skip to Main Content

Recent News

CAP Center Among First Cohort of IBM Cybersecurity Leadership Centers

IBM is announcing the first six of more than twenty Cybersecurity Leadership Centers among HBCUs and HBCU systems. The Cybersecurity Assurance and Policy Center (CAP) at Morgan State University is among the first cohort selected! IBM Tackles Talent Shortage and…

Dr. Kevin Kornegay to Host UIDP Webinar

Join us on for a CAP Center informational webinar to include a Q&A with Director, Dr. Kevin Kornegay. READ MORE March 16, 2022 || 1:00 PM - 2:00 PM Register Here (Required)

TrippTalk Tech Features Dr. Kevin Kornegay

    Check out CAP Center Director, Dr. Kevin Kornegay, as he discusses cybersecurity outreach programs with Keith Tripp of TrippTalk Tech! YouTube Link: TrippTalk Tech (S2E11): STEMulating Our Youth!!!

Diversity In Action Featured Announcement: Morgan State University Offers NSF CyberCorps Scholarships for Service in Secure Embedded Systems

NSF CyberCorps Scholarships for Service in Secure Embedded Systems Advertised in January/February 2022 Edition of Diversity In Action . READ MORE

Welcome to CAP

Our mission is to provide the electronics industry and intelligence community with knowledge, methodology, solutions, and skilled cybersecurity engineers to help prevent penetration and manipulation of our nation’s cyber physical infrastructures. We apply invasive and noninvasive hardware and software reverse engineering techniques to assess physical layer cybersecurity vulnerabilities in embedded systems, specifically IoT devices. We also develop countermeasures to secure them against sensitive data extraction, disruption, diversion, and obfuscation.

A Message from
Dr. Kevin Kornegay


  • Hardware Security
  • Side Channel Analysis (SCA)
    • Simple Power Analysis (SPA)
    • Differential Power Analysis (DPA)
    • Correlation Power Analysis (CPA)
    • Differential Electromagnetic Analysis (DEMA)
  • Fault Injection (FI)
    • Power and Clock Glitching
  • Software Reverse Engineering
  • Hardware Reverse Engineering
  • Countermeasure Assessment and Development
  • Wireless Interface/Protocol Hacking
  • Trusted Platform Module Security Applications & Design
  • Semiconductor Supply Chain Security
  • Trustworthy AI
Back To Top