skip to Main Content

Recent News

Dr. Monireh Dabaghchian Receives $300K NSF Research Initiation Award (RIA)

Dr. Dabaghchian receives $300K NSF Research Initiation Award entitled "Secure Spectrum Sharing for Intelligent Internet-of-Things (IoT) Wireless Communication Networks".

Dr. Michel Kornegay Receives GenCyber Grant entitled “Females are Cyber Stars” for Summer 2021

The GenCyber program provides summer cybersecurity camp experiences for students and teachers at the K-12 level. The goals of the GenCyber program are to: Ignite, sustain, and increase awareness of K12 cybersecurity content and cybersecurity postsecondary and career opportunities for…

Drs. Kornegay Interview on Shif5 Live Podcast “CREAM of the Crop”

Previously we’ve discussed the Internet of Things or “IOT” -- a physical network device that exchanges data. IOT devices are proliferating at a dizzying rate, and the cybersecurity community is scrambling to keep up. Organizations like the Center for Reverse…

Welcome to CAP

Our mission is to provide the electronics industry and intelligence community with knowledge, methodology, solutions, and skilled cybersecurity engineers to help prevent penetration and manipulation of our nation’s cyber physical infrastructures. We apply invasive and noninvasive hardware and software reverse engineering techniques to assess physical layer cybersecurity vulnerabilities in embedded systems, specifically IoT devices. We also develop countermeasures to secure them against sensitive data extraction, disruption, diversion, and obfuscation.

A Message from
Dr. Kevin Kornegay


  • Hardware Security
  • Side Channel Analysis (SCA)
    • Simple Power Analysis (SPA)
    • Differential Power Analysis (DPA)
    • Correlation Power Analysis (CPA)
    • Differential Electromagnetic Analysis (DEMA)
  • Fault Injection (FI)
    • Power and Clock Glitching
  • Software Reverse Engineering
  • Countermeasure Development and Assessment
  • Wireless Interface/Protocol Hacking (e.g. GPS, WiFi, Bluetooth, ZigBee, ZWave, custom protocols, etc.) via Software Defined Radio
  • Trusted Platform Module Security Applications & Design
  • Semiconductor Supply Chain Security
  • Adversarial AI
Back To Top