphones, and IoT devices. By partnering with CAP, you can expect to understand the best system-on-chip hardware and hardware cybersecurity solutions on the market today. Our partners enjoy the very best in hardware security practices.

A Message from
Dr. Kevin Kornegay


  • Hardware Security
  • Side Channel Analysis (SCA)
    • Simple Power Analysis (SPA)
    • Differential Power Analysis (DPA)
    • Correlation Power Analysis (CPA)
    • Differential Electromagnetic Analysis (DEMA)
  • Fault Injection (FI)
  • System on Chip Design
  • Security-at-the-Edge
  • Secure System-on-Chip (SoC) Design
    (e.g., Intel 16 nm CMOS Technology)
  • Hardware/Software Reverse Engineering
  • Countermeasure Assessment and Development
  • Wireless Interface/Protocol Vulnerability Assessment
    (e.g., 5G, Matter, etc.)
  • Trustworthy AI
Back To Top