Dr. Eakta Jain’s research on the human/horse interaction asks if this can teach us something about building robots designed to improve our lives. She states “There are no fundamental guiding principles for how to build an effective working relationship between… Read More
DR SARA RAMPAZZI AND PHD STUDENT SRI HRUSHHIKESH VARMA BHUPATHIRAJU WIN MULTIPLE AWARDS AT THE INAUGURAL SYMPOSIUM ON VEHICLE SECURITY AND PRIVACY.
Congratulations to both Dr. Rampazzi and her Ph.D student Sri Hrushikesh Varma Bhupathiraju for wining two awards for their work-in-progress (WIP) paper, titled: “WIP: Infrared Laser Reflection Attack Against Traffic Sign Recognition Systems”. These awards include: The ETAS best short/WIP… Read More
FICS RESEARCH PROFESSOR PATRICK TRAYNOR AND PH.D STUDENT LOGAN BLUE RESEARCH ON DEEPFAKE AUDIO
Imagine the following scenario. A phone rings. An office worker answers it and hears his boss, in a panic, tell him that she forgot to transfer money to the new contractor before she left for the day and needs him… Read More
Prof. Forte wins ECASE – Army Award
Professor Domenic Forte was recently notified that he will be receiving the Army Research Office’s prestigious Early Career Award for Scientists and Engineers (ECASE). He was originally nominated for this honor in 2017 by the Office’s Information and Software Assurance… Read More
Invasion of the Hardware Snatchers: Cloned Electronics Pollute the Market
Fake hardware could open the door to malicious malware and critical failures.
Biometric Security: Your Body as Your Password
In Biometric Security: Your Body as Your Password, Prof. Damon Woodard shares his thoughts on consumer concerns and the adaptability of biometric security features on mobile devices and how researchers and engineers can mitigate their concerns with improved design.
Prof. Mark Tehranipoor on Pensacola News Journal
Prof. Mark Tehranipoor on Pensacola News Journal shares his thoughts about the proliferation of consumer-friendly internet accessible devices and the safety and privacy risk issues now inherent in them, along with tips on how to employ “good cyber-hygiene practices”.
Prof. Patrick Traynor on Washington Journal: Cyberterrorism and Internet Threats
On November 17, 2015, Prof. Patrick Traynor participated in the Washington Journal’s “Sunshine State Tour” series and talked about the development of cybersecurity infrastructure, current cybersecurity challenges, and what government and the private sector can do to combat threats. He spoke from… Read More
WSJ Article: Researchers Find Security Flaws in Developing-World Money Apps
Mobile-money services are growing at a rapid clip in the developing world, but new research suggests many of the apps that give the poor access to banking services have woeful security protections, leaving users exposed to fraud and theft. Computer… Read More